1. What is the goal or objective of an IT risk management plan? A risk management plan is a key item en having an IT project. It is developed with the three key objectives. These objectives include: defining how the risk are going to be managed, how they are going to monitored and how they are going to be approved throughout the project.
2. What are the five fundamental components of an IT risk management plan? Like most plans, an IT management has essential components in its structure. These include:
Risk monitoring and;
3. Define what risk planning is. This is the development and documentation process of risk identification strategies and methods that are well structured, organized and interactive. It entails identifying, assessing and controlling risk that come about due to operation factors and decision making that weighs the risk cost and benefits of the process.
4. What is the first step in performing risk management? Performance of risk management always begins with one crucial step; the establishment of the objectives of the risk management. In this step the aim is always to establish the expected results of the risk management process.
5. What is the exercise called when you are trying to gauge how significant a risk is? This is referred to as health risk assessment
6. What practice helps address a risk? Elimination or reduction of risk is achieved through risk management
7. What ongoing practice helps track risk in real time? Risk Mitigation
8. True or False: Once a company completes all risk management steps (identification, assessment, response, and monitoring), the task is done. False
9. Given that an IT risk management plan can be large in scope, why is it a good idea to develop a risk management plan team? It I through the scope that the boundaries of risk management are establish. In situation where the scope of the plan is large, a team is essential as they work together to ensure that its structure is maintained by arriving at decision through consensus.
10. In the seven domains of a typical IT infrastructure, which domain is the most difficult to plan, identify, assess, treat, and monitor? Local Area Network Wide Area Network (LAN-WAN)
11. Which compliance laws or standards does the health care organization mentioned in the Hands-On Steps have to comply with (consider these: Health Insurance Portability and Accountability Act [HIPAA], Gramm-Leach-Bliley Act [GLBA], and Family Educational Rights and Privacy Act [FERPA])? Family Educational Rights and Privacy Act (FERPA). How does this impact the scope and boundary of its IT risk management plan? Compliance of to the FERPA law narrows widens the scope and boundary of the risk management plan. The boundary of the scope of the plan widens as it has to accommodate the rules and regulation in the FERPA. In the scope of the risk management, the possibilities of the project going against the FERPA law have to be accounted for as the project might not always be carried out within these restricting regulations.
12. How did the risk identification and risk assessment of the identified risks, threats, and vulnerabilities contribute to your IT risk management plan outline? It enabled locating of the information required by ensuring that it was properly detailed
13. What risks, threats, and vulnerabilities did you identify and assess that require immediate risk mitigation given the criticality of the threat or vulnerability? Some of the key vulnerabilities that need immediate mitigation included lack of adequate finances and some of the member lacking commitment. These two factor may greatly affect the risk management plan in an adverse manner
14. For risk monitoring, what are some techniques or tools you can implement in each of the seven domains of a typical IT infrastructure to help mitigate risk? A wide variety of possibilities can be adopted ranging from man-made to properly assess, identification and solving the possible challenges
15. For risk mitigation, what processes and procedures can help streamline and implement risk mitigation solutions to the production IT infrastructure? These include control, remediation, reporting a key and assess.
16. What is the purpose of a risk register? This tool enables project managers to develop a list risk that are identified, distinctly defined and assessed as to what value they have in terms of attaining the goals of the projects. They enable direct risk handling such as through risk mitigation and also play an important role in focused quantitative analysis, for example schedule risk analysis that is founded on Monte Carlo simulation that is driven with specific risk. The latter use is often referred to as Risk Driver Method of Schedule and Cost Risk Analysis.
17. How does risk response impact change control management and vulnerability management? One of the best ways to approach organizational change is change control. This is because it provides a systematic approach to organizational change. It also prevents any possible interruption of services. The latter is achieved through provision of a plan that ensures that service resume as soon as possible in case they are interrupted.
LAB #3 Defining the Scope and Structure for an IT Risk Management Plan
Describe in what ways the risk management process in both IT and non-IT environments are similar.
Both IT and non-IT risk management environments require the five steps of risk management; that is plan, identify, assess, respond and monitoring.
For instance, in a non-IT environment such as an Athlete Fitness run, the risk management steps could entail the following:
Planning the run is supposed to be 10km on a certain date at a certain time with a certain number of athletes at a specific training ground or pitch.
Identify risks low light possible rainy condition or windy conditions that might make it difficult for the athletes to run. Hot weather conditions may also prevail leading to dehydration of the athletes.
Assesses the level of the risk is medium
Responding risk are prioritized and acceptable
Monitor this entails evaluation of the athletes along the route for injury and dehydration
Briefly describe in your own words the five major steps of risk management: plan, identify, assess, respond, and monitor.
Plan this is coming up with the structure of the project that is going to be conducted; what it will entailed, the people involved and the infrastructure involved.
Identify the risk the team needs to uncover and recognize and describe the risks during which a risk register must be prepared
Assess- In this step, the risks are evaluated and ranked by determining the risk. It entails making a decision on whether the risk in acceptable or it is serious enough to require treatment. The risk rankings are then added to the project register.
Responding this is coming up a response plan on how to treat or modify the risk to achieve acceptable risk levels
Monitoring in this step, the risk register is taken and used to monitor, track and review the risk during the project
Using the following table of risks, threats, and vulnerabilities that were found in a healthcare IT infrastructure servicing patients with life-threatening conditions, review the risks in the following table. Consider how you might manage each risk and which of the seven domains each one affects:
Risks, Threats, and Vulnerabilities
Unauthorized access from public Internet. WAN domain
Hacker penetrates IT infrastructure. System application domain
Communication circuit outages. LAN domain
Workstations. Work station domain
Workstation operating system (OS) has known software vulnerability. Work station domain
Denial of service attack on organizations e-mail. Work station domain
Remote communications from home office. Remote access domain
Workstation browser has software vulnerability. Work station domain
Weak ingress/egress traffic-filtering degrades performance. System Access Domain
Wireless Local Area Network (WLAN) access points are needed for Local Area Network (LAN) connectivity within a warehouse LAN. WAN Domain
Need to prevent rogue users from unauthorized WLAN access. LAN-WAN domain
User destroys data in application, deletes all files, and gains access to internal network. User domain
Fire destroys primary data center. System application domain
Intraoffice employee romance gone bad. User domain
Loss of production data server. System application domain
Unauthorized access to organization-owned workstations. Work station domain
LAN server OS has a known software vulnerability. LAN domain
User downloads an unknown e-mail attachment. LAN domain
Service provider has a major network outage. Remote access domain
User inserts CDs and USB hard drives with personal photos, music, and videos on organization owned computers. User domain
Virtual Private Network (VPN) tunneling between the remote computer and ingress/egress router. LAN WAN domain
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Rationale for the Accounting Software Program
- SWOT Analysis of Sheraton Hotel & Resorts
- Health Care Organizations: Mission, Vision, Values
- Analysis and Comparison of Tesco and Debenhams Companies
- Report on Johnson & Johnson's Company - The Organization Profile
- Essay Example on Zipline International Inc.
- Marketing Analysis of Lego Company. Research Paper Example.
- Data Security in Companies
- The Power of Story - Social Media in My Life
- Approaches to Improve the Program
- Informatics in Public Health - Essay Example
- Questions on Project Management
- Proposal for Information System to Palace Hotel
- The Budget Restaurant Business Plan - Course Work Example
- Operations and Information Management - Essay Example