Mitigate risk by using information security systems policies

Assignment Help Computer Network Security
Reference no: EM13808470

Scenario

You work for a large, private health care organization that has server, mainframe, and RSA user access. For the third week in a row, Sean comes into your office at 5:00 p.m. on Friday and needs you to write a report describing some of the risks associated with not having all the security items in place. He needs you to research a generic risk management policy template and use that as a starting point to move forward. He also asked you to search for risk outcome examples from organizations similar to theirs.

You realize that your organization does not have much in the way of an information security strategy, and is missing many of what you think are critical components. Your organization is compliant with the Health Insurance Portability and Accountability Act (HIPAA) and follows other external compliance requirements.

Assignment Requirements

Research templates, and look for risk outcome examples from organizations of a similar type as your organization. Write a report identifying the risks associated with the current position your organization is in, and how your organization can mitigate risk by using information security systems policies. Include an introduction explaining the following: Who? What? When? Why? Be sure to add a conclusion with a rationale detailing how risks can be mitigated. Reference your research so that Sean may add or refine this report before submission to senior management.

Reference no: EM13808470

Questions Cloud

How does the author describe futile treatment : How does the author describe futile treatment - What ethical dilemmas are faced by health care providers who must address human suffering?
The phase of the business cyc;e in the united states : a.  What do these numbers tell us about the phase of the Business cyc;e in the United states, the United Kingdom and Japan in 2011?b.  Do these numbers tellus anything about the relative size of the labour force participation rates and employment-to-..
Assignment on nutrition and academic performance : NUTRITION AND ACADEMIC PERFORMANCE
What is the estimated value ofone share of stock : 1.PA stock is selling for $36.60 a share. One $35 call is valued at $1.92 andone $35 put is valued at $.49. What is the value of five call optioncontracts? 2. A 1-month $25 call option on BRU stock is prices at $3.22. What is theestimated value of on..
Mitigate risk by using information security systems policies : Write a report identifying the risks associated with the current position your organization is in, and how your organization can mitigate risk by using information security systems policies
How do factors influence your decisions : How do these factors influence your decisions - How might they conflict with the needs, preferences, and biases of your patients and their families?
How differences on any three cultural dimensions influence : Identify and describe how differences on any three cultural dimensions influence the working relationships between the Japanese and American workers.
Create an interface : Create an interface that allows Alexander and Elizabeth to view the flowers in their pack. On this interface we should have an add button that adds new flowers
How many us dollars are needed to purchase swiss francs : 1. In New York, you can exchange $1 for €0.8569 or £0.6727. Suppose that, in Berlin, £1 costs €1.2573. How much profit can you earn on $47,485 using triangle arbitrage? 2. The exchange rate is 1.1033 Swiss francs per U.S. dollar. How many U.S. dollar..

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

  Process of generating an rsa key pair

List the smallest 10 numbers that are greater than 1000 and are candidates for being selected as the public key - can the number 1995 be selected as the public key? Justify your answer.

  What security vulnerabilities and threats can you see

What security vulnerabilities and threats can you see? What measures would you put in place to remove or minimize the vulnerabilities - Choose all the necessary and suitable MAC address, IP address for interfaces and port addresses implied by the a..

  The message kyvmr clvfw kyvbv pzjjv mvekv ve was encrypted

the message kyvmr clvfw kyvbv pzjjv mvekv ve was encrypted using a shift transformation c equiv p k mod 26. use

  Write a 2- to 3-page paper describing your companys

write a 2- to 3-page paper describing your companys intranet.include how the information is laid out and what security

  Security measures currently in place give adequate security

Explain in scholarly detail on whether you believe security measures currently in place give adequate security as well as privacy, or do you believe these issues being emphasized are at the expense of the other?

  Address the possible security requirements

Prepare a 3- to 5-page paper describing the considerations necessary to address the possible security requirements and the possible risks associated with the Benefits Elections Systems being requested by the Service Request, SR-HT-001 for Huffman ..

  Describe the properties and usage of digital signatures

Describe the properties and usage of digital signatures. Evaluate digital signatures based on their legal ability to stand up in court

  Is protocol secure for sharing secrets on server computer

Suppose that Alice shares secret with her company's server computer. When Alice is on trip, she tries to store important message in CEO's account directory. Is this protocol secure? If not, how do you feel it could be modified to make it so?

  Identify the virus software running on your computer

Explain the origin and effects of at least 3 different types of viruses/malicious programs as well as how your computer can become vulnerable to these threats.

  Define broadband and baseband transmission technology

Define broadband and baseband transmission technology and describe broadband technology and how a broadband system operates.

  Define attack methodology and countermeasures

Attack Methodology and Countermeasures, Imagine that a local company has hired you as a penetration tester to perform necessary testing. The company has asked you to report back to the Board of Directors on your findings.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd