lab 9 recommending it security policies to help mitigate risk
Note: both attachments need to be completed
The purpose of security policies is to help mitigate identified risks. Writing these policies is easier once you have created an asset inventory list, prioritized that list, and identified the major risk exposures found in those assets.
The task of identifying your IT assets begins with recognizing that your IT infrastructure and supporting resources can be divided into the seven IT domains. The benefit of identifying the assets and prioritizing them across those domains is being able to document policies in a systematic and thorough manner.
In this lab, you will create a high-level IT asset inventory list, you will prioritize those assets, you will identify the risk exposures, and you will make recommendations for policies that can mitigate the risk exposures.
Upon completing this lab, you will be able to:
Create a high-level IT asset inventory list.
Prioritize the IT assets in terms of importance to a school’s operation and business. Identify the top five risk exposures found in the high-level IT asset assessment. Recommend IT security policies that can help mitigate the identified risk exposures.