Hacker penetrates your IT infrastructure and gains access to your internal network – If a hacker is able to penetrate your internal network he has the potential to gain access to patient files or other private data that is covered under HIPPA guidelines.
2. How many threats and vulnerabilities did you find that impacted risk within each of the seven domains of a typical IT infrastructure?
a. User Domain: 2
b. Workstation Domain: 5
c. LAN Domain: 7
d. LAN-to-WAN Domain: 2
e. WAN Domain: 2
f. Remote Access Domain: 2
g. System/Application Domain: 1
3. Which domain(s) had the greatest number of risks, threats, and vulnerabilities?
LAN Domain
4. What is the risk impact or risk factor (critical, major, minor) that you would qualitatively assign to the risks, threats, and vulnerabilities you identified for the LAN-to-WAN Domain for the healthcare and HIPPA compliance scenario?
I would consider the both minor for the most part. Unless performance becomes a work stoppage, both would be considered minor in relation to HIPPA.
5. Of the three Systems/Application Domain risks, threats, and vulnerabilities identified, which one requires a disaster recovery plan and a business continuity plan to maintain continued operations during a catastrophic outage?
Loss of production data
6. Which domain represents the greatest risk and uncertainty to an organization?
User Domain
7. Which domain requires stringent access controls and encryption for connectivity to corporate resources from home?
Remote Access Domain
8. Which domain requires annual security awareness training and employee background checks for sensitive positions to help mitigate risk from employee sabotage?
User Domain
9. Which domains need software vulnerability assessments to mitigate risk from software vulnerabilities?
Workstation Domain
10. Which domain requires AUPS to minimize unnecessary User initiated Internet traffic and can be monitored and controlled by web content filters?
User Domain
11. In which domain do you implement web content filters?
LAN-to-WAN Domain
12. If you implement a wireless LAN (WLAN) to support connectivity for laptops in the Workstation Domain, which domain does WLAN fall within?
LAN Domain
13. A bank under Gramm-Leach-Bliley-Act (GLBA) for protecting customer privacy has just implemented their online banking solution allowing customers to access their accounts and perform transactions via their computer or PDA device. Online banking servers and their public Internet hosting would fall within which domains of security responsibility?
a. LAN-to-WAN Domain
14. Customers that conduct online banking using their laptop or personal computer must use HTTPS:, the secure and encrypted version of HTTP: browser communications. HTTPS:// encrypts webpage data inputs and data through the public Internet and decrypts that webpage and data once displayed on your browser. True or False.
a. TRUE
15. Explain how a layered security strategy throughout the 7-domains of a typical IT infrastructure can help mitigate risk exposure for loss of privacy data or confidential data from the Systems/Application Domain.
Well as you travel through the layers, each layer should add a little more security features to help protect you IT assets. When you come to your Systems/Application Domain, the applications should work with your network based on how you set up the other layers.
You May Also Find These Documents Helpful
-
iii.Install water saving devices such as native plants, tank, dual flush toilet systems, 5-6 star (WELS) dishwasher.…
- 565 Words
- 3 Pages
Satisfactory Essays -
This domain is the fastest way for the system to be compromised. I would implement an AUP (acceptable use policy) that will be understood and signed by all employees with access to the network. The employees will also have to go through initial information security training before gaining access to the network. This training will also be required annually in order to maintain their access to the network. The AUP will dictate the requirements for passwords. The requirements will include an eight character alphanumeric password, two uppercase letters, two lowercase letters, two special characters, and two numbers. This will make it more difficult for the password to be breached. The AUP will also state that the company systems will only be used for work related purposes. All social networking sites and many other miscellaneous sites will be blocked. The user will also have to consent to monitoring when signing the…
- 1234 Words
- 5 Pages
Better Essays -
High: There are major disruptions if the business lost more than a week, which affects parts of the…
- 1105 Words
- 7 Pages
Powerful Essays -
2. Why is it difficult to conduct a qualitative risk assessment for an IT infrastructure?…
- 339 Words
- 2 Pages
Satisfactory Essays -
3. Using the workstation domain, define risks associated within that domain and explain what can be done to reduce risks in that domain.…
- 347 Words
- 2 Pages
Satisfactory Essays -
3. Identify and document 2 vulnerabilities you found interesting in terms of your computer use at home or work. How could your work or home computer be affected?…
- 389 Words
- 2 Pages
Satisfactory Essays -
Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…
- 606 Words
- 3 Pages
Good Essays -
Read the following case description of an IT crisis and answer the questions posed at the end of the description.…
- 1127 Words
- 4 Pages
Powerful Essays -
In which of the IT domains is a hub considered a major component of risk?…
- 320 Words
- 2 Pages
Satisfactory Essays -
Using the workstation domain, define risks associated within that domain and explain what can be done to reduce risks in that domain.…
- 577 Words
- 3 Pages
Good Essays -
3. How does risk management and risk assessment relate to a business impact analysis for an IT infrastructure?…
- 293 Words
- 2 Pages
Satisfactory Essays -
2. Discuss the role of HIPAA regulations in data and network security, patient consent and authorization.…
- 339 Words
- 2 Pages
Good Essays -
Prior to the enactment of the Health Insurance Portability and Accountability Act (HIPPA) health information was able to be shared without the knowledge or permission of the patient. This information was available to just about anyone including insurance agencies, places of employment and even loan lenders. People would potentially use individuals’ health information to deny them work or a loan for their home and even impacting higher insurance rates or denial of coverage. According to U.S. Department of Health and Human Services (n.d.), “The Privacy Rule establishes a Federal floor of safeguards to protect the confidentiality of medical information. State laws which provide stronger privacy protections will continue to apply over and above the new Federal privacy standards.” (para. 1). Also, as medical records continue to move entirely to the new standard of electronic records it is important to have one standard across the country to protect everyone’s information. Electronic health records (EHR) make it easier than ever to accidentally share medical information, to include having it stolen. Medical providers are just as likely to face consequence if their facility is broken in to and the hard drive with patients information is stolen as they would be if they gave the information away themselves. In general HIPPA protects patients’ information as well as their right to be treated equally.…
- 457 Words
- 2 Pages
Satisfactory Essays -
| Write a paragraph on each of the 3 critical areas of HIPAA for a training session of your staff. Explain what they are, why they are important and how they impact staff duties and the organization.…
- 384 Words
- 2 Pages
Satisfactory Essays -
Question 1: Does HIPPA affect the patient’s access to his or her medical records? If so, describe the effect and the procedure for obtaining access.…
- 598 Words
- 3 Pages
Good Essays