IT Infrastructure Security Design

1.  Using the IT infrastructure security design you created in Module 1, list the five “highest” risks that you would consider a major incident to the Confidentiality, Integrity and Availability (C.I.A. Triad) of processing data between the data centers.  Include the reasons why you chose each of the five risks.

2.  The strategies to manage and/or mitigate risks include 1) transferring the risk to another party, 2) avoiding the risk, 3) reducing the negative effect of the risk, and 4) accepting some or all of the consequences of a particular risk.  Using the five highest risks you identified in Discussion Question 1, choose one of the strategies to manage and/or mitigate risk for each of the five highest risks you chose.  Include your reason why you chose the strategy for each of the five risks.

IT Infrastructure Security Design 1

2.  The strategies to manage and/or mitigate risks include 1) transferring the risk to another party, 2) avoiding the risk, 3) reducing the negative effect of the risk, and 4) accepting some or all of the consequences of a particular risk.  Using the five highest risks you identified in Discussion Question 1, choose one of the strategies to manage and/or mitigate risk for each of the five highest risks you chose.  Include your reason why you chose the strategy for each of the five risks.

Still stressed from student homework?
Get quality assistance from academic writers!