Risks, Threats, and Vulnerabilities in an IT Infrastructure Lab Report
An information technology risk analysis is a significant component regarding vulnerability issues within the organization’s system. The risk analysis process entails the evaluation of the chances to which third-party individuals could exploit the vulnerability. Therefore, conducting this risk analysis ensures that threats and vulnerabilities are studied and managed (Gibson, 2014). In this regard, the risk is directly proportional to the exploitation and impact after unraveling the danger associated with the execution of certain protocols within the system of the organization. Need help with your assignment ? Reach out to us. We offer excellent services.
Risk Impact and Outcomes
The risk impact assessment is conducted by someone other than the IT department to benefit the database records stored within the storerooms. As such, the administration within the organization has established a routine measure of conducting general stock that considers the benefits of stores to offer increased precision of the records (Gibson, 2014). Despite this positive move, the major risk is that the stock recorded on the database needs to be improved. This deficiency is brought about by the fact that the stock terminated from the storeroom is done without the acknowledgment of the development’s IT. To prevent this deficiency from being experienced, the Service Desk should record all the advantages associated with stock numbers (Silvestri et al., 2023). Also, the errors should be identified and recorded on the advantage register and the budgetary frameworks.
Asset and Inventory
The other framework entails the system’s movement when the stock is lost, stolen, or requires some repair. Under this criterion, some of the risks may include different sets of inventories at the time of upgrading the subtle elements. These risks are associated with irregularities in the redesign of information. As such, the intervening measure may encompass developing a framework that accounts for all the recorded data and the backings of the execution of critical markers within the IT administration plan (Silvestri et al., 2023).
Recommendations
When the benefits realized by the organization are extraordinary, the proper measure to undertake is to execute moves to the hardware. Organizations should shun installing IT resources that stay updated in a three or 5-year life cycle. Adopting such a measure results in IT professionals needing more work morale (Silvestri et al., 2023). The systems should keep the IT professionals on the run by ensuring they check their usability and update and maintain them regularly.
References
Gibson, D. (2014). Managing Risk in Information Systems (2nd Ed.). Jones & Bartlett Learning. https://online.vitalsource.com/books/9781284107753
Silvestri, S., Islam, S., Papastergiou, S., Tzagkarakis, C., & Ciampi, M. (2023). A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem. Sensors, 23(2), 651.
ORDER A PLAGIARISM-FREE PAPER HERE
We’ll write everything from scratch
Question
Upon completion of Lab #5 – Identify Risks, Threats & Vulnerabilities in an IT Infrastructure Using ZeNmap GUI (Nmap) & Nessus® Reports, students are required to provide the following deliverables as part of this lab:
1. Lab #5 – A four-paragraph executive summary written to executive management providing a
summary of findings, risk impact to the IT asset and organization, and recommendations for next
steps. Please use the 2 attached PDF Reports to complete your lab assignment.
Your submissions should follow APA format for the Executive Summary.