Brute force user id and password attacks

Assignment Help Management Information Sys
Reference no: EM131658222

Remote Access Security Policy

Organization: XYZ Health Care Provider:

XYZ Health Care is a provider of health services to senior citizens. It performs its mission with a virtual force of Registered Nurses and Nurse Practitioners.

The nurses visit their elderly patients in their homes and monitor their health. At the end of the day, the nurses are required to connect back to corporate networks and upload all of the patient records for the day.

Keep in mind that this organization is subjected to HIPAA rules and its required to make the data available to its patients and authorized patient representatives within 48 hours.

Some of the RISKS:

• Brute force user ID and password attacks

• Users or employees unaware of the risks, threats, and dangers of the Internet and shard WI-FI or broadband Internet Access

• Multiple Access attempts and logon retries

• Unauthorized access to IT Systems, applications, and data

• Privacy data or confidential data is compromised remotely

• Data leakage occurs in violation of data classification standard

• A remote worker's laptop is stolen

• A remote worker requires access to the patient medical records system through the Public Internet

Scope: Control Identification and Creation of a Remote Access Policy

Using or textbooks, internet and other resources, identify the necessary components / sections within a security policy and then craft the actual policy for XYZ Healthcare and address the risks within policy that are prevalent with Remote Access.

Your submission must include the following:

1) Control Matrix: A listing of the risk and 1 or more countermeasure to address the risk.

2) A Section that identifies the necessary components of the policy and why they are important: This does not refer to the controls but more specifically sections within the policy. (You may research the Internet or SANS for sample policies, the sections were also discussed in class).

3) The actual policy, when developing the policy please ensure that it can be used at XYZ Healthcare.

Paper Requirements

1) APA Format (Where applicable)

2) Minimum of 3 - 5 references

3) Safe - Assignment comparison will be done

Reference no: EM131658222

Questions Cloud

Evaluate court use of the rules of statutory construction : What was Adams's primary complaint against Circuit City in the state court, and how did the case end up in the federal court system?
Give a brief background on the organism : Overview of organisms or event or other microbiology related concept: Give a brief background on the organism
Determining the organizational culture : Every company no matter how big or small has an organizational culture. Please post about someplace you have worked and what their organizational culture.
Becoming an effective programmer : Research is key when becoming an effective programmer. Locate a useful resource on the web for programming in Python
Brute force user id and password attacks : Users or employees unaware of the risks, threats, and dangers of the Internet and shard WI-FI or broadband Internet Access.
Demonstrate the presence of the drive in a positive manner : What are some examples of quality and access of high performance systems and apply them a hospital that would demonstrate the presence of the drive
Discuss about the jurisdiction in cyberspace : What standard would a court apply to determine whether it has jurisdiction over the out-of-state computer firm in the video?
Bayside memorial hospital operate : Could a medical facility such as Bayside Memorial Hospital operate without roaming profiles, and if how would it impact user accessibility?
Why would homogenized liver be used in the media : Why would homogenized liver be used in the media? What could be the result if liver is not used? d. Is this assay used before or after animal testing

Reviews

Write a Review

Management Information Sys Questions & Answers

  How selected components can add value to the organization

Discuss the EA component(s) presented as part of the case study: integration of IT good and services, the governance of IT good and services, securing the enterprise, IT strategy, ITIL, BYOB. For example your case study may include a discussion o..

  An automated ticket-issuing system

You have been asked to develop UML diagrams to graphically depict and describe the architecture of two (2) unrelated software systems. An automated ticket-issuing system used by passengers at a railway station

  Important information about decision support system

Important information about Decision Support System - Explain Provide a decision support system (DSS) function which would be applicable to the automotive manufacturing industry.

  What are the competitive advantages built

What are the competitive advantages built into the you? Imagine you are producing/developing yourself as product, link it to you core competencies:

  Creating the infrastructure to take the photographs in-house

The pros and cons of outsourcing the photography to a professional photographer. The pros and cons of creating the infrastructure to take the photographs in-house

  Analyze the use of gestures in ipads

Analyze the use of gestures in iPads. Address how users feel about gestures. Evaluate how users feel about the user input when it comes to filling out complicated forms on the iPad. Assess the usability of back buttons and thumbnails on the iPad

  How have you interacted with user-generated content

How have you interacted with user-generated content? What are the benefits and problems of publicizing any business using only social media?

  Analyze three specific potential malicious attacks

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the org..

  Summarize how you would troubleshoot

Suppose you receive a phone call from a client in Sales who cannot print a report on a printer in the Research and Development department. The report is from a database created on a server located at headquarters. The client tells you that other m..

  Performing an environmental scan and evaluating business

performing an environmental scan and evaluating business and technologywhat are the most important factors to consider

  What are the flaws of such an ethic

Develop an example of a universal maxim that we as citizens in a democratic republic ought to see realized in our own country. Choose something that is not already established in the Constitution such as free speech, freedom to worship, or freedom..

  Describe the technology required to use these tools

Write a paper explaining the business uses of cloud computing and Web 2.0. Be sure to address the following in your assignment: Describe the technology required to use these tools

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd