Threat modeling

Assignment Help Basic Computer Science
Reference no: EM132898651

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week's readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

User authentication and credentials with third-party applications

3 common security risks with ratings: low, medium or high

Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Reference no: EM132898651

Questions Cloud

What combination of frequency-severity : What combination of Frequency & Severity is this best used for large-deductible plans and self-insurance retention plans?
How much proposed relaxation of credit standard would result : The proposed relaxation of credit standards would result in an expected increase in the average accounts receivable balance of how much?
Introduction to management : With the introduction to management complete considering the illustration of IoT devices, infrastructure
Explain the handwriting on the wall message : Cheese is a metaphor for what we want in life. If we get the cheese we become attach. If we lose the cheese or it is taken away we will become traumatic.
Threat modeling : A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model
Supreme court determine whether material is obscene : What kind of speech was the First Amendment written to protect? How does the Supreme Court determine whether material is obscene?
Outline atleast 15 assumptions of fixed and variable cost : Outline atleast 15 assumptions of fixed and variable cost. What are ten weaknesses of these classifications?
Developing it solutions to solve business problems : What are some of the toughest management challenges in developing IT solutions to solve business problems and meet new business opportunities
Object of competition and consumer legislation : What is the object of competition and consumer legislation? What is covered by the legislation

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is one characteristic of high reliability organizations

What is one characteristic of high reliability organizations? Describe the potential risks of alert fatigue in EHR systems.

  Design issues relating to the use of color

You and your partner are starting a new B2C e-business that sells custom-designed educational toys. You want your Web site to have a light-colored background

  Describe why this benefit is true

Describe why this benefit is true.

  How long did it take to travel the first 150 miles

(a) How long did it take to travel the first 150 miles? _____ hours (b) Where was the car after 3 hours? ______miles from the start

  What are three important characteristics of a sound wave

What are three important characteristics of a sound wave? What is bandwidth? What is the bandwidth in a traditional North American telephone circuit?

  Describe disaster recovery and business continuity

Conduct web search on organizations that were affected by Hurricane Katrina. Describe disaster recovery and business continuity that the business had in place.

  Difference between passive and active security threats

Describe the difference between passive and active security threats? What are the fundamental requirements addressed by computer security?

  Linear speed of a point on the edge

When the laser is at the edge of the CD with a diameter of 5.25 inches, the cd is rotating at 200 revolutions per minute. Find the angular velocity of the CD in radians per minute, and the linear speed of a point on the edge of the CD in miles per..

  Market involved costs but took some exception

Alchian and Demsetz (1972) agreed in general with Coase's (1937) position that using the market involved costs but took some exception to his emphasis

  Limited access social order and open access social order

What is the meaning of "limited access social order" and "open access social order" in a political economic development context?

  Describe a protocol you engage in on a regular basis

Consider the security of your personal computer. List the attackers who might break into your computer, their incentives, and the associated costs and risks to the attacker.

  Display number of forms and links in the page

After that display number of forms and links in the page (for testing, include a few forms and hyper-text references in the page).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd