Preview

RAR Template 07112007 3

Powerful Essays
Open Document
Open Document
5647 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
RAR Template 07112007 3
Controlled Unclassified

Information

(CUI)
(When Filled IN)
Centers for Disease Control and Prevention

<System Name>

Draft Risk Assessment Report

Submitted to Tom Madden, CISO
DHHS/CDC/CIO/OCISO
4770 Buford Highway K-81
Atlanta, GA 30329

Submitted: , 2007
Version Control
Date
Author
Version

EXECUTIVE SUMMARY
The Centers for Disease Control and Prevention (CDC) recognizes the best, most up-to-date health information is without value unless it is pertinent and accessible to the people it is meant to serve. Lockheed Martin Information Technology has been tasked to conduct a risk assessment of the <System Name and Acronym> for the purpose of certification and accreditation (C&A) of <System Name> under DHHS Information Security Program Policy. This Risk Assessment Report, in conjunction with the System Security Plan, assesses the use of resources and controls to eliminate and/or manage vulnerabilities that are exploitable by threats internal and external to CDC. The successful completion of the C&A process results in a formal Authorization to Operate of <System Name>.
The scope of this risk assessment effort was limited to the security controls applicable to the <System Name> system’s environment relative to its conformance with the minimum DHHS Information Technology Security Program: Baseline Security Requirements Guide. These baseline security requirements address security controls in the areas of computer hardware and software, data, operations, administration, management, information, facility, communication, personnel, and contingency.
The <System Name> risk assessment was conducted in accordance with the methodology described in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-30, Risk Management Guide for Information Technology Systems. The methodology used to conduct this risk assessment is qualitative, and no attempt was made to determine any annual loss expectancies, asset

You May Also Find These Documents Helpful

  • Better Essays

    There are many types of risks that a company has to confront each day in information technology (IT). The four main types of risk are business, audit, security, and continuity risks. A business risk is when a company will not be able to achieve its goals and objectives; this could be union issues, a competing company, fraud, or production equipment failure. Audit risks include misstatement of financials by an auditor or a failure by an auditor to uncover fraud or material errors. A security risk can be a host of things that would ruin the integrity and access of the data, which can also lead to fraud or misuse of other information from internal (like employees) to external (like hackers) sources. And, finally, continuity risks are information system risks that have to do with backup, recovery and day to day availability of the system. When unplanned risks occur, management and auditor need to act quickly to intercept the risk, balance the risk with cost-effective countermeasures, since it is impossible to plan all risks (Hunton, Bryant, & Bagranoff, 2004).…

    • 1178 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    IS3550 Final Project

    • 4998 Words
    • 19 Pages

    The purpose of this paper is to develop an information security policy that defines the requirements to make our organization's computer network compliant with National Institute of Standards and Technology (NIST) Security Standards. NIST regulations and instructions were reviewed in order to develop the requirements that are stated in this policy. The source documents used can be found in the references section.…

    • 4998 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    2. Why is it difficult to conduct a qualitative risk assessment for an IT infrastructure?…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Anyone with a laptop or tablet could access the network and with only few basic network utilities could access all the servers and all the patient information. Most of these facilities are not implementing any Network Security because of the cost associated with it. “Most healthcare organizations nationwide, some 61 percent to be exact, reported a security related incident in the form of security breach, data loss or unplanned downtime at least once this past year, according to a new health IT report by MeriTalk, a public-private organization working to improve government information technology. These security events cost U.S. hospitals an estimated $1.6 billion each year. Breaking it down by incident, hospitals should expect to hand over on average $810,000 per security breach, which occurs at nearly one in five healthcare organizations nationwide” (healthcareitnews.com). I hope that with this project I can make clear the benefits of securing the network and the steps we need to take to set up and secure the…

    • 698 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Using the Delphi method a group of selected Subject Matter Experts (SMEs) can define the scope of the risk analysis. The SMEs will identify potential threats and vulnerabilities, determine the likelihood and impact of the threats and analyze and recommend security measures and determine risk levels. High emphasis will be placed in determining potential risks and vulnerabilities to the confidentiality, availability and integrity of all Electronic Personal Health Information (EPHI) that this office creates, receives, maintains, or transmits.…

    • 311 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    The cons of implementing an Enterprise Risk Management System are involved with too many resources, sometimes it is quite time consuming and hard to determine the possibility of the risks.…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    CIS 510 Quiz ch02

    • 2476 Words
    • 15 Pages

    2. While information systems can be used to gain a strategic advantage, they have inherent risks. Hershey Foods, for example, crippled its Halloween sales when its complex IS system failed to support its supply and inventory needs during peak production season. This is an example of which specific IS risk?…

    • 2476 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    Security Breach Plan Paper

    • 1576 Words
    • 7 Pages

    Patient privacy and security is one of the most important aspects of the St. Johns Hospital code of conduct, they take pride in the sound policies and procedures set to maintain customer confidentiality. Each employee is held to a high standard of maintaining the highest level of privacy and confidentiality when it comes to patient health information (PHI). This paper will outline the plan that St. John’s hospital has created in case of a security breach or security threat in the facility. The primary cause of a security breach is usually related to the people or business side of and organization (Rhoades, MBA, RHIA, CHPS, CPHIMS, FHIMA, 2009).…

    • 1576 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Over the years since the inception of HIPAA, it is hard not to notice the influence it brought on to the patients, the healthcare industry, the health information management and technology, and other entities in securing the confidentiality, security, and privacy of PHI. In addition, the HITECH Act and its HIPAA modification released in January 2013 greatly invigorated the HIPAA of 1996 (Solove, 2013). Definitely, the most important health care changes over the past couple of decades is the growing interest in health information privacy and security (Solove, 2013).…

    • 90 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    The responsibility to consolidate thousands of disease cases is hard enough, but the CDC must also remain anonymous in some areas to keep the patient’s health record information and personal information discrete, while also alerting the community of a possible disease spread. HIPAA, Health Insurance Portability and Accountability Act, is not only followed by health care professionals, but must also be regulated with the CDC as well. Hospitals must also report to the CDC when certain cases of certain diagnoses come up, and when new threats arise as well. Together the health care professionals and the Center for Disease Control must: alert the community, respect privacy, prevent panic, and provide a solution. These goals are a huge responsibility and yet this organization has managed to provide these services steadily since…

    • 1492 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    The Center for Disease Control and Prevention (CDC) was founded in 1946 (www.cdc.gov, n.d.). The CDC is one of the thirteen agencies that operates under the Department of Health and Human Services which is, "…the principal agency in the United States government for protecting the health and safety of all Americans…" (www.cdc.gov, n.d.). "Today, CDC is globally recognized for conducting research and investigations and for its action oriented approach" (www.cdc.gov, n.d.). Not only does the CDC help promote individual health improvement, but the CDC also monitors and combats threats of terrorism that would affect the health of the American people (www.cdc.gov, n.d.).…

    • 2086 Words
    • 9 Pages
    Better Essays
  • Best Essays

    Health Promotion

    • 1901 Words
    • 8 Pages

    Cornell, C., Littleton, M., Greene, P., Pulley, L., Brownstein, J., Sanderson, B., …Raczynski, J. (2009). A Community Health Advisor Program to reduce cardiovascular risk among rural African-American women. Health Education Research, 24(4), 622-633.…

    • 1901 Words
    • 8 Pages
    Best Essays
  • Powerful Essays

    References: Larson, C., Schlundt, D., Patel, K., Wang, H., Beard, K., & Hargreaves, M. (2010). Trends in smoking among African-Americans: a description of Nashville 's REACH 2010 initiative. Journal Of Community Health, 34(4), 311-320. doi:10.1007/s10900-009-9154-8CDC…

    • 1036 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Mobility XE Case Study

    • 796 Words
    • 4 Pages

    Providers are likely understanding that none of the specific challenges insurance, security, reliability, and speed while getting to quiet records and clinical data that the human administrations condition faces while trading full operational reliance to remote frameworks can be tended to by client advances. This is on account of customer remote were never proposed to work in light of HIPAA consistency. Above all restorative administrations, affiliations are associations with an uncommon obligation to secure patients private information regardless. An assault on private therapeutic administrations records presents extraordinary ramifications for both the clinic and the patient. That is the reason a comparative level of consideration must be given to the headway of reason built, solid systems with respect to the patients whose lives depend on upon the information being shared-and finally guaranteed by methods for these frameworks. Buyer review remote systems can't ensure security required by the administrative and government necessities. The initial step that a healing centre must take to guarantee consistency with HIPAA is the security administration process which incorporates hazard examination, chance administration and Information innovation audit. A hazard examination includes a precise and exhaustive evaluation of the potential vulnerabilities postured to…

    • 796 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The vulnerability of information systems is increasing as we move to a world of networked and especially wireless computing. Theoretically, there are hundreds of points in a corporate information system that can be subject to some threats. These threats can be classified as:…

    • 2074 Words
    • 8 Pages
    Good Essays