Creating threat model

Assignment Help Basic Computer Science
Reference no: EM132696235

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

User authentication and credentials with third-party applications

3 common security risks with ratings: low, medium or high

Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Reference no: EM132696235

Questions Cloud

Discuss the security concerns highlighted by server sprawl : Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or can you think of additional benefits.
What is the balance in the finished goods inventory : What is the balance in the Finished Goods Inventory account at the end of the month? What does this balance consist of
Value of a 12-month american put option : A stock price is currently $48. Over each of the next two six-month periods it is expected to go up by 7% or down by 6%. The risk-free interest rate is 8% per a
How much should deposit at the beginning of each year : Lourdes Meléndez wants to save $500,000 in 25 years. Its mutual fund yields 11% per annum. How much should you deposit at the beginning of each year?
Creating threat model : The CEO is somewhat technical and has tasked you with creating a threat model
Explain the common uses of estimating : Explain the 4 common uses of Estimating and under what circumstances is it best applied.
Describes the topic and target cultural population : You will develop an educational health promotion project addressing the population/culture in your area. It should include: Introduction establishes the purpose
Which the two reports that loan officer : You are applying for a business loan. The two reports that your loan officer is most likely to require are? Transaction Detail Report and Accrual Basis Report
Determine the amount of goodwill : Determine the amount of goodwill (or bargain purchase) arising out of the acquisition if the purchase consideration paid was $1,000,000 cash

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How policies defined in one place can take precedence

Include information about how policies defined in one place can take precedence over policies defined elsewhere.

  Perfect competition better characterizes markets in general

If there is monopoly power in agriculture, do you think monopoly or perfect competition better characterizes markets in general?

  Create a linear model to find the value of the bad model

Bad model? A student who has created a linear model is disappointed to find that her value is a very low 13%.

  Impact of false discovery to decision making

Impact Of False Discovery To Decision Making?

  Find the average of three exam scores

Modify the convert.py program (Section 2.2) with a loop so that it executes 5 times before quitting (i.e., it converts 5 temperatures in a row).

  Use jsp to display current date & time

Fail authentication page will ask user to create the new account if the user does not have an account on the system.

  Describe the differences and changes

Since the early 1980's the Internet has become a part of our daily lives. Those born after 1980 probably cannot imagine a life without the internet.

  How would you inform an official that they are being denied

How do you determine which personnel should have access to the IT infrastructure? Should a CEO automatically have access? Should a CIO?

  Google could face in implementing this technology

1) A description of the technology, 2) Challenges that Google could face in implementing this technology,

  Design of the logic circuit

Kyle, Patrick, Jorge and Steven are hungry college students. They want a quicker way to decide where to go for lunch, the Marshall Center or Juniper. The majority wins, except when Jorge and Steven both agree, then they win. Any other ties end wit..

  Why do employers operate disability management programs

How does the employer's motivation to operate disability management programs impact the design of disability management programs?

  Effective measure of living standards

1. What economic factors are taken into account when measuring GDP? 2. What makes GDP an effective measure of living standards? 3. How might quality-of-life measures be determined and measured?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd