Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Design a wireless risk mitigation plan that is appropriate for an organization.

ID: 3869176 • Letter: D

Question

Design a wireless risk mitigation plan that is appropriate for an organization. Compare and contrast performance and range considerations for a wireless deployment plan. Create a plan for preventing and mitigating performance issues for an organization's wireless deployment. Create a strategy for preventing and mitigating range issues for your organization's wireless deployment. Identify channel setting considerations. Include a strategy for analyzing the multilevel facilitates found within your organization. Identify at least two areas of an organization where you expect it to be difficult to obtain or maintain wireless coverage and discuss your strategy for improving coverage in these areas. Identify at least two areas of your organization where you expect to have radio signal interference and describe your strategy for improving signal in these areas. Design a wireless risk mitigation plan that is appropriate for an organization. Compare and contrast performance and range considerations for a wireless deployment plan. Create a plan for preventing and mitigating performance issues for an organization's wireless deployment. Create a strategy for preventing and mitigating range issues for your organization's wireless deployment. Identify channel setting considerations. Include a strategy for analyzing the multilevel facilitates found within your organization. Identify at least two areas of an organization where you expect it to be difficult to obtain or maintain wireless coverage and discuss your strategy for improving coverage in these areas. Identify at least two areas of your organization where you expect to have radio signal interference and describe your strategy for improving signal in these areas. Design a wireless risk mitigation plan that is appropriate for an organization. Compare and contrast performance and range considerations for a wireless deployment plan. Create a plan for preventing and mitigating performance issues for an organization's wireless deployment. Create a strategy for preventing and mitigating range issues for your organization's wireless deployment. Identify channel setting considerations. Include a strategy for analyzing the multilevel facilitates found within your organization. Identify at least two areas of an organization where you expect it to be difficult to obtain or maintain wireless coverage and discuss your strategy for improving coverage in these areas. Identify at least two areas of your organization where you expect to have radio signal interference and describe your strategy for improving signal in these areas.

Explanation / Answer

Data classification plays a key role in securing an IT system, making it a lot easier to see where and what the organisation's risks are, thereby increasing the chances that you'll end up with an effective security infrastructure. For example, anyone conducting a risk analysis will need to know the value and classification of the information held and processed by the organisation in order to establish its threat profile and understand the possible impact there would be on the business if the data's confidentiality, integrity or availability were compromised.

a risk mitigation plan needs to assess the business impact of a compromise of aggregated data, not just individual items. If aggregation raises the business-impact level, then further security controls may be required.

A useful exercise is to check whether there is a valid business case for aggregating all data in one place. Does an employee need the entire client database on his or her laptop or USB key? Maybe a subset of the data is sufficient for day-to-day business requirements. The compromise of 1,000 records may be bad, but the compromise of 5,000 records would have a far worse effect. Also, a laptop carrying 5,000 records would clearly need stronger -- and probably more costly -- security controls than one carrying a smaller subset of 500 records.

However, aggregation doesn't automatically increase the business impact or threat level. The aggregation risk assessment will help the organisation avoid disproportionate and inappropriate controls being put in place and impairing business operations unnecessarily. The security controls need to be matched to the threat: Don't fall into the trap of assigning an unnecessarily high-risk rating to an entire system just because aggregation has raised the business effect of a compromise for a portion of that system.

Think about when aggregation could occur and review how it could be controlled or prevented. Database queries that return all the records from a client database require careful construction and appropriate permissions, perhaps limiting the results if they return sensitive data or preventing certain queries that join tables when the combined data would increase its sensitivity.

Security controls relating to personnel need to take into account the effect of aggregation. For example, a database may contain rows of restricted information and access to all the rows greatly increases the potential impact of a breach. Therefore, administrators with low-level access rights to a database should complete more thorough personnel checks than would normally be required; a simple but cost-effective measure.

Other cost-effective controls, such as monitoring and checking that staff follows the relevant security procedures, can help mitigate the extra risks created by aggregation. Where systems are affected by aggregation, consider improvements to the physical and procedural security of the server room, introducing a two-man rule for access and ensuring there is proper segregation of duties. Also, beefing up your business continuity plans and running more frequent backups provides greater resilience in the event that data availability is affected.

Information assets such as databases are fundamental to support modern businesses, but they are also obvious targets, one-stop locations for a would-be attacker. Today's forward-thinking businesses are always looking for an edge over their competitors, and aggregation of data across business lines and the integration of legacy systems and databases are obvious areas that can produce additional business intelligence. However, don't let eagerness to combine and mine data lead you to create an information asset that isn't appropriately protected.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote