Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Scenario
You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organizationheadquartered in Minneapolis,Minnesota. Health Networkhas over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located neara co-location datacenter, where production systems are located and managed by third-party datacenter hosting vendors.

Project

For the project, you must create a threat model, using STRIDE (remember to use the information in the article at the Web link, to understand these sections). To do so, you must analyze the data and create a threat model document that contains the following sections:

1. A section titled Attacker Viewpoint discussing framing the threat from the mindset of the perceived attacker. Address the following questions:

a. Who is likely to attack the system?

b. What are they likely to attack to accomplish their goal?

2. A section titled Asset Viewpointdiscussing the organization's assets from the information provided in the scenario, above. Be sure to also address the following questions (I recommend placing this in a table).

a. What is the asset?

b. What value does the asset have to the organization?

c. How might that asset be exploited by an attacker?

3. A section, titled STRIDE, that will identify the following security threats for six different categories, as discussed in the article in the Web reference you were asked to read, as they apply to this scenario. Include the following:

a. Spoofing - address any spoofing threats that might be present in the applications or systems. Include the ramifications (impact) of a spoofing attack.

b. Tampering - address any data or databases that might be subject to data tampering (applications, for instance, that might be vulnerable to cross site scripting attacks or SQL injection in the healthcare organization scenario, above).

c. Repudiation - address where repudiation attacks might be possible in the organization.

d. Information disclosure - address where there may be the likelihood for a data breach in the organization's assets listed in the scenario that would allow the attacker to access private information (or, worse, patient health information). Discuss the laws and regulations that would be impacted and the ramifications (impact and penalities) that would be incurred by this organization in that event.

e. Denial of Service - discuss the potential for service interruptions for those systems or applications connected to the Internet. Which systems are vulnerable? What would be the impact to the organization for each connected system, if it were to be unavailable?

f. Elevation of Privilege - discuss the systems and applications that might be subject to an attacker elevating his privilege levels (think of a patient database - what would happen if the attacker was able to gain Administrator access to the database?).

4. A section, titled Risk Mitigation Plan, that summarizes your findings for the boss and discusses the security controls that you recommend for each of the potential attacks that you have identified. This can be summarized using the table I've provided for you below for each of your threats.

Remember to assign the implementation of the recommended security control to a role within the organization (you can use a generic role, such as System Administrator, Database Admin, Security Officer, etc. - your textbook and other supplemental readings listed different organizational roles responsible for managing risk).

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92751025
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question?


Related Questions in Management Information System

Do you agree or disagree and whyenterprise risk management

Do you agree or disagree and WHY? Enterprise risk management is is the process a business or individual undertakes to plan, organize, control and lead the activities that affect a company's or individual's capital and ea ...

Your company is a dynamic organization that depends on

Your company is a dynamic organization that depends on using standard project management techniques as prescribed by PMBOK in managing series of projects to keep its IT infrastructure in alignment with its business goals ...

Question research the fire at the federal aviation

Question : Research the fire at the Federal Aviation Administration (FAA) facility in Chicago, Illinois (2014). Provide insight into the following: What went wrong? What went right? Would a risk assessment strategy if em ...

Assignment 11 what has your group experience been like up

Assignment 1 1. What has your group experience been like up to this point?Discuss any challenges or enlightend approahes that have been discovered? 2. What is your impression of the fecilities being used for this weekend ...

Question how companies could effectively use emerging

Question : How companies could effectively use emerging technology to win over its competitors. APA format required. 250 words essay required. The response must be typed, single spaced, must be in times new roman font (s ...

Solutions for e-banking security holesdigital security of

Solutions for E-Banking Security Holes: Digital Security of software systems in Banks is very important to protect sensitive bank information, employee's identity and customer's privacy, also to avoid many legal problems ...

Question - given that the money and human resources are

Question - Given that the money and human resources are ultimately limited, what can be done to improve the EFFICIENCY of the US healthcare system? Please answer this question from two perspectives: 1. What should (can) ...

Part a the university would like to encourage students to

Part A: The university would like to encourage students to pick up their tickets at the will call window to reduce mail costs. Revise the website program to reflect the following changes: Ask the student how many events ...

Question describe and discuss at least two backup

Question : Describe and discuss at least two backup strategies. Discuss the use of cloud backup strategies, as well? Please write minimum of 250 words with 0 % plagiarism and in APA format.

Explain the need for designing procedures for simple tasks

Explain the need for designing procedures for simple tasks such as creating or modifying access controls. Create a procedure guide that provides clear instructions that anyone with a basic technical knowledge base can fo ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As