Threat modeling

Assignment Help Basic Computer Science
Reference no: EM132626811

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week's readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

User authentication and credentials with third-party applications

3 common security risks with ratings: low, medium or high

Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Reference no: EM132626811

Questions Cloud

History of the data encryption standard : Evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES.
Discuss some of the challenges faced in its implementation : Discuss some of the challenges faced in its implementation. Suggest ways to overcome such challenges to achieve successful outcomes.
Manage risk within organizations and enterprises : Discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises.
Security architecture and design : Since we know that this particular instance of the AppMaker implements a customer-facing store that processes financial transactions,
Threat modeling : A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating threat model.
Information governance and legal functions : Information Governance and Legal Functions: According to the authors, Smallwood, Kahn, and Murphy, IG is perhaps one of the functional areas
Procedures for implementing access control change : Create a guide that security personnel will use that includes procedures for implementing an access control change.
Change organization culture relating to security : Give an example of what may lead management to implement policies to change an organization culture relating to security?
Calculate the capital balances upon formation : Malou is to invest cash of P100,000, Partners agree to share profits equally. Calculate the capital balances upon formation

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Discuss the technological changes

Discuss the technological changes that have been made since 2017 and how those changes have affected humanity,

  What is the impact on the efficiency of the operations

What is the impact on the efficiency of the operations enqueue and dequeue if we were to maintain the queue's front at the beginning of the list and the queue's back at the list's end?

  Submit a screenshot showing the solved problem

Python Programming Help: Please help problems, in Python. Submit a screenshot showing the solved problem, for each of the below.

  What is the purpose of the checkcapacity method

What is the purpose of the checkCapacity method? Where is it called in the list class? Describe a way that the client can utilize an ArrayIntList that will be caught by checkCapacity.

  Concept of whistleblowing as tattling

Why is it important not to view the concept of "whistleblowing" as "tattling" or "ratting" on another employee?

  Widgets and widgets are substitutes or complements

How would I determine whether widgets are a normal or inferior good, and whether widgets and widgets are substitutes or complements?

  What is the real deficit or surplus

Inflation is 20 percent. Debt is $2 trillion. The nominal deficit is $300 billion. What is the real deficit or surplus?

  Interval estimate for the mean head circumference

Report an appropriate 90% confidence interval estimate for the mean head circumference of all STA 2122 students, write out the full procedure taught

  Design and implement a new interaction

Designing Human-Computer Interaction (6389.6) - University of Canberra - Design and Implement a New Interaction to be completed in Stages

  Securing cloud computing

What techniques are recommended for securing cloud computing? Do you agree with these recommended techniques? Why or why not?

  About three different views of simulation quality

Discusses methods to assess the quality of simulations. You learned about three different views of simulation quality.

  What are the main challenges of text analysis

What are the main challenges of text analysis? What methods can be used for sentiment analysis? What is a corpus?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd