subject

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are: User authentication and credentials with third-party applications 3 common security risks with ratings: low, medium or high Justification of your threat model (why it was chosen over the other two: compare and contrast) You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them. Your paper should meet the following requirements:Be approximately four to six pages in length, not including the required cover page and reference page. Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion. Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 08:00
Two technicians are discussing the common u-joint. technician a says its input and output speeds should be equal. technician b says that it normally has two yokes. which technician is correct?
Answers: 1
question
Computers and Technology, 22.06.2019 18:30
What is outfitting a workplace with video in a technology
Answers: 2
question
Computers and Technology, 23.06.2019 02:30
Research data that is presented using descriptive language is said to be
Answers: 2
question
Computers and Technology, 23.06.2019 07:00
1. you have a small business that is divided into 3 departments: accounting, sales, and administration. these departments have the following number of devices (computers, printers, etc.): accounting-31, sales-28, and administration-13. using a class c private network, subnet the network so that each department will have their own subnet. you must show/explain how you arrived at your conclusion and also show the following: all available device addresses for each department, the broadcast address for each department, and the network address for each department. also, determine how many "wasted" (not usable) addresses resulted from your subnetting (enumerate them).
Answers: 3
You know the right answer?
A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewha...
Questions
question
Mathematics, 11.02.2021 07:40
question
Mathematics, 11.02.2021 07:40
question
Mathematics, 11.02.2021 07:50
question
Mathematics, 11.02.2021 07:50
question
History, 11.02.2021 07:50
question
English, 11.02.2021 07:50
Questions on the website: 13722367