Lab 1: IAA
Lab 1: IAA
Infrastructure
Overview
The following risks, threats, and vulnerabilities were found in a healthcare IT infrastructure servicing
patients with life-threatening situations. Given the list, select which of the seven domains of a typical
IT infrastructure is primarily impacted by the risk, threat, or vulnerability.
System/Application Domain
User destroys data in application and deletes
all files
Lan-to-Wan Domain
Hacker penetrates your IT infrastructure
and gains access to your internal network
User inserts CDs and USB hard drives with User Domain
personal photos, music, and videos on organization
owned computers
1. Which domain(s) had the greatest number of risks, threats, and vulnerabilities?
LAN-to-WAN Domain
2. What is the risk impact or risk factor (critical, major, minor) that you would qualitatively assign
to the risks, threats, and vulnerabilities you identified for the LAN-to-WAN Domain for the
healthcare and HIPPA compliance scenario?
`
Hacker penetrates IT infrastructure and gains access to your internal network: Critical, PHI can be
compromised Denial of service attack on organization's e-mail server: Minor, can be mitigated Weak
ingress/egress traffic filtering degrades performance: Minor, can be mitigated VPN tunneling
between the remote computer and ingress/egress router: Major, if electronic protected health
information (ePHI) is being accessed remotely
3. How many threats and vulnerabilities did you find that impacted risk within each of the
seven domains of a typical IT infrastructure?
User Domain: 3
Workstation Domain: 3
LAN Domain: 3
LAN-to-WAN Domain: 4
WAN Domain: 2
Remote Access Domain: 2
Systems/Application Domain: 3