IT Infrastructure Security Design

1.  Using the IT infrastructure security design you created in Module 1, list the five “highest” risks that you would consider a major incident to the Confidentiality, Integrity and Availability (C.I.A. Triad) of processing data between the data centers.  Include the reasons why you chose each of the five risks.

2.  The strategies to manage and/or mitigate risks include 1) transferring the risk to another party, 2) avoiding the risk, 3) reducing the negative effect of the risk, and 4) accepting some or all of the consequences of a particular risk.  Using the five highest risks you identified in Discussion Question 1, choose one of the strategies to manage and/or mitigate risk for each of the five highest risks you chose.  Include your reason why you chose the strategy for each of the five risks.

Don't use plagiarized sources. Get Your Custom Essay on
IT Infrastructure Security Design
GET AN ESSAY WRITTEN FOR YOU FROM AS LOW AS $13/PAGE
Order Essay

IT Infrastructure Security Design 1

2.  The strategies to manage and/or mitigate risks include 1) transferring the risk to another party, 2) avoiding the risk, 3) reducing the negative effect of the risk, and 4) accepting some or all of the consequences of a particular risk.  Using the five highest risks you identified in Discussion Question 1, choose one of the strategies to manage and/or mitigate risk for each of the five highest risks you chose.  Include your reason why you chose the strategy for each of the five risks.

Still stressed from student homework?
Get quality assistance from academic writers!