The following risks, threats, and vulnerabilities were found in a healthcare IT infrastructure servicing patients with life-threatening situations.
Given the list, select which of the seven domains of a typical IT infrastructure is primarily impacted by the risk, threat, or vulnerability.Risk – Threat – Vulnerability Primary Domain ImpactedUnauthorized access from pubic Internet Remote Access DomainUser destroys data in application and deletesall files System/Application DomainHacker penetrates your IT infrastructureand gains access to your internal network LAN-to-WAN DomainIntra-office employee romance gone bad User DomainFire destroys primary data center System/Application DomainCommunication circuit outages WAN DomainWorkstation OS has a known software vulnerability Workstation DomainUnauthorized access to organization owned Workstations Workstation DomainLoss of production data System/Application DomainDenial of service attack on organization e-mailServer LAN-to-WAN DomainRemote communications from home office Remote Access DomainLAN server OS has a known software vulnerability LAN DomainUser downloads an unknown e –mail Attachment User DomainWorkstation browser has software vulnerability Workstation DomainService provider has a major network outage WAN DomainWeak ingress/egress traffic filtering degrades performance LAN-to-WAN DomainUser inserts CDs and USB hard driveswith personal photos, music, and videos onorganization owned computers User Domain VPN tunneling between remote computer and ingress/egress router LAN-to-WAN DomainWLAN access points are needed for LAN connectivity within a warehouse LAN DomainNeed to prevent rogue users from unauthorized WLAN access LAN Domain