Explain your perspective on the workstation issue

Assignment Help Management Information Sys
Reference no: EM131748908 , Length: 7

Review the material we've discussed so far - IA program governance, device discovery, service enumeration, vulnerability assessments, attacker methodology, etc and begin an outline of your proposal. Final projects should be 4-7 pages not including network diagrams, figures, etc. if you choose to include them.

Scenario

You are an information security consultant and have recently been hired by a new client to update their information security program. Submit your final report as a .doc or .docx attachment via this assignment, please do not email me your report.

Hoosier Medical Systems has grown by acquisition over the last five years. They operate two hospitals and four doctor's offices in the central Indiana area. They have managed information technology in an ad-hoc manner for years and have recently hired a Chief Information Officer who is pushing for a centralized data center to support the IT needs of organization; he has limited experience in information security, so Hoosier Medical System has hired you to fill in the gap. There is no one dedicated to security, no security awareness program, no dedicated security hardware or software (other than client managed anti-virus), and no one has examined potential regulatory issues that may impact Hoosier Medical Systems.

The doctor's offices are running a mix of Windows XP, ME, Vista, and 7. There is no standard build, one of the two part-time IT staff members usually buy new workstations as needed from Best Buy.

They also have wireless at most offices for the doctor's to use their personal laptops in patient rooms without the need to plug into the live network jack in every room, they often bring their laptops home to review patient records and for general personal use. Each office handles their own billing and accept credit cards via a single Hoosier Medical System website or over their VoIP phone system.

Each office has a file server, domain controller, network switch, and router directly connected to the Internet. The router has an ACL limited some network protocols. They send and receive some information between the two hospitals, including patient records, payroll, billing information, and other administrative data.

The hospitals have a larger and slightly better managed technology infrastructure. They have a small network room which was a janitor closet. Each floor has its own network hub which connects all workstations together. All departments use the same file server, but the finance department has created a shared folder limited to just their department.

The new CIO plans to completely rebuild the infrastructure, starting with a new high availability data center. He wants to re-architect and centralize data storage, applications, device management, etc. He's not convinced that he needs to do much with the workstations at each site, but employees complain about lack of technical support and sporadic malware infections - they all have administrative rights.

He would like your perspective on the workstation issue, architecture suggestions, and anything else that they should consider when redesigning their IT infrastructure.

Your assignment is to document recommendations based on the scenario provided. Begin with the first section we covered in class and suggest a governance model for the Hoosier Medical System's new information security program.

Consider each section, one by one, and apply the material we've covered in class to this client's situation. Think about the attacker methodology, but this is not an incident response scenario.

You may suggest an annual penetration test, but there's no need to go into specific detail. Your final report should be 4-7 pages, single spaced (excluding diagrams if you choose to include them). There are plenty of issues to discuss and opportunities for improvement.

Reference no: EM131748908

Questions Cloud

What is the depreciation recapture for the asset : The initial investment on a commercial building was $1M excluding the land. The building was occupied in March of the year in which it was purchased.
Should you approach regulations as a risk to information : As a risk manager, should you approach regulations as a risk to information systems?
What can you say to someone who says global weirding : What can you say to someone who says global weirding is not happening but is something designed by the scientific community or government to scare people?
Discuss would i experience culture shock when traveling : How is the culture of this country different than where I love
Explain your perspective on the workstation issue : You are an information security consultant and have recently been hired by a new client to update their information security program.
Explain differentia and integra calculus : Bylist and explain differentia and integra calculus
How many dollars should the company budget for total cost : A company is analyzing its mixed costs. During July, its busiest month, a company had total labor hours of 14,000 and total costs of $40,000.
How important is correct grammar, spelling and language : How important is correct grammar, spelling, and language usage in workplace communication, Why
Discuss fighting compulsive gambling among women : Jennifer focused on the right priorities in her life; she was scared that she could lose her family if she was not gone to stop gambling

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd