Mitigation plan for health network

Assignment Help Basic Computer Science
Reference no: EM132394116

Overview

• Write paper in sections

• Understand the company

• Find similar situations

• Research and apply possible solutions

• Research and find other issues

About company: Health Network Inc

• You are an Information Technology (IT) intern

• Health Network Inc.

• Headquartered in Minneapolis, Minnesota

• Two other locations

• Portland Oregon

• Arlington Virginia

• Over 600 employees

• $500 million USD annual revenue

Data Centers

• Each location is near a data center

• Managed by a third-party vendor

• Production centers located at the data centers

Health Networks's Three Products

HNetExchange

• Handles secure electronic medical messages between

• Large customers such as hospitals and

• Small customers such as clinics

HNetPay

• Web Portal to support secure payments

• Accepts various payment methods

HNetConnect

• Allows customers to find Doctors

• Contains profiles of doctors, clinics and patients

Health Network IT Network:

• Three corporate data centers

• Over 1000 data severs

• 650 corporate laptops

• Other mobile devices

Management Request

• Current risk assessment outdated

• Your assignment is to create a new one

• Additional threats may be found during re-evaluation

• No budget has been set on the project

Threats Identified:

• Loss of company data due to hardware being removed from production systems

• Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops

• Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and so on

• Internet threats due to company products being accessible on the Internet

• Insider threats

• Changes in regulatory landscape that may impact operations

Part 1:

• Conduct a risk assessment based on the information from this presentation

• Write a 5-page paper properly APA formatted

Your paper should include

The Scope of the risk assessment i.e. assets, people, processes, and technologies

Tools used to conduct the risk assessment

Risk assessment findings

Business Impact Analysis

Part 2:

• You will add to your findings from part 1 and address with a risk mitigation plan.

• The plan should include

• The plans to reduce risk and vulnerabilities

• Determine if organization is risk averse or risk tolerant

• Future plans to reduce residual risks

• The requirements for this half is also 5 pages properly APA formatted.

Attachment:- Risk Assessment Plan.rar

Reference no: EM132394116

Questions Cloud

Write a python script which counts the number of darts : Write a Python script which counts the number of darts which land in each of these regions: 2, 4, 6, 9, 10. Note, do not sum these.
Describe the cultural event in which you participated : Describe the cultural event in which you participated. Explain how this experience influenced your perceptions of diversity and difference.
Implementing new interorganizational system : You are a member of the Human Resource Department of a medium-sized organization that is implementing a new interorganizational system
Which ethical and other factors are relevant to decisions : Ethical questions and issues arise at both the level of setting laws and policies and the level of deciding what to do where, those are indeterminate.
Mitigation plan for health network : Mitigation Plan For A Health Network Inc. Handles secure electronic medical messages between. Current risk assessment outdated
What role can we play in assuring the best outcomes : How might potential reactions to an adolescent's questioning of their sexual identity, or gender role, impact their social environment, behavior and self-esteem
Distribution of students by the academic class : The following table summarizes the distribution of students by the academic class and if they live at home or not.
Explain the challenges faced by the clients : Explain the challenges faced by the client(s)-for example, drug addiction, lack of basic needs, victim of abuse, new school environment, etc.
Explain and support database schema with relevant arguments : Explain and support the database schema with relevant arguments that support the rationale for the structure.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd