Question: Instructions Introduction After having identified threat / vulnerability pairs and estimate the likelihood of their occurrence, IT management must decide which risk management techniques are

Instructions
Introduction
After having identified threat/vulnerability pairs and estimate the likelihood of their occurrence, IT management must decide which risk management techniques are appropriate and then present this information to senior management who will allocate resources appropriately.
Scenario
You are the IT manager for GrowBetter, which is a small agricultural company that produces and sells fertilizer products. The company operates through its headquarters in a small town in Ohio and runs two large production facilities in Nebraska and Oklahoma. GrowBetter employs sales force personnel in every state in the U.S. to serve its local customers.
Three servers are located at GrowBetters headquartersActive Directory Server, a Linux application server, and an Oracle database server. The application server hosts a proprietary software application that manages inventory, sales, supply-chain, and customer information. The database server manages all data stored locally with direct attached storage.
All three sites use Ethernet-cabled local area networks (LANs) to connect the users Windows workstations via industry standard, managed switches. The remote production facilities connect to headquarters via routersT-1(1.54 mbps telecomm circuit) LAN connections provided by an external Internet service provider (ISP)and share an Internet connection through a firewall at headquarters. Individual sales personnel throughout the country connect to GrowBetters network via virtual private network (VPN) software through their individual Internet connections, typically in a home office.
Your Task
Identify, analyze, and explain at least five likely threat/vulnerability pairs and their likelihood of occurrence. For each of the threats/vulnerabilities you identify, determine which of the six risk management techniques is appropriate and justify your choices.
Prepare a brief yet thorough report or presentation of your findings for senior management to review. Justify your reasoning for each chosen management technique. Cite all sources used to support your findings.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!