Creating threat model

Assignment Help Basic Computer Science
Reference no: EM132691794

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week's readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

User authentication and credentials with third-party applications

3 common security risks with ratings: low, medium or high

Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Reference no: EM132691794

Questions Cloud

Security Architecture and Design : what kinds of protections might a customer expect from other customers when accessing reputations?
How do advance capitalist society : How do advance capitalist society such as the U.S. obscure the fact that power is rooted in the control of coercive force and in the control of the means
What the factory overhead allocated per unit of dinks is : What the factory overhead allocated per unit of Dinks is? Ramapo Company uses a single plantwide overhead rate to apply all factory overhead costs
The role of privacy in the workplace : What are the laws and regulations that impact privacy in the workplace? What benefits / drawbacks are associated with monitoring employees?
Creating threat model : A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model.
Compare two job positions from the episode : Go to YouTube and search for a full episode of "Undercover Boss." Imagine you are the CEO of the company in the selected episode.
Application of quantitative techniques in business : Application of Quantitative techniques in business and economics - part of the project which contains the actual work done during the project.
How you would address repatriation of expatriate employees : Explain, in one or two paragraphs, how you would address the repatriation of expatriate employees when they may not have a job opportunity.
How is character defined in the sport ethics literature : How is character defined in the sport ethics literature? In what ways does sports participation build character? (prior to your response, read literature)

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the probability of a value from a normal

What is the probability of a value from a normal distribution being between 0.75 standard deviations above the mean and 1.75 standard deviations below the mean?

  Explain certain features of visualization

According to Kirk (2016), viewers need some assistance consuming visualizations. Annotations can be used to help explain certain features of a visualization

  Advantages and disadvantages of type of testing

Discuss the advantages and disadvantages of each type of testing. When is each type of testing appropriate?

  Explain functionality of multiprogrammed system in user mode

In multiprogrammed system, must this functionality be available in user mode or only accessible by system call? Why or why not?

  Chocolate candy retail business in local town

Consider the problem of opening your own chocolate candy retail business in your local town. In order to do this, you need estimates on the amount of chocolate.

  Expected return-beta relationship from the capm

1) What is the economic/intuitive justification for the expected return-beta relationship from the CAPM

  Android program for a rock paper spear scissors game

Android program for a rock paper spear scissors game - Incorporate a scoreboard such as player wins vs opponent wins

  Dell environmental sustainability

Explain how Dell's strategies fulfill customer needs in a superior fashion while simultaneously sustaining competitive advantage?

  Jeffreys company from its comparative balance sheet

The following selected information is available for Jeffreys Company from its comparative balance sheet. Compute the cash received from the sale.

  Discusses situational awareness

This Discussion Board Assignment discusses situational awareness. Much of the security efforts of the past have been centered around prevention and protection.

  What are baseline security requirements

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure,

  Web designers have moved away from doing the coding in html5

Could you elaborate what exactly you meant about web designers moving away from doing the coding in HTML5?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd