Mitigate and deal with these systems threats

Assignment Help Basic Computer Science
Reference no: EM132608816

A few weeks ago, a nearby hospital, which is very similar in operations and scale to Auburn Regional, was the target of a ransomware attack. You have kept a close eye on this event. You decide to complete a review of current material available regarding ransomware attacks and especially ransomware and hospital enterprise systems.

Your chart should have four columns for Authorization, Authentication, Roles, and Mitigation, as well as three columns for Small, Medium, and Large businesses. The chart should compare four attributes that are critical in enterprise systems today. Populate and extrapolate what steps can be taken to mitigate threats for small, medium, and large hospital enterprise systems.

Based on your chart, provide a final recommendation on how the hospital can respond to the threat.

1. How could changes to authorization, authentication, and roles help mitigate and deal with these systems threats?

2. How do you verify people and security levels?

3. How will your recommendations alleviate the threat?

Reference no: EM132608816

Questions Cloud

Calculate the net present value : The department you manage would like to buy a piece of equipment for $20,000 with projected cash flows of $4,500. Calculate the net present value
Why do we use ebit and not net income for roic : Why do we use EBIT and not Net Income for ROIC?
Estimate the mixed measurement model of accounting : Deegan refers to the 'mixed measurement model of accounting, where in no one basis of measurement, evaluate the mixed measurement model of accounting
Find the purchase price of the issue on september : The directors of a company authorized the issuance of Ksh30,000,000/= of serial bonds on September, 1993
Mitigate and deal with these systems threats : How could changes to authorization, authentication, and roles help mitigate and deal with these systems threats?
How much more or less money would you have : How much more or less money would you have to invest today to have $10,000 in 3 years at 6.30% compounded monthly instead of 6.46%
What is the DFN : A/P is expected to be 10% of sales and proforma income is expected to be 20 million. The firm has 15 million in equity and 12 million in debt. What is the DFN?
Web-based decision support systems : you will go about planning for your hypothetical retirement using web-based decision support systems (DSS) for financial planning and decision making.
What is weighted average after tax cost of long term debt : If a company has a capital structure of $5 million common stock, What is the Weighted Average after tax Cost of long term debt?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Show that among any group of positive integer

Let d be a positive integer.  Show that among any group of d+ 1 (not essentially consecutive) positive integer there are at least two with the similar reminder when they are divided by d.

  Current user home folder

Write a command that will find all filenames that begin with file in the current user's home folder, and ask the user to display the contents to the screen.

  System for rapidly developing software

Extreme Programming is a system for rapidly developing software. One of the tenets of XP is that all code is written by two

  Impact on usability for end users

Please list and define these in your own words and share your thoughts about when to use each encryption type and the impact on usability for end users.

  Command line and graphical user interface

What are the differences between the command line and graphical user interface?

  Application depicting a chosen cpu

Could you help me present at least one diagram built in Visio, PowerPoint, or similar application depicting a chosen CPU or memory architecture for a system?

  Why is it vulnerable to being hacked

Where do you see technology leading us in terms of the future? Why is it vulnerable to being hacked (explain the weakness).

  How stations access the medium in ieee

Describe the main difference between how stations access the medium in IEEE 802.11 in ad hoc mode and in a Bluetooth piconet.

  What is meant by a principal-agent problem

Explain, giving a relevant example, what is meant by a principal-agent problem. Be sure to address each of the following:

  About IT strategy and investment

Identify at least two learning objectives from course syllabus that document relates to. You will find that this article is about IT strategy and investment.

  Deriv the state and state diagram of the circuit

A sequential circuit has two jk flip flos p6-11 one input x and one output y the logic diagram of the circuit is shown in fig p6 -11 deriv the state and state diagram of the circuit

  Technology and job design

Advancements in technology have certainly made our lives easier over the last twenty years. They've also changed the nature of how many of us do our jobs. A great example is right here in this course...professors can teach from home!

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd