Design information security controls for securing the assets

Assignment Help Computer Network Security
Reference no: EM132501370 , Length: 2 pages

GetWell - Scenario (Background info.)

GetWell is a North American healthcare services company. They sell medical equipment and data analytics services to health and hospital systems.

GetWell:
has remote employees that carry laptops with sensitive PHI information. These remote employees primarily perform initial set up of the GetWell tablets that are installed at their Client (hospitals) locations, and integrate with the Client's IT infrastructure using Wi-Fi.

employees use Microsoft's Software As a Service (SaaS) for office productivity applications such as email, Office, SharePoint, OneDrive. Employees access these services using their workstations from anywhere in North America.

data center has a mix of infrastructure (network, server) that houses 20 million PHI, PII, and credit card records.

products operate in hospitals across the US and Canada in the form of tablets. The tablets communicate with GetWell's data center, and transmit sensitive PHI, PII, and credit card data.

medical devices are surgically implanted in Patients who have heart disease. The medical devices have Wi-Fi connectivity, and send status updates and receive configurations through Wi-Fi from GetWell's data center.
earns $200M annual revenue, serves over 20 million patients

operates in a highly regulated environment, with PCI DSS and HIPAA being key private and federal regulations

Interacts with their Clients through custom developed web sites and web services that allow Clients to view, update, and download Patient information. Each Client user has an account on GetWell's Client Portal website and can view Patient PII, PHI, and cardholder data.

Interacts with their custom-developed tablet devices and medical devices through custom developed web sites and web services

Interacts with Patients through custom developed web sites and email. Patients have an account on GetWell's website where they can see lots of data on their medical condition and how their medical device is operating.

Project Deliverables

Design Information Security controls for securing the assets of Getwell. For each control recommended, there should be an explanation on
The asset at stake
Threats against which protection is needed
Risk of not implementing a control

PowerPoint presentation - 4 slides
Write-up for 2 pages

Attachment:- Project.rar

Reference no: EM132501370

Questions Cloud

BPF2213 Introduction to Finance Assignment : BPF2213 Introduction to Finance Assignment help and Solution, Muscat College - Assessment Writing Service - Analysis of Firm's market standings
Comprehensive health history assessment : Identify the foundations of health assessment - Identify the pertinent information for that client and his assignment is a comprehensive health history
Identify the foundations of health assessment : Identify the foundations of health assessment - Learning to make purposeful observations is an essential skill for a nurse - descriptive documentation
Framework compliance assessment report : Define and apply the NIST Cybersecurity Framework functional areas, implementation tiers, and profiles - Framework Compliance Assessment Report
Design information security controls for securing the assets : Design Information Security controls for securing the assets of Getwell. For each control recommended, there should be an explanation on The asset at stake
Write literature review heat transfer in impinging jets : write literature review heat transfer in impinging jets - vortex dynamics and its influence on both mechanisms. This very critical must be written by mechanical
Factors affecting knowledge sharing in organizational : Investigation of the factors contributing towards the Knowledge Sharing performance of digital transformation toward Cybersecurity Management Strategy
Psychology of elderly assignment : Psychology of elderly Assignment Major challenges impact on their ability to engage in everyday tasks. The assignment about Later Life And Aging
What is the equilibrium interest rate : Suppose that money demand is given by Md = aY(0.25 - i) where aY is a100. Also, suppose that the supply of money is a20.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd