Did the student develop a high-quality risk mitigation plan

Assignment Help Management Information Sys
Reference no: EM132322633

Assignment: Scenario: You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a co-location data center, where production systems are located and managed by third-party data center hosting vendors.

Company Products

Health Network has three main products: HNetExchange, HNetPay, and HNetConnect.

HNetExchange is the primary source of revenue for the company. The service handles secure electronic medical messages that originate from its customers, such as large hospitals, which are then routed to receiving customers such as clinics.

HNetPay is a Web portal used by many of the company's HNetExchange customers to support the management of secure payments and billing. The HNetPay Web portal, hosted at Health Network production sites, accepts various forms of payments and interacts with credit-card processing organizations much like a Web commerce shopping cart.

HNetConnect is an online directory that lists doctors, clinics, and other medical facilities to allow Health Network customers to find the right type of care at the right locations. It contains doctors' personal information, work addresses, medical certifications, and types of services that the doctors and clinics offer. Doctors are given credentials and are able to update the information in their profile. Health Network customers, which are the hospitals and clinics, connect to all three of the company's products using HTTPS connections. Doctors and potential patients are able to make payments and update their profiles using Internet-accessible HTTPS Web sites.

Information Technology Infrastructure Overview

Health Network operates in three production data centers that provide high availability across the company's products. The data centers host about 1,000 production servers, and Health Network maintains 650 corporate laptops and company-issued mobile devices for its employees.

Threats Identified

Upon review of the current risk management plan, the following threats were identified:

• Loss of company data due to hardware being removed from production systems

• Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops

• Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and so on

• Internet threats due to company products being accessible on the Internet

• Insider threats

• Changes in regulatory landscape that may impact operations

Management Request

Senior management at Health Network has determined that the existing risk management plan for the organization is out of date and a new risk management plan must be developed. Because of the importance of risk management to the organization, senior management is committed to and supportive of the project to develop a new plan. You have been assigned to develop this new plan.

Additional threats other than those described previously may be discovered when re-evaluating the current threat landscape during the risk assessment phase.

The budget for this project has not been defined due to senior management's desire to react to any and all material risks that are identified within the new plan. Given the company's annual revenue, reasonable expectations can be determined.

Project Part 1 Task 3: Risk Mitigation Plan

Senior management at Health Network allocated funds to support a risk mitigation plan, and have requested that the risk manager and team create a plan in response to the deliverables produced within the earlier phases of the project. The risk mitigation plan should address the identified threats described in the scenario for this project, as well as any new threats that may have been discovered during the risk assessment. You have been assigned to develop this new plan.

• Did the student develop a high-quality risk mitigation plan based on material provided in the course?

• Did the student use information obtained from the earlier parts of the project to build out a risk mitigation plan?

• Did the student create a professional, well-developed draft with proper grammar, spelling, and punctuation?

Reference no: EM132322633

Questions Cloud

Write partial code segment that will sum the array : Declare an array of integer named list with 12 integers. Write partial code segment that will sum the array. The array is declared as follows:
Build a program to delete the element at index k : Delete an array element at index 'K'Given an array of integers, build a program to delete the element at index K. Use C programming
Describe the detection and analysis steps in the case : Describe the detection and analysis steps in this case. What would you do contain and eradicate this threat? DQ requirement: Note that the requirement is.
Does session get shared between different browsers : Does session get shared between different browsers (ie Chrome and IE) from same machine and user?
Did the student develop a high-quality risk mitigation plan : Did the student develop a high-quality risk mitigation plan based on material provided in the course? Did the student use information obtained from the earlier.
Does cookie get shared between different browsers : Does cookie get shared between different browsers (ie Chrome and IE) from same machine and user?
Cookie data is cleaned up in timely fashion : Is it important to clean up cookie data is cleaned up in timely fashion? Why or why not. Name two ways to clean up the cookie data.
Integer values and print the smallest two on the screen : Make a c program using only loops (do not use arrays or functions) that will ask user for 4 integer values and print the smallest two on the screen.
What measures would you take to engage stakeholders : Chapter 9 discussed the importance of stakeholder engagement in policy making. The author presented several benefits and an analysis of five cases.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Keeping information secureexplore ways an organization can

keeping information secureexplore ways an organization can keep its information secure. in 250 words apa style describe

  Why the networking group should move toward ipv6

During the weekly team meeting the manager expresses interest in migrating from Internet Protocol version 4(IPv4) to IPv6 across the enterpris.

  Network service provider

What is the relationship between the internet backbone, a network access point, and a network service provider?

  Information-intensive goods and classic information goods

What is the difference between "information-intensive goods" and "classic information goods"? How can a firm that find's itself on the losing side of network effects survive?

  Develop a work breakdown structure

Develop a work breakdown structure (WBS) for each of your two or three alternative solutions to your performance problem.

  Describe what windows-integrated authentication is

Describe what Windows-integrated authentication is and how it could potentially be used to provide secure access control to the portal.

  How aggregate functions help the organization understand

Provide an example that supports how the aggregate function is used to leverage talent within the organization.

  What would you like to be able to do for yourself using mycw

How well did the analysts do? When you try to accomplish things with MyCWU, do you find that there were some missing requirements?

  What is the central idea of business process design

Explain the differences between cooperation and collaboration, and then discuss the criteria for successful collaboration. Use examples as needed.

  Does your school have a similar policy

Search the Web for examples of issue-specific security policies. What types of policies can you find?

  Examine the structured analysis and design technique

Examine the Structured Analysis and Design Technique (SADT) diagrams that were used to document the reengineered parts of the exam scheduling and distribution process

  Explore ethical issues that may surround the use of IT

Explore ethical issues that may surround the use of information technology in the implementation or development of one of these topics.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd