How do your results affect business operations

Assignment Help Management Information Sys
Reference no: EM132136747

Daily life requires us to have access to a lot of information, and information systems help us access that information. Desktop computers, laptops, and mobile devices keep us connected to the information we need through processes that work via hardware and software components.

Information systems infrastructure makes this possible. However, our easy access to communication and information also creates security and privacy risks. Laws, regulations, policies, and guidelines exist to protect information and information owners. Cybersecurity ensures the confidentiality, integrity, and availability of the information.

Identity management is a fundamental practice. Part of identity management is the governance of access, authorization, and authentication of users to information systems, Identity management is one part of a layered security defense strategy within the information systems infrastructure.

Your work in this project will enable you to produce a technical report and nontechnical presentation that addresses these requirements.

Step 1: Defining the Information System Infrastructure

Select a hospital or healthcare organization to research. You may choose an organization you are familiar with or can readily obtain information about. To maintain confidentiality, you do not need to mention the name of the organization. You may also choose a hypothetical/fictitious healthcare organization.Others have researched several healthcare organizations, which have suffered major security breaches, extensively.

Describe the organization and structure including the different business units and their functions. You may use an organizational chart to provide this information.

Choose one or more mission-critical systems of the healthcare organization. Define the information protection needs for the organization's mission-critical protected health information (PHI). This information is stored in database medical records for doctors, nurses, and insurance claims billing systems, which are used to fulfill the organizational information needs.

Define the workflows and processes for the high-level information systems that you have just identified that will store PHI. Workflows and processes for healthcare organizations define how the organization gets its work done.

They describe the movement of patient information to the business units that have needs to process and manage that information, from billing to physician care. All these organizations have hardware and software implementations of their information systems, and it is critical to understand these components, and how they are connected (known as their topology), so the appropriate protections can be applied.

Your research may produce instances and examples of how an information system is connected, to include cybersecurity components like firewalls, in the information system and network diagram. Be sure you understand the benefits and weaknesses for the different network topologies.

You may incorporate what you find in your research, in your definition for workflows and processes for the high-level information systems and provide explanation of how that topology fulfills the mission for the health care organization. Your definition should include a high-level description of information systems hardware and software components and their interactions. Take time to read the following resources. They will help you construct your definition.

Information systems hardware

Information systems software

You may supply this information as a diagram with inputs, outputs, and technologies identified. Consider how you might restrict access and protect billing and PHI information.

The links shown below provide access to essential information you'll need to complete this part of the hospital's information system infrastructure definition. Click each link, review its resources, and refer to them as you compose this part of the definition.

Open Systems Interconnections (OSI) Model

TCP/IP protocols

network protocols

You will include these definitions in your report.

Step 2: Threats

Now that you have defined the hospital's information system infrastructure, you will have to understand what are the threats to those systems and describe the types of measures that could address those threats. In this section, you will learn about different types of identity access management solutions and how they protect against the threat of unauthorized access.

To complete this section of the report, you'll brush up on your knowledge of threats by reading the following resources: web security issues, insider threats, intrusion motives/hacker psychology, and CIA triad. Take what you learned from these resources to convey the threats to the hospital's information systems infrastructure.

Include a brief summary of insider threats, intrusion motives, and hacker psychology in your report as it relates to your hospital data processing systems. Relate these threats to the vulnerabilities in the CIA triad.This section of your report will also include a description of the purpose and components of an identity management system to include authentication, authorization, and access control.

Include a discussion of possible use of laptop devices by doctors who visit their patients at the hospital, and need access to hospital PHI data. Review the content of the following resources. As you're reading, take any notes you think will help you develop your description.

Authorization

Access control

Passwords

Multi-factor authentication

Next, expand upon your description. Define the types of access control management to include access control lists in operating systems, role-based access controls, files, and database access controls.

Define types of authorization and authentication and the use of passwords, password management, and password protection in an identity management system.

Describe common factor authentication mechanisms to include multi-factor authentication.You will include this information in your report.

Step 3: Password Cracking Tools

You have successfully examined the threats to a healthcare organization's information systems infrastructure. Now, you must begin your research into password cracking software. Do some quick independent research on password cracking as it applies to your organization.You can click on this link to find the instructions for Navigating the Workspace and the Lab Setup.

Enter Workspace and complete the lab activities outlined in the Project 1 Workspace Exercise Instructions. There are additional password cracking tool resources, tutorials, and user guides to continue your familiarity with the tools.Click here to access the Project 1 Workspace Exercise Instructions.

After completing the lab, you will have successfully tested more than one password cracking tool. Not all password cracking tools will necessarily perform with the same speed, precision, and results, making it important to test a few different products. Compare the password cracking tools based on these characteristics, and include as part of your assessment and recommendations on the use of such tools. You will test the organization's systems for password strength and complexity and complete validation testing. You will compare the results obtained from your first and second tool.

You have tested and made comparisons of the performance of various password cracking tools and you have the data to support your recommendations for the use of such tools. Not all password cracking tools will necessarily perform with the same speed, precision, and results, making it important to test a few different products. The comparison will be part of your assessment and help you make recommendations on the use of such tools. You will test the organization's systems for password strength and complexity and complete validation testing. You will compare the results comparing the various tools.

Read this article about cyberattacks, perform two different types of cyberattacks in the first, and in the second tool, crack user account passwords. Describe them in simple nontechnical terms for the leadership. You can identify which tool is the most effective and why for your organization's IT environment

Compare and contrast the results from the two methods used to crack the accounts for the three passwords (each encrypted by the two hash algorithms). Show their benefits. You can make certain conclusions that help your company's cybersecurity posture after using these methods.

Explain to the director of IT and the members of the board that the healthcare organization's anti-virus software will detect password cracking tools as malware.

Also explain how this impacts the effectiveness of testing security controls like password strength. Help the leadership understand the risks and benefits of using password cracking tools, through persuasive arguments in your report and presentation. If any of the tools take longer than 4-5 minutes to guess a password, record the estimated length of time the tool anticipates to guess it.

Include this information in your presentation.

Step 4: The Non-Technical Presentation

You now have the information you need to prepare your product for stakeholders. Based on the research and work you've completed in Workspace, you will develop two items: a technical report for the director of IT, and a nontechnical slide show presentation for the members of the board.

You will tailor the language of your reports appropriately to the different audiences.The nontechnical presentation: Your upper-level management team consists of technical and nontechnical leadership, and they are interested in the bottom line. You must help these leaders understand the identity management system vulnerabilities you discovered in password cracking and access control. They need to clearly see what actions they must either take or approve. The following are a few questions to consider when creating your presentation:

How do you present your technical findings succinctly to a non­technical audience? Your technical report for IT will span many pages; but you will probably be afforded no more than 30 minutes or 8-10 slides for your presentation and the following discussion with leadership.

How do you describe the most serious risks factually but without sounding too temperamental? No one likes to hear that their entire network has been hacked, data has been stolen, and the attackers have won. You will need to describe the seriousness of your findings while also assuring upper-level management that these are not uncommon occurrences today.

How do your results affect business operations? Make sure you are presenting these very technical password cracking results in business terms upper-level management will understand.

What do you propose? Management will not only want to understand what you have discovered; they will want to know what you propose as a solution.

Step 5: The Technical Report and Executive Summary

The technical report and the nontechnical presentation will identify compromises and vulnerabilities in the information systems infrastructure of the healthcare organization, and identify risks to the organization's data. You will propose a way to prioritize these risks and include possible remediation actions.

The technical report: Provide recommendations for access control and authentication mechanisms to increase the security within the identity management system. Review the mission and organization structure of this healthcare organization. Review the roles within the organization, and recommend the accesses, restrictions, and conditions for each role. Present these in a tabular format as part of your list of recommendations.Provide a comparison of risk scenarios to include the following:

What will happen if the CIO and the leadership do nothing, and decide to accept the risks?

Are there possible ways the CIO can transfer the risks?

Are there possible ways to mitigate the risks?

Are there possible ways to eliminate the risks?

What are the projected costs to address these risks?

Provide an overall recommendation, with technical details to the director of IT.The executive summary: In addition to your technical report, also create a nontechnical report as an executive summary.The deliverables for this project are as follows:

Nontechnical presentation: This is a 8-10 slide PowerPoint presentation for business executives and board members.

Technical report: Your report should be a 6-7 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables or citations.

Executive summary: This should be a 2-3 page double-spaced Word document.

In a Word document, share your lab experience and provide screen prints to demonstrate that you performed the lab.

Submit your deliverables to the assignment folder.Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work.

1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.

2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.

6.2: Creating a roadmap for organizations to use in development of an Identity Access Management program (to address gaps in their current offerings).

Reference no: EM132136747

Questions Cloud

Servicing diagnostic imaging and therapeutic medical devices : It is a global leader in developing, manufacturing, selling and servicing diagnostic imaging and therapeutic medical devices.
How does the restriction affect the price : There are five horseracing tracks in Kentucky. The Kentucky legislature allows only one track to be open at a time. How does this restriction affect the price.
How should the supply of shoes be allocated : Suppose the domestic shoe company has a maximum capacity of 50,000 pairs of running shoes and 50,000 pairs of tennis shoes in total of which 45,000 pairs.
What is the output of pages per worker : A copy company wants to expand production. It currently has 20 workers who share eight copiers. Two months ago, the firm added two copiers and output increased.
How do your results affect business operations : What do you propose? Management will not only want to understand what you have discovered; they will want to know what you propose as a solution.
Calculate consumer surplus at the revenue-maximizing price : Calculate the point elasticity of demand for Hondas with respect to its own price, the price of Chevrolets, and the price of gasoline.
Build a win-based system or a web-based system : Assume you have been selected to build a system for Oil&Gas company. Do you prefer to build a win-based system or a web-based system? Why?
Is there any drawbacks to hashing : Is there any drawbacks to hashing? What is hash value and why do you think that it is important
Describe disciplined imagination : Explain the concepts of pushing technology barriers, and identifying valuable information? Describe disciplined Imagination?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Identify what might be a personal or business asset

Identify what might be a personal or business asset (think of something you have at home that you would like to protect, or something that your company has)

  Prepare a detailed budget to implement your proposed design

Prepare a report and state the additional amount of money that is needed for the changes you have made to meet the additional requirements. Refer to the given price list in the Appendix.

  Describe creative capitalism

Describe creative capitalism

  What information will you be able to apply to your job

What information will you be able to apply to your job or future projects? Please ensure that you post an additional response which is substantial, furthers the discussion, adds additional value, that is relevant, and does more than just reiterate..

  Analysis of smart phone usage

In order to prepare a reply to Rami Chowdy's email, you will need to examine and analyse the database, Mobile_Phone.xlsx, thoroughly

  Compare and contrast sdlc and 2 other development models

Compare and contrast SDLC and 2 other development models (give a brief description of the approach, cover the phases, & highlight the strengths and weaknesses).

  Role of information systems in business

BIT 203 - Management Information Systems Discuss the role of Information Systems in business and compare between the various types of Information Systems.

  Discuss the different types of tricare plans

Millions of Americans are receiving healthcare benefits from government from entities such as Medicare and Medicaid.

  The evolving role of the chief technology officerdiscuss

the evolving role of the chief technology officerdiscuss the roles of the chief technology officer in the 21st century

  What is the expected contribution of new technology

Based on optimal solution, which product(s) should be offered, and how many procedures can be offered in a month?- What is the expected contribution of new technology to the hospital's monthly profits?

  Evaluate functional system

Evaluate functional system that would include a customer's name and explain the purpose of the system and why it would be included.

  Organizational financial information

Research the following areas related to protecting sensitive data for the Woodworker Cabinet company. Organizational financial information

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd