Creating threat model

Assignment Help Basic Computer Science
Reference no: EM132634300

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week's readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

User authentication and credentials with third-party applications

3 common security risks with ratings: low, medium or high

Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Reference no: EM132634300

Questions Cloud

Identify the boundary violation you have chosen : Identify the boundary violation you have chosen from the list on page 364 in the article "When Boundaries Are Broken: Inmate Perceptions of Correctional Staff".
Which just-in-time inventory management inventory strategy : Which Just-in-time inventory management (JIT) is an inventory strategy that focuses on? reducing waste and inefficiency. / performance measures
Pros and cons of that particular software : Write a review of one software and annotate the pros and cons of that particular software.
Explain the responsibilities of the strategic leaders : Explain the responsibilities of the strategic leaders with regard to staffing and organising and ensuring human capital
Creating threat model : The CEO is somewhat technical and has tasked you with creating a threat model.
Identify at least two potential cost drivers : Identify at least two potential cost drivers. Explain where you might obtain information about past volumes for each cost driver.
What business structure they might use to promote the tour : The options open to the different parties in what business structure they might use to promote the tour - The promoter is calling for a meeting
How has your construct been tested in the past : How has your construct been tested in the past? Include a focused review of the literature in this area, discussing information on specific measures.
Big data analytics in e-healthcare industry : There are several benefits as well as challenges associated with the use of Big Data Analytics in the e-Healthcare industry.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explain the significance of the security operation center

Explain the risk management process as it relates to protecting national infrastructure. Explain the significance of the Security Operation Center (SOC)

  Consider the order of operations

Consider the order of operations. Would -8^2 have the same result when simplified as (-8)^ 2? Why or why not?

  What is a user defined function named save plot

What is a user defined function named save_plot() to save to a .png file on disk using Jupyter?

  Benefits and drawbacks of each format for users

Examine the benefits and drawbacks of each format for users. Determine whether you agree or disagree that Blu-ray was the superior choice technologically over HD-DVD. Provide a rationale for your response.

  Suggest a test pattern to determine whether nodes h and i

Suggest a test pattern to determine whether nodes H and I in Figure 10.10 are bridged together. You should assume that a bridging fault may be modelled as a wired-OR; i.e. that if either wire is at logic 1, the other wire is also pulled to a logic..

  Main purpose of the risk management plan

1. What is the main purpose of the risk management plan? How should the document be constructed? 2. Defining project acititivies is key to project time management. What are the four types of dependencies, or relationships, that can occur among pro..

  Required return on all stocks would increase

1. The required return on all stocks would increase, but the increase would be greatest for stocks with betas of less than 1.0.

  Discussing several different models and archetypes

Discussing several different models and archetypes. Identify the Organizational Structure and provide examples supporting it.

  Friend in every countryin the world

Let the domain for x be the set of all students in this class and the domain for y be theset of all countries in the world. Let P(x, y) denote student x has visited country y andQ(x, y) denote student x has a friend in country y. Express each of t..

  Mean for gcc compiler in linux

What does the attribute "packed" and "aligned" mean for GCC compiler in Linux? How to use these two attributes? Please give example code segments.

  Creating system of prevention-recovery from potential threat

Business continuity planning (BCP) is the process involved in creating a system of prevention and recovery from potential threats to a company.

  Operation within reasonable parameters of the law

1. Explain your method of attack and operation within reasonable parameters of the law. 2. Discuss specific malware, social engineer, or any other type of attacks you would deploy to achieve your desired goals.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd