Preview

Victor Sabani Lab 1 Lab Assessment

Satisfactory Essays
Open Document
Open Document
404 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Victor Sabani Lab 1 Lab Assessment
Victor Sabani Lab 1

Lab Assessment Questions & Answers

The following risks, threats, and vulnerabilities were found in a healthcare IT infrastructure servicing patients with life-threatening situations. Given the list, select which of the seven domains of a typical IT infrastructure is primarily impacted by the risk, threat, or vulnerability.
Risk – Threat – Vulnerability
Primary Domain Impacted
Unauthorized access from public Internet
WAN
User destroys data in application and deletes all files
Workstation
Hacker penetrates your IT infrastructure and gains access to your internal network
LAN
Fire destroys primary data center
System Application
Communication circuit outages
LAN to WAN
Workstation OS has a known software vulnerability
Workstation
Unauthorized access to organization owned Workstations
LAN
Denial of service attack on organization e-mail
Server
System Application
Remote communications from home office
Remote Access
LAN server OS has a known software vulnerability
LAN
User downloads an unknown e –mail attachment LAN
Workstation browser has software vulnerability
User
Service provider has a major network outage
WAN
User inserts CDs and USB hard drives with personal photos, music, and videos on organization owned computers
Workstation
VPN tunneling between remote computer and ingress/egress router
Remote access
WLAN access points are needed for LAN connectivity within a warehouse
LAN to WAN

Given the scenario of a healthcare organization, answer the following assessment questions from a risk management perspective:

1 Of the listed risks, threats, and vulnerabilities identified in the table above, which one requires a disaster recovery plan and business continuity plan to maintain continued operations during a catastrophic outage? The one threat that would require a DRP or a BC would have to be if a fire destroyed the primary data center.

2 Which domain represents the greatest risk and uncertainty to an organization?

The domain with the greatest

You May Also Find These Documents Helpful

  • Best Essays

    Patton-Fuller Rfp Cmgt554

    • 4696 Words
    • 19 Pages

    The following document shall serve as the RFP (Request for Project) for the Patton-Fuller Community Hospital. Team A has researched the hospital’s current IT systems seeking ways to ensure many years of continued success and compliance with the very best practices in the IT community today. Specific areas such as networking architecture design and the future proofing of the design for speed, accuracy, and security of the system shall be discussed as part of this RFP. Special consideration was given to the sensitive nature of the security surrounding patient information while proposing changes.…

    • 4696 Words
    • 19 Pages
    Best Essays
  • Good Essays

    NTC362 Week 2 INDP part 1

    • 719 Words
    • 3 Pages

    Patton Fuller is a community hospital that has been proudly serving the community since 1975. Patience care is number one, and they thrive to ensure each of their patients experience is as pleasant as possible. Hospitals are under enormous pressure to treat patients in the most effective and efficient way. By leveraging the best IT systems, health organizations provide the type of patient care with the speed and efficiency required by the market. By analyzing Patton Fuller’s IT infrastructure, a determination can be made about the network and the devices supported on it as well. The outcome of the analysis will be used to recommend new technologies in data collection, internal communication, and security. If done correctly, this will link productivity with care thereby improving performance and reducing the cost of operations in the hospital.…

    • 719 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Quiz010: Lab Report

    • 929 Words
    • 4 Pages

    | LabRepQuiz010 Question MC #7: Which of the following is the best written sentence that includes the information below taken from an article written by Dr. Costanza, but avoids plagiarism?…

    • 929 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Lab 2

    • 385 Words
    • 2 Pages

    2. What is the relationship between risks, threats and vulnerabilities as it pertains to Information Systems Security throughout the seven domains of a typical IT infrastructure?…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab #4

    • 451 Words
    • 2 Pages

    MS08-067: Vulnerability in Server service could allow remote code execution. This can lead to someone gaining administrative rights who could add and delete…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    7. List at least 3 risks your company will face, and explain how you will manage those risks.…

    • 309 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    RAR Template 07112007 3

    • 5647 Words
    • 25 Pages

    The Centers for Disease Control and Prevention (CDC) recognizes the best, most up-to-date health information is without value unless it is pertinent and accessible to the people it is meant to serve. Lockheed Martin Information Technology has been tasked to conduct a risk assessment of the <System Name and Acronym> for the purpose of certification and accreditation (C&A) of <System Name> under DHHS Information Security Program Policy. This Risk Assessment Report, in conjunction with the System Security Plan, assesses the use of resources and controls to eliminate and/or manage vulnerabilities that are exploitable by threats internal and external to CDC. The successful completion of the C&A process results in a formal Authorization to Operate of <System Name>.…

    • 5647 Words
    • 25 Pages
    Powerful Essays
  • Good Essays

    Anyone with a laptop or tablet could access the network and with only few basic network utilities could access all the servers and all the patient information. Most of these facilities are not implementing any Network Security because of the cost associated with it. “Most healthcare organizations nationwide, some 61 percent to be exact, reported a security related incident in the form of security breach, data loss or unplanned downtime at least once this past year, according to a new health IT report by MeriTalk, a public-private organization working to improve government information technology. These security events cost U.S. hospitals an estimated $1.6 billion each year. Breaking it down by incident, hospitals should expect to hand over on average $810,000 per security breach, which occurs at nearly one in five healthcare organizations nationwide” (healthcareitnews.com). I hope that with this project I can make clear the benefits of securing the network and the steps we need to take to set up and secure the…

    • 698 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Using the Delphi method a group of selected Subject Matter Experts (SMEs) can define the scope of the risk analysis. The SMEs will identify potential threats and vulnerabilities, determine the likelihood and impact of the threats and analyze and recommend security measures and determine risk levels. High emphasis will be placed in determining potential risks and vulnerabilities to the confidentiality, availability and integrity of all Electronic Personal Health Information (EPHI) that this office creates, receives, maintains, or transmits.…

    • 311 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    ISSC 363 Week 2 Quiz

    • 320 Words
    • 2 Pages

    In which of the IT domains is a hub considered a major component of risk?…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ping sweeps and port scans are two techniques that a malicious computer user such as a hacker can utilize to compromise an Enterprise networks security and gain access to their proprietary data. For example, private email messages can be forwarded to a rogue destination email address: Done by installing a virus program into a user’s email client through a discovered active computers open TCP/IP IMAP port (port number 143) that is not being currently used by that user (Clarke, 2008). The virus then could take advantage of security vulnerabilities in that users email client program and forward emails from that users inbox over to another destination email address without them knowing about it. Therefore, in light of such exploits as just described it is vitally important to address and mitigate the security problem to an Enterprise network from ping sweeps and port scans that can be incurred from outside sources by the use of strong Firewall protections.…

    • 631 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    I have been asked to implement a system design for Acme Manufacturing, linking all their computers to each other with a (WAN). The WAN network has all the features that all are used to in the current LAN. With the WAN network, employees are able to connect to another network remotely. As a system designer, it is my privilege to implement such a design. This document will show the design system in detail, with a follow-up section for someone that may have a system design question. I hope everyone will find this document informative as well as instructive.…

    • 1101 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Perform a risk assessment. Perform a risk assessment. Fill out the control table for Classic Catalog Company…

    • 262 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Risk Scenario

    • 4258 Words
    • 18 Pages

    The issue of risk scenario carries immense importance for most of the hospitals that are part of the healthcare setting. However, there is not only one scenario that can affect the hospitals but there are several scenarios that can create an impact on the functions of the hospital. There are three scenarios that would be highlighted in the current topic. These three scenarios have a tendency to put a hospital at risk for financial stability. The first scenario that can produce a negative impact on the hospital risk is related to patient care and safety. The second scenario is related to the physical plant. The third and last scenario is related to staffing. The role of HIM practitioner in this regard would be very important. They would serve as a clinical quality assessment resource and as a team member to perform their tasks related to healthcare work. Therefore, all the issues related to three scenarios will be discussed in detail.…

    • 4258 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    This is my report on why I believe that it is important to protect our Windows and Unix/Linux servers from known vulnerabilities. As I am sure you know, there are many different types of attacks on servers/network systems today. Throughout this report, I will illustrate a few of the more recently known/discovered vulnerabilities on both the Windows and Unix/Linus servers.…

    • 571 Words
    • 3 Pages
    Good Essays