Responding to threats

Assignment Help Basic Computer Science
Reference no: EM132548195

A few weeks ago, a nearby hospital, which is very similar in operations and scale to Auburn Regional, was the target of a ransomware attack. You have kept a close eye on this event. You decide to complete a review of current material available regarding ransomware attacks and especially ransomware and hospital enterprise systems.

Develop a 1- to 2-page chart. Your chart should have four columns for Authorization, Authentication, Roles, and Mitigation, as well as three columns for Small, Medium, and Large businesses. The chart should compare four attributes that are critical in enterprise systems today. Populate and extrapolate what steps can be taken to mitigate threats for small, medium, and large hospital enterprise systems.

Based on your chart, provide a final recommendation on how the hospital can respond to the threat. Summarize your chart findings, provide your recommendation, and answer the following questions in a brief, 2- to 3-page executive summary to the Auburn Regional management team:

1. How could changes to authorization, authentication, and roles help mitigate and deal with these systems threats?

2. How do you verify people and security levels?

3. How will your recommendations alleviate the threat?

Reference no: EM132548195

Questions Cloud

Create two equal annual dividend payments : What will your dividend income be this year if yuo use homemade dividends to create two equal annual dividend payments?
Describe hypothetical situation : Describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner to promote a product or service.
What will the ex-dividend price be : Company A sells for $71.5 per share, and the stock is about to go ex-dividend. What will the ex-dividend price be?
List potable water sources : List potable water sources, identify and discuss hazards that may be found in water and aquatic environments, and state how water is made safe
Responding to threats : How could changes to authorization, authentication, and roles help mitigate and deal with these systems threats?
What skills do you feel you developed most in the course : You did it! You've reached the end of this course. In doing so, you've developed your skills in organizational behavior and leadership. Take what you have.
What is the annualised net present value : One of the projects has an NPV of $267502 and a useful life of 3 years. If the firm's cost of capital is 9.6% what is the annualised net present value?
What health care technology is involved in the situation : What moral guidelines for using that kind of healthcare technology should be used there? Develop such guidelines also using utilitarianism, Kantian deontology
Discuss benefits of virtualization software : Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Adaptive project framework project

Define the metrics you would put in place as early warning signs that an Adaptive Project Framework (APF) project is heading for a distressed condition

  Relationship between blocks and sectors

The disk is not "zoned." What is the total capacity of this disk? Show your work. (Hint: what is the relationship between blocks and sectors?

  Applications she utilized before a shutdown

These were the last applications she utilized before a shutdown These applications are pinned to the task bar

  Integer parameter and returns the total

Create a function called sumTo which takes an integer parameter and returns the total of all of the numbers from 1 to that number.

  Three sentences citing specific reasons

Your paragraphs should have an opening statement followed by three sentences citing specific reasons. 1. Do you agree or disagree with changing laws to hold the company where the data theft occurred accountable?

  Calculate the average heat transfer coefficient

A horizontal, 2.5-cm-OD tube is maintained at a temperature of 27°C on its outer surface. Calculate the average heat transfer coefficient if saturated steam at 12 kPa is condensing on this tube

  What is the benefit to the consumer

What are two ways that recommendation engines are being used on the Web today and what is the benefit to the consumer?

  How many transistors are used in a 2-input cmos nano gate

(Hobbyists only.) Draw an equivalent circuit for a CMOS NANO gate using two single-pole, double-throw relays.

  What is the free trade price to two decimal places

Suppose Qd=-41*P+941, Qs=35*P+17 for home and Qd*=-41*P+428, Qs*=35*P+40 for foreign. What is the free trade price to two decimal places?

  Tolerance for risk and your expectation for profits

As a start-up business manager, what is your tolerance for risk and your expectation for profits? Explain.

  Compute the resulting sum bits of the 2-bit adder

(Hint: Which has the worst delay in terms of gates to pass through between the inputs and the final outputs, and how many gates is this?)

  Network devices and software programs

There are many network devices and software programs that an organization can use to protect its network.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd