Discuss the potential for service interruptions for systems

Assignment Help Management Information Sys
Reference no: EM131912360

Scenario
You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organizationheadquartered in Minneapolis,Minnesota. Health Networkhas over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located neara co-location datacenter, where production systems are located and managed by third-party datacenter hosting vendors.

Project

For the project, you must create a threat model, using STRIDE (remember to use the information in the article at the Web link, to understand these sections). To do so, you must analyze the data and create a threat model document that contains the following sections:

1. A section titled Attacker Viewpoint discussing framing the threat from the mindset of the perceived attacker. Address the following questions:

a. Who is likely to attack the system?

b. What are they likely to attack to accomplish their goal?

2. A section titled Asset Viewpointdiscussing the organization's assets from the information provided in the scenario, above. Be sure to also address the following questions (I recommend placing this in a table).

a. What is the asset?

b. What value does the asset have to the organization?

c. How might that asset be exploited by an attacker?

3. A section, titled STRIDE, that will identify the following security threats for six different categories, as discussed in the article in the Web reference you were asked to read, as they apply to this scenario. Include the following:

a. Spoofing - address any spoofing threats that might be present in the applications or systems. Include the ramifications (impact) of a spoofing attack.

b. Tampering - address any data or databases that might be subject to data tampering (applications, for instance, that might be vulnerable to cross site scripting attacks or SQL injection in the healthcare organization scenario, above).

c. Repudiation - address where repudiation attacks might be possible in the organization.

d. Information disclosure - address where there may be the likelihood for a data breach in the organization's assets listed in the scenario that would allow the attacker to access private information (or, worse, patient health information). Discuss the laws and regulations that would be impacted and the ramifications (impact and penalities) that would be incurred by this organization in that event.

e. Denial of Service - discuss the potential for service interruptions for those systems or applications connected to the Internet. Which systems are vulnerable? What would be the impact to the organization for each connected system, if it were to be unavailable?

f. Elevation of Privilege - discuss the systems and applications that might be subject to an attacker elevating his privilege levels (think of a patient database - what would happen if the attacker was able to gain Administrator access to the database?).

4. A section, titled Risk Mitigation Plan, that summarizes your findings for the boss and discusses the security controls that you recommend for each of the potential attacks that you have identified. This can be summarized using the table I've provided for you below for each of your threats.

Remember to assign the implementation of the recommended security control to a role within the organization (you can use a generic role, such as System Administrator, Database Admin, Security Officer, etc. - your textbook and other supplemental readings listed different organizational roles responsible for managing risk).

Reference no: EM131912360

Questions Cloud

Fishing regulations and controlling the environment : Based on fishing regulations and controlling the environment it can be renewable for a very long time.
Present value of the dividends during super normal growth : What is the present value of the dividends during the supernormal growth years? What is the price of the stock at the end of the third year?
Use the atomic bomb against japan : What was the biggest reason Truman decided to use the atomic bomb against Japan? Why do you believe that was the Biggest reason for Truman's decision?
Choose two of the three murals by orozco : Choose two of the three murals by Orozco, "The working class," "Combate," "Zapatistas" and compare/contrast them with two murals by Rivera.
Discuss the potential for service interruptions for systems : Discuss the potential for service interruptions for those systems or applications connected to the Internet. Which systems are vulnerable?
Identify a risk management process you would employ : Identify a risk management process you would employ to mitigate risks in regard to the given scenario along with a rationale.
Roles for men and women in the new world : But do you think the Puritans were hypocritical? How did their actions dictate the roles for men and women in the new world?
Why a healthcare facility that uses an ehr system : Explain why a healthcare facility that uses an EHR system cannot necessarily be considered paperless
What do you see as the strengths of the constructs : What do you see as the strengths and weaknesses of these constructs? Post should be at least 300 words. Respond to at least two of your classmates' postings.

Reviews

Write a Review

Management Information Sys Questions & Answers

  How a technology like rfid could enhance the approach

Submit an executive summary on the specific industry and business problem that you are going to do your research paper on. The summary should contain enough of a detailed description of the business problem that someone unfamiliar with the specif..

  Identify steps that hackers take to find flaws in the system

Identify the steps that hackers take to find flaws in the system. Identify potential security measures to stop forced browsing

  Explain the differences between variables and data types

Explain what you struggled with or what you found that was new and exciting that you plan to use personally. I want to also see that you have put some thought into the discussion. Use reference and quotes when needed.

  Explain what specific changes or paradigm shifts

How will technology impact business over the next 10 years - Explain what specific changes or paradigm shifts you expect to see.

  How do these components affect health care reimbursement

Discuss at least two components described in the "Billing Workflow" section in Ch. 10 of Health Information and Technology Management.

  Write an essay about the evolution of e-commerce marketing

Write an essay about the evolution of E-commerce marketing. Use an appropriate number of references to support your position, and defend your arguments.

  What are the advantages and disadvantages of digital wallets

Discuss the steps that MasterCard can take to promote greater use of its BI and reporting tools by its clients.

  Investigation in to the growth of e-commerce

Project Title: An investigation in to the growth of e-commerce and its impact on new start-up. Outline of what the project is about. Outline of organization/sector being researched (as relevant). Setting out of Research questions/objectives

  Describe the application and the failure

Consider a distributed application that you use and for which you have experienced a recent failure. Describe the application and the failure

  Desirable and undesirable aspects of this fragmentation

Create a presentation in PowerPoint (using both the slides and instructor's notes sections) in which you address the following questions: What are the desirable and undesirable aspects of this fragmentation

  Structured vs unstructured decisionscomparecontrast

structured vs. unstructured decisionscomparecontrast structured vs. unstructured decisions including which management

  Explain what concepts do you think are most important

What concepts and topics do you think are most important, and how do you see yourself and your team implementing such suggestions when you get on the job?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd