What value does the asset have to the organization

Assignment Help Management Information Sys
Reference no: EM132244334

Project: Threat Modeling with STRIDE

Purpose

This project provides an opportunity to apply the concepts of using a Threat Modeling methodology, STRIDE, against a fictitious Healthcare organization's application.

Learning Objectives and Outcomes

You will gain an overall understanding of risk management, its importance, and critical processes required when developing a threat model as a part of risk management for an organization.

Required Source Information and Tools

Deliverables

As discussed in this course, risk management is an important process for all organizations. This is particularly true in information systems, which provides critical support for organizational missions.

Theproject activities described in this document allow you to fulfill the role of an employee participating in the risk management process in a specific business situation, identifying the threats and vulnerabilities facing your organization.

Scenario

You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organizationheadquartered in Minneapolis,Minnesota. Health Networkhas over 600 employees throughout the organization and generates $500 million USD in annual revenue.

The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located neara co-location datacenter, where production systems are located and managed by third-party datacenter hosting vendors.

Company Products

Health Network has three main products: HNetExchange, HNetPay, and HNetConnect.

HNetExchangeis the primary source of revenue for the company. The service handles secure electronic medical messages that originate from its customers, such as large hospitals, which are then routed to receiving customers such as clinics over the Internet. Information transmitted over this network include patient health information, xrays, bloodwork, and diagnoses.

HNetPay is a Web portal used by many of the company's HNetExchange customers to support the management of secure payments and billing.

The HNetPayWeb portal, hosted at Health Network production sites, accepts various forms of payments and interacts with credit-card processing organizations much like a Web commerce shopping cart. The Web portal is hosted on a Windows IIS Web server. Data from the portal is stored in an Oracle database on a Unix server.

HNetConnectis an online directory that lists doctors, clinics, and other medical facilities to allow Health Network customers to find the right type of care at the right locations. It contains doctors' personal information, work addresses, medical certifications, and types of services that the doctors and clinics offer. Doctors are given credentials and are able to update the information in their profile.

Health Network customers, which are the hospitals and clinics, connect to all three of the company's products using HTTPS connections. Doctors and potential patients are able to make payments and update their profiles using Internet-accessible HTTPS Web sites.You have already run a Nessus scan and used nmap to determine vulnerabilities.

Information Technology Infrastructure Overview

Health Network operates in aproduction data center that provide high availability across the company's products. The data center host about 1,000 production servers, and Health Network maintains 650 corporate laptops and company-issued mobile devices for its employees. Employees are allowed to work from home, using their company-issued laptops. There is also a wireless network available at work.

Project

For the project, you must create a threat model, using STRIDE (remember to use the information in the article at the Web link, to understand these sections). To do so, you must analyze the data and create a threat model document that contains the following sections:

1. A section titled Attacker Viewpoint discussing framing the threat from the mindset of the perceived attacker. Address the following questions:

a. Who is likely to attack the system?

b. What are they likely to attack to accomplish their goal?

2. A section titled Asset Viewpointdiscussing the organization's assets from the information provided in the scenario, above. Be sure to also address the following questions (I recommend placing this in a table).

a. What is the asset?

b. What value does the asset have to the organization?

c. How might that asset be exploited by an attacker?

3. A section, titled STRIDE, that will identify the following security threats for six different categories, as discussed in the article in the Web reference you were asked to read, as they apply to this scenario. Include the following:

a. Spoofing - address any spoofing threats that might be present in the applications or systems. Include the ramifications (impact) of a spoofing attack.

b. Tampering - address any data or databases that might be subject to data tampering (applications, for instance, that might be vulnerable to cross site scripting attacks or SQL injection in the healthcare organization scenario, above).

c. Repudiation - address where repudiation attacks might be possible in the organization.

d. Information disclosure - address where there may be the likelihood for a data breach in the organization's assets listed in the scenario that would allow the attacker to access private information (or, worse, patient health information). Discuss the laws and regulations that would be impacted and the ramifications (impact and penalities) that would be incurred by this organization in that event.

e. Denial of Service - discuss the potential for service interruptions for those systems or applications connected to the Internet. Which systems are vulnerable? What would be the impact to the organization for each connected system, if it were to be unavailable?

f. Elevation of Privilege - discuss the systems and applications that might be subject to an attacker elevating his privilege levels (think of a patient database - what would happen if the attacker was able to gain Administrator access to the database?).

4. A section, titled Risk Mitigation Plan, that summarizes your findings for the boss and discusses the security controls that you recommend for each of the potential attacks that you have identified.

This can be summarized using the table I've provided for you below for each of your threats. Remember to assign the implementation of the recommended security control to a role within the organization (you can use a generic role, such as System Administrator, Database Admin, Security Officer, etc. - your textbook and other supplemental readings listed different organizational roles responsible for managing risk)

Reference no: EM132244334

Questions Cloud

How often do you back up critical data files such as files : Now that digital publishing is so accessible to everyone, how should a publishing business respond?
How well did you do on the test and what did you learn : How well did you do on the test and what did you learn? How could you use this test to train employees about phishing?
What makes mobile devices unique and uniquely suited : Your assignment is to research what makes mobile devices unique and uniquely suited to education and classroom usage.
Determine the most likely causes of defects : Determine the most likely causes of defects. Understand why defects are generated by identifying the key variables most likely to create process variation.
What value does the asset have to the organization : Who is likely to attack the system? What are they likely to attack to accomplish their goal? What value does the asset have to the organization?
What types of things would you need to do well : Discuss the pros and cons of a matrix organization for project management. As a project manager, what types of things would you need to do well in order.
Describe the key elements of an information system : Describe the key elements of an information system for an MCO. What elements are different than for a physician office or group?
How did you prepare for the interview : How did you prepare for the interview? Be sure to list the questions used in your interview and provide a brief summary of the content of your interview.
Describe polaris performance in each category : Briefly describe the Baldrige Award. State each category of evaluation and describe Polaris' performance in each category. Recommend a point award.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Discuss how the kpi represents a strategic objective

Discuss how the KPI represents a strategic objective that measures performance against a related goal.

  What business activities andor business functions does this

what business activities andor business functions does this type business application support?please assist with the

  Specify at least three approaches for marketing its value

Specify at least three approaches for marketing IT's value. Propose method for implementing each approach within an organization.

  Use of information technology

Use of information technology - Describe how the use of information technology can make things worse if it is applied to a poorly thought out process.

  Important part of a company''s distribution strategy

Supply chain management is an important part of a company's distribution strategy. Determine (REI) Recreational Equipment Incorporated and outline their current channel and methods of distribution.

  Design a logical and physical topographical layout

Design a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio.

  Information systems proposal with five types of information

information systems proposal with five types of information systems that would work well for a new small nostalgic

  Describe the it projects life cycle

Explain why the project management knowledge areas and processes are important. Identify in which phase the scope is completed.

  Analyze how communication in groups

analyze how communication in groups differs from individual communication. Are there unique challenges to communicating with groups? Provide examples. Use at least one resource to support your key points

  Advantages and disadvantages of social networking

In a 500-750 words, discuss the advantages and disadvantages of social networking and how it can be used in career development

  Importance of mis in relation to data-driven decisions

Explain the importance of MIS in relation to data-driven decisions. Describe the techniques and tools that can be utilized to manage the data. Include at least 2 effective techniques and 3 effective tools

  Compare and contrast an it audit project

Elaborate on three (3) of the obstacles that must be overcome as a business moves up the CMMI model. Suggest key methods for overcoming the obstacles.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd