Table 1.2 – Risk Mitigation Strategies
Risk Factor Mitigation Type Mitigation Strategy
Building fire Mitigation Install proper fire containment systems in all site buildings; fire extinguishers near staff
Server failure Mitigation Network administrators monitor hardware at regular intervals for deviation from baseline; spare parts are kept in secure storage …show more content…
A building fire is properly mitigated with fire containment systems such as fire sprinklers and fire extinguishers, though site staff must be reminded and properly trained on when, where and on what to use the extinguishers. Site security is trained to alert site staff in the event that a fire breaks out, so that it can be dealt with before it turns into a more severe scenario. Hardware failures such as server and workstation issues will be handled by the network administrators. They are trained and certified to perform these types of repairs, and they will also have access to the secure storage room where spare parts are …show more content…
They must keep management informed of absolutely any suspicious activity, and they must monitor the networks constantly when there are no other issues to work out. With the proper personnel, these threats have been mitigated. Natural disasters such as floods will most likely not affect the black site due to its location in a high elevation. Due to this circumstance, we have decided to accept the risk associated with floods. Hardware vandalism and theft are also unlikely, although the chances of them occurring are not zero. Physical security onsite will prevent any equipment from being taken outside of the site, and all of the equipment being used have small GPS tracking devices installed in obscure places so that they can be tracked in the event that security is somehow bypassed. Finally, we address the issue of user error such as the deletion or erasure of files. Although we cannot complete prevent such issues from occurring, proper training programs will help to mitigate these issues. For the rest that slip by, such as accidental deletion of key site files and folders, we mitigate this risk by performing full back-ups and can restore almost any amount of data within a short period of