Summarize the concepts of the threat triad

Assignment Help Computer Network Security
Reference no: EM131797633

Course Textbook(s) : Kim, D., & Solomon, M. G. (2018). Fundamentals of information systems security (3rd ed.). Burlington, MA: Jones & Bartlett Learning.

Unit : PowerPoint Presentation

Consider the following scenario:

You are a security specialist and have been asked to provide a presentation to the CSU Medical Center.

Your audience consists of medical receptionists, doctors, and finance personnel.

Summarize the concepts of the threat triad and C-I-A triad on how patient information is handled by the different jobs within the medical facility.

Hint: Does the receptionist need billing information, or the finance department need patient prognosis, or do doctors need patient addresses? Explain who needs what information and how C-I-A helps protect that information.

Your completed PowerPoint presentation should be 8 to 10 slides in length. This does not include your title and reference slides.

Use bullet points for your text, add additional information in your notes section of the slides, and include a minimum of four graphics or pictures.

Include at least two sources in your assignment.

All sources used must be referenced; paraphrased and quoted material must have accompanying citations and be cited per APA guidelines.

Make sure you format your presentation according to APA style.

Reference no: EM131797633

Questions Cloud

What is your estmated present value of your lifetime pension : What is your estmated present value of your lifetime pension annuity in today's dollars
What was the motivation for the federal securities acts : What was the motivation for the Federal Securities Acts of 1933 and 1934? What was the rationale for the Williams Act?
Explain the new threat of ransomware to the organization : The security manager of your organization has approached you to explain the new threat of ransomware to the organization.
Identify the main challenges of developing new organization : Identify the main challenges of developing a new organization for the combined businesses. How would you attempt to resolve these challenges? Be specific.
Summarize the concepts of the threat triad : Summarize the concepts of the threat triad and C-I-A triad on how patient information is handled by the different jobs within the medical facility.
Determine the number of common shares outstanding : Determine the weighted average number of shares outstanding for computing the current earnings per share
What is the corporations tax basis in the property received : The corporation assumed a liability of $100 on the property transferred. What is the corporation's tax basis in the property received in the exchange?
What was the rationale for the williams act : How do you believe the Sarbanes-Oxley Act will impact the number of initial public offerings and the number of firms converting from public to private status?
Prepare an analysis based on the data presented : Prepare an analysis based on the data presented that will show which product or products Sportway, Inc., should purchase in order to maximize the profitability.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Security issues in integrated networking infrastructure

You are to select any one scenario for your report in consultation with your tutor. Your report on the scenario should be between 3500 and 3800 words. The emphasis of the report should be related to computer systems security.

  Describe two of advantages associated with using types cable

Describe one or two of the advantages and/or disadvantages associated with using each cable type for a business's network infrastructure.

  Research paper on the privacy and on financial services

You need to work on the privacy and on financial services. For example Mint, Its an app also online access to keep track of your financial use in a month.

  What are service level agreements

What are Service Level Agreements (SLAs) and why are they a critical component of any IT Outsourcing agreements?

  What is the impact of not having diagrams that describe the

What is the impact of not having diagrams that describe the program?

  Threats to wireless networks and countermeasures

ITC595 - Discuss how your own posts contributed to this knowledge and discuss whether or not the summary presented by your peers is accurate

  Amount of information before launching the attack

Attackers need a certain amount of information before launching their attack. One common place to find information that could be useful to the attacker is to go through the trash of the target. The process of going through a target's trash is know..

  Describe the security features available on a platform

Describe the security features available on a platform of your choice (for example, Linux/Android/Mac OS X/Windows/Apache/Java/Perl), to mitigate a specific type of attack (for example, adware/malware/SQL injection/spoofing/tampering).

  Critically evaluate information security requirements

Information Security Management (COMP 0400) Critically evaluate Information Security requirements- Analyse risk management process.

  What is the mutual information of the source and receiver

A source X sends 0's and 1's with probabilities π and 1-π, respectively, to a receiver Y. - What is the mutual information of the source and receiver?

  How many packets fit on the cable from earth to the moon

How many packets fit on the cable from Earth to the Moon? How large must the window be to enable the sender to transmit packets continuously?

  Assignment on regulatory requirements and standards

Regulatory Requirements and Standards - The graduate ensures alignment of regulatory requirements and standards with appropriate information security and assurance controls for organizations that process or hold privacy, financial, or medical info..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd