How could changes to authorization-authentication

Assignment Help Basic Computer Science
Reference no: EM132400378

A few weeks ago, a nearby hospital, which is very similar in operations and scale to Auburn Regional, was the target of a ransomware attack.

You have kept a close eye on this event. You decide to complete a review of current material available regarding ransomware attacks and especially ransomware and hospital enterprise systems.

Develop a 1- to 2-page chart. Your chart should have four columns for Authorization, Authentication, Roles, and Mitigation, as well as three columns for Small, Medium, and Large businesses. The chart should compare four attributes that are critical in enterprise systems today. Populate and extrapolate what steps can be taken to mitigate threats for small, medium, and large hospital enterprise systems.

Based on your chart, provide a final recommendation on how the hospital can respond to the threat. Summarize your chart findings, provide your recommendation, and answer the following questions in a brief, 2- to 3-page executive summary to the Auburn Regional management team:

How could changes to authorization, authentication, and roles help mitigate and deal with these systems threats?

How do you verify people and security levels?

How will your recommendations alleviate the threat?

Include the chart in your executive summary.

Reference no: EM132400378

Questions Cloud

What would be the most appropriate instrument : What would be the most appropriate instrument in personality assessment for evaluating the primary presenting problem? What are the strengths regarding what.
Identify a product based on-premise : Identify a product based on-premise and recommend a cloud-based solution. Research three cloud providers and determine one to migrate/transition.
BECO107 Business Economics Assignment Problem : BECO107 Business Economics Assignment Help and Solution - Kent Institute, Australia. Assessment - Group Oral Presentation and Group Report
Difference between pirated software and counterfeit software : What are ethics and why are they important to a company? Discuss in scholarly detail the difference between pirated software and counterfeit software?
How could changes to authorization-authentication : How could changes to authorization, authentication, and roles help mitigate and deal with these systems threats? How do you verify people and security levels?
Calculate the takt time in minutes for the table assembly : Calculate the Takt time in minutes for the table assembly process and Calculate the total lead time and total processing time in days, hours and minutes
What are concerns and challenges of organization : What are the concerns and challenges of an organization you select to meeting regulatory ERM requirements?
Discuss the connection of schema theory : Discuss the connection of schema theory and artificial intelligence. Does the theory still have a relevant role in current AI work?
Determine which skill was most challenging : Group process is the focus of group facilitation skills. A group counselor supports the group development by attending to the process of what is happening.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Strengths and weakness at uncovering the real price

There are many types of auctions each with strengths and weakness at uncovering the real price/value of an item. Compare and contrast

  Compare the strategy with evaluating a gaussian kernel

One way to obtain a Gaussian kernel is to convolve a constant kernel with itself, many times. Compare this strategy with evaluating a Gaussian kernel.

  What kind of chi-square test would be appropriate

Recently, there's been some concern that perhaps the number of large hurricanes has been increasing. The natural null hypothesis would be that the frequency of such hurricanes has remained constant.

  Business intelligence is the set of strategies

Business Intelligence is the set of strategies, technologies, software, processes, and data used to support the collection, analysis, and dissemination

  This thesis artefact is flexible

This thesis artefact is flexible in a sense that helper can use any other sort of tools to accomplish the task as long as it matches with the aim but please, let me know how he/ she going to do it.

  Explain the purpose of the sequence

Explain the purpose of the sequence, selection, and repetition structures.

  Charitable donation since the selling price

A firm has fully depreciated its network server, but a buyer is willing to pay $5,000 for it. If the firm sells the depreciated server, which of the following consequences is MOST accurate?

  Java console and outputs the number of characters

Write a program that reads two words representing passwords from the Java console and outputs the number of characters in the smaller of the two. For example, if the two words are open and sesame, then the output should be 4, the length of the sho..

  What is meant by intangible costs

What are non-financial costs when considering capital budget for an investment proposal. Explain with an examples or experience?

  Provide a site map of your e-commerce website

Provide a site map of your e-commerce website in the form of a tree diagram that shows hierarchical structure of your e-commerce website

  Specializes in complex engineering consulting projects

Pat's Engineering Works is a small company that specializes in complex engineering consulting projects.

  Explain the means of investigating trademark

Discuss and explain the means of investigating trademark and copyright infringement, sexual harassment incidents, and child pornography and laws concerning those incidents.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd