Brute force user id and password attacks

Assignment Help Management Information Sys
Reference no: EM131658222

Remote Access Security Policy

Organization: XYZ Health Care Provider:

XYZ Health Care is a provider of health services to senior citizens. It performs its mission with a virtual force of Registered Nurses and Nurse Practitioners.

The nurses visit their elderly patients in their homes and monitor their health. At the end of the day, the nurses are required to connect back to corporate networks and upload all of the patient records for the day.

Keep in mind that this organization is subjected to HIPAA rules and its required to make the data available to its patients and authorized patient representatives within 48 hours.

Some of the RISKS:

• Brute force user ID and password attacks

• Users or employees unaware of the risks, threats, and dangers of the Internet and shard WI-FI or broadband Internet Access

• Multiple Access attempts and logon retries

• Unauthorized access to IT Systems, applications, and data

• Privacy data or confidential data is compromised remotely

• Data leakage occurs in violation of data classification standard

• A remote worker's laptop is stolen

• A remote worker requires access to the patient medical records system through the Public Internet

Scope: Control Identification and Creation of a Remote Access Policy

Using or textbooks, internet and other resources, identify the necessary components / sections within a security policy and then craft the actual policy for XYZ Healthcare and address the risks within policy that are prevalent with Remote Access.

Your submission must include the following:

1) Control Matrix: A listing of the risk and 1 or more countermeasure to address the risk.

2) A Section that identifies the necessary components of the policy and why they are important: This does not refer to the controls but more specifically sections within the policy. (You may research the Internet or SANS for sample policies, the sections were also discussed in class).

3) The actual policy, when developing the policy please ensure that it can be used at XYZ Healthcare.

Paper Requirements

1) APA Format (Where applicable)

2) Minimum of 3 - 5 references

3) Safe - Assignment comparison will be done

Reference no: EM131658222

Questions Cloud

Evaluate court use of the rules of statutory construction : What was Adams's primary complaint against Circuit City in the state court, and how did the case end up in the federal court system?
Give a brief background on the organism : Overview of organisms or event or other microbiology related concept: Give a brief background on the organism
Determining the organizational culture : Every company no matter how big or small has an organizational culture. Please post about someplace you have worked and what their organizational culture.
Becoming an effective programmer : Research is key when becoming an effective programmer. Locate a useful resource on the web for programming in Python
Brute force user id and password attacks : Users or employees unaware of the risks, threats, and dangers of the Internet and shard WI-FI or broadband Internet Access.
Demonstrate the presence of the drive in a positive manner : What are some examples of quality and access of high performance systems and apply them a hospital that would demonstrate the presence of the drive
Discuss about the jurisdiction in cyberspace : What standard would a court apply to determine whether it has jurisdiction over the out-of-state computer firm in the video?
Bayside memorial hospital operate : Could a medical facility such as Bayside Memorial Hospital operate without roaming profiles, and if how would it impact user accessibility?
Why would homogenized liver be used in the media : Why would homogenized liver be used in the media? What could be the result if liver is not used? d. Is this assay used before or after animal testing

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd