Creating threat model

Assignment Help Basic Computer Science
Reference no: EM133044128

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week's readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

User authentication and credentials with third-party applications

3 common security risks with ratings: low, medium or high

Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Reference no: EM133044128

Questions Cloud

Determine the pattern for raising additional finance : Cost of debt up to Rs. 1,80,000 - 10% before tax beyond Rs 1,80,000-16% before tax. Determine the pattern for raising additional finance
How much did you spend in renovating the house : You also find that renovation added $75,000 value to your house. How much did you spend in renovating the house
Redesign of business processes : If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign
Mobile digital devices such as iphones and ipads : What kinds of businesses are most likely to benefit from equipping their employees with mobile digital devices such as iPhones and iPads?
Creating threat model : A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model.
About system include interviews-questionnaires-observation : Determination, the traditional sources of information about a system include interviews, questionnaires, observation, and procedures
Traditional machine-learning methods : What is deep learning? What can deep learning do that traditional machine-learning methods cannot?
Collaborative learning community : Describe how value is created for each stakeholder group. Determine how the communication types and styles described will lead to success.
Study the zachman framework for enterprise data : Study the Zachman framework for enterprise data architecture and describe in specific terms how you would apply that framework to your case study.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Which one should be used for maximum fault tolerance

Common RAID configurations are levels 0, 1, 3, and 5. In your opinion, which configuration should be used when maximum access speed is required?

  Multidimensional databases different from relational

1. How are a data warehouse and a data mart related? 2. Why must data be "transformed" by the ETL process before loading them in the data warehouse? 3. How are multidimensional databases different from relational databases?

  Surrounding the development of health insurance

Discuss controversies surrounding the development of health insurance and the government's role in providing, financing

  Which rules are too far down the list and should be moved up

The firewall works correctly, but some simple changes to the rule base could improve its performance dramatically.

  Information security engineer for a videogame development

You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains:

  What can a spokesperson do to effectively communication

?What can a spokesperson do to effectively communication with the media and the public during a disaster? How can the spokesperson make things worse?

  What is the demand for money when the interest rate

Suppose that the household nominal income for an economy is $50, 000 billion and the demand for money in this economy is given by, Md =$Y(0.2 0.8i)

  Prove that mutual exclusion is enforced

If messages do not arrive in the order that they are sent, the algorithm does not guarantee that critical sections are executed in the order of their requests. Is starvation possible?

  Active directory server to manage users accounts

From the scenario above,you are charged with the task of pointing out the security threats that should be taken into consideration of the organization network and systems,write from 5 to 6 pages in length to Identify security threats.

  Prayer group reflection essay

Ministry requires discipline and ministers must grow in their spiritual lives through spiritual disciplines. Ministers must also know how to help those who are entrusted in their care to grow spiritually. Consider prayer group meeting on a weekly bas..

  Choice of receiving an insurance settlement

If given a choice of receiving an insurance settlement at $5,000 today or $6,500 in three years which to choose? The $5,000 that is received

  Average mileage for the four months

Sue drove her car 253 miles in January, 277 miles in February, and 280 miles in March. If her average mileage for the four months from January to April is to be at least 284 miles, how many miles must she drive in April?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd