Threat modeling

Assignment Help Basic Computer Science
Reference no: EM132797602

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week's readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

User authentication and credentials with third-party applications

3 common security risks with ratings: low, medium or high

Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Reference no: EM132797602

Questions Cloud

Adopting electronic health records : Research a minimum of five articles on the challenges faced by healthcare organizations and healthcare providers when adopting electronic health records.
Dollars and sense : consider the IT Payoff Clock. Think of an example of either an IT implementation in your job or find an example discussed in the news
Analyze asymmetric and symmetric encryption : Analyze asymmetric and symmetric encryption. Evaluate the differences between the two of them and which one that you would determine is the most secure.
Advantages and disadvantages of digital signatures : Analyze the advantages and disadvantages of digital signatures.
Threat modeling : You will research several threat models as it applies to the health care industry, summarize three models
Footprinting : Explain in your own words what "FOOTPRINTING" (or digital reconnaissance) is and how you would go about gathering the information
Unauthorized charge on your credit card : Explain the incident that occurred, and then list the steps you would follow to solve this case
Encouraged to report suspicious occurrences : Discuss what role end-users typically play in incident reporting? Should end users be encouraged to report suspicious occurrences?
Acute competition and alignment of providers : In this age of acute competition and alignment of providers, systems are evolving to improve contracting opportunities,

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Print a line containing that number of adjacent asterisks

(Bar Chart Printing Program) One interesting application of computers is drawing graphs and bar charts (sometimes called "histograms").

  Funds to support a risk mitigation plan

Senior management at Health Network allocated funds to support a risk mitigation plan, and have requested that the risk manager and team create a plan in response to the deliverables produced within the earlier phases of the project.

  Evaluate access features that enabled ken steward

Evaluate the ACCESS features that enabled Ken Steward to develop the daily product inspection database without programming experience or expertise.

  Blockchain with cryptocurrency bitcoin

The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain;

  For automatic objects

For automatic objects, constructors and destructors are called each time the objects

  Account that earns an annual nominal interest rate

If you deposit $500/MONTH into an account that earns an ANNUAL nominal interest rate of 9%, compounded monthly, how much money will you have in 15 years?

  Differences between russia and china

What are the key similarities and differences between Russia and China?

  Characteristic of a practical current source

Illustrate and explain the V-I characteristic of a practical current source. Comment on the equivalence between voltage source and current source.

  Pd4 this is for a company selling airline partsthis

this is for a company selling airline parts ltbrgt ltbrgtthis assignment consists of two 2 sections an infrastructure

  Summarize the type of site best suited

Given that an organization's resumption strategy for an exclusive-use site criteria includes the requirement for fully installed hardware and full.

  Compare and contrast qualitative data vs quantitative data

Quantitative data can be measured and documented with numbers. Discuss Qualitative Methodology. Compare and contrast qualitative data vs quantitative data.

  Create a class diagram with visual studio

The teachers as well as the students are people. Your task is to model the classes (in terms of OOP) along with their attributes and operations define the class hierarchy and create a class diagram with Visual Studio.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd