SlideShare a Scribd company logo
1 of 2
Download to read offline
Problem Statement
The subject is a cybersecurity solution for a major hospital, identified as Big City Hospital. The
hospital uses a variety of IT systems connected via a hospital local area network (LAN) to create a
hospital information enterprise. The enterprise interacts with external organizations and users via
the public Internet. This IT environment is used to manage:
Patient records and related data.
Pharmacy data on drug inventories, dispensing, ordering, disposal, etc.
Medical supplies data, including inventories, usage, and ordering.
Scheduling of operating theaters, treatment facilities, and other shared facilities, equipment, and
resources.
Staff records, including medical professionals, affiliated providers, administrative staff, and
maintenance staff.
Food service operations, including a cafeteria and room service for patients.
General operations data such as building and equipment maintenance, janitorial services, non-
medical supplies, telecommunications and net-work services, etc.
Much of the hospitals data is highly sensitive. Patient information is protected by public law (e.g.
HIPAA), and other personal data requires a high level of protection. Pharmacy data can be stolen
or corrupted as part of the theft of expensive drugs for illegal resale. Personal data on staff
members is also subject to theft, including identity theft. Other data requires various levels of
protection based on its sensitivity. Corruption, hostile encryption, or deletion of patient records has
major implications for their care and thus raises a serious safety concern.
Threats to these information assets can arise from the full spectrum of Threat Agents. A particular
concern of the health care industry is ransomware attacks, in which the attacker gains access to
data repositories, encrypts them, and demands payment to provide the key to decrypt the files.
Organized crime is known to be using stolen drugs as a major source of revenue. Hackers,
disgruntled current or former employees, and others may attempt to breach the hospital enterprise
for a variety of reasons. Insiders, both malicious and inadvertent, are involved in many attack
scenarios.
The hospitals owners and executives have promulgated a security policy with the following key
features:
Business Security Objectives the following represent the acceptable level of residual risk after
security controls are implemented:
No more than one data breach per year of any kind.
Probability of exposure of Most Sensitive data < 1% per year (1 exposure every 100 years).
System Availability > 98%.
IT Security Policy the following specific security measures will be implemented as part of an
overall balanced and operationally effective cybersecurity solution:
Strong Authentication maximize confidentiality by minimizing the risk of unauthorized access to
resources.
Mandatory Access Control all sensitive assets will have explicit access permissions.
Role-Based Fine-Grained Authorizations/Access Permissions each distinct protected asset will
have specific access permissions.
Active User Account Management accounts will be actively maintained to enforce only current
access permissions, will be monitored for unusual activity, and will be closed immediately upon
employee termination/departure.
Principle of Least Privilege users will be granted only the access permissions associated with
their current job responsibilities.
Layered Defense security controls will be implemented in an architecture based on Defense-in-
Depth and Zero-Trust.
Data Integrity maximize integrity by protecting data at rest, in use, and in motion.
Intrusion Prevention/Data Loss Prevention active protection will be implemented to detect and
block suspicious or unauthorized at-tempts to access protected assets.
Protection Against Insider Threats measures will be implemented to train and motivate employees
in secure practices and to identify suspicious behaviors that may indicate malicious activity.
Questions
(4) Assume a risk has been identified resulting from a vulnerability in the system that manages the
Patient Information Database. The estimated cost to restore the database if it is entirely lost or
corrupted is assessed as $1M, and the economic damage due to patients and doctors moving to
other hospitals is estimated to be an additional $1M. Based on published information on
cyberattacks in the health care industry, the estimated number of successful attacks based on
exploitation of the vulnerability is four (4) per year, and each successful attack is estimated to cost
the hospital 5% of the estimated total potential loss. Further assume that a commercial product
has been identified that will reduce the loss from a breach by a factor of ten (10) to 0.5% of the
total. What is the maximum annual total cost for this product to achieve a positive return on the
investment to procure it (i.e., a positive Control Value)?
(3) Layered Defense. Describe a layered defense strategy for the Big City Hospital IT enterprise
based on Defense-in-Depth and Zero-Trust. Base your approach on the Problem Statement,
including the threats and vulnerabilities you have identified, various levels of asset sensitivity, and
the IT Security Policy. Consider the balance between the cost and operational impact of your
solution vs. achieving the acceptable level of risk (dont just write down every countermeasure
youve heard of). At a minimum, address the following:
(a) Identify a set of DiD layers and specific security controls to be implemented in each layer. [25
points]
(b) Identify an approach to network segmentation. [15 points]
(c) Briefly describe how other elements of a Zero-Trust architecture can be implemented. [20
points]
(d) Briefly describe an approach to maintain data Integrity. [15 points]
(5) Governance. Summarize a Cybersecurity Governance strategy for the Big City Hospital.
Specifically:
(a) Identify organizational roles and responsibilities in Governance. [20 points]
(b) Identify three Administrative Governance activities. [15 points]
(c) Identify three Technical Governance activities. [15 points]

More Related Content

Similar to Problem Statement The subject is a cybersecurity solution fo.pdf

Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...cyberprosocial
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guideMark Bennett
 
Cybersecurity Challenges in the Healthcare Industry.pdf
Cybersecurity Challenges in the Healthcare Industry.pdfCybersecurity Challenges in the Healthcare Industry.pdf
Cybersecurity Challenges in the Healthcare Industry.pdfMobibizIndia1
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 
The Importance of Data Center Security and Risk Management.pptx
The Importance of Data Center Security and Risk Management.pptxThe Importance of Data Center Security and Risk Management.pptx
The Importance of Data Center Security and Risk Management.pptxBluechip Gulf IT Services
 
Cyber and information security operations and assurance
Cyber and information security operations and assurance Cyber and information security operations and assurance
Cyber and information security operations and assurance EyesOpen Association
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk ManagementDMIMarketing
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxArti Parab Academics
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementDMIMarketing
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4stevemeltzer
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4stevemeltzer
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4stevemeltzer
 
clearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochureclearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochureLee Dalton
 

Similar to Problem Statement The subject is a cybersecurity solution fo.pdf (20)

Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
Cybersecurity Challenges in the Healthcare Industry.pdf
Cybersecurity Challenges in the Healthcare Industry.pdfCybersecurity Challenges in the Healthcare Industry.pdf
Cybersecurity Challenges in the Healthcare Industry.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
The Importance of Data Center Security and Risk Management.pptx
The Importance of Data Center Security and Risk Management.pptxThe Importance of Data Center Security and Risk Management.pptx
The Importance of Data Center Security and Risk Management.pptx
 
Cyber and information security operations and assurance
Cyber and information security operations and assurance Cyber and information security operations and assurance
Cyber and information security operations and assurance
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
Data security
Data securityData security
Data security
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptx
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4The New Massachusetts Privacy Rules V4
The New Massachusetts Privacy Rules V4
 
IBM Security Services
IBM Security ServicesIBM Security Services
IBM Security Services
 
N018138696
N018138696N018138696
N018138696
 
clearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochureclearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochure
 
MIS chap # 9.....
MIS chap # 9.....MIS chap # 9.....
MIS chap # 9.....
 

More from SUNIL64154

The Sebeka Company reports the following information pertain.pdf
The Sebeka Company reports the following information pertain.pdfThe Sebeka Company reports the following information pertain.pdf
The Sebeka Company reports the following information pertain.pdfSUNIL64154
 
Which of the following services is used to connect to the Li.pdf
Which of the following services is used to connect to the Li.pdfWhich of the following services is used to connect to the Li.pdf
Which of the following services is used to connect to the Li.pdfSUNIL64154
 
Suppose that Any makes a new carh deposit ef 120000 at her.pdf
Suppose that Any makes a new carh deposit ef 120000 at her.pdfSuppose that Any makes a new carh deposit ef 120000 at her.pdf
Suppose that Any makes a new carh deposit ef 120000 at her.pdfSUNIL64154
 
Question 2 58 marks Anamaria Tial Balance The following b.pdf
Question 2 58 marks Anamaria Tial Balance The following b.pdfQuestion 2 58 marks Anamaria Tial Balance The following b.pdf
Question 2 58 marks Anamaria Tial Balance The following b.pdfSUNIL64154
 
Aadakilerden hangisi abiyotik faktr veya ekosistemdir Biri.pdf
Aadakilerden hangisi abiyotik faktr veya ekosistemdir Biri.pdfAadakilerden hangisi abiyotik faktr veya ekosistemdir Biri.pdf
Aadakilerden hangisi abiyotik faktr veya ekosistemdir Biri.pdfSUNIL64154
 
Some people dispute the validity of GDP as a measure of well.pdf
Some people dispute the validity of GDP as a measure of well.pdfSome people dispute the validity of GDP as a measure of well.pdf
Some people dispute the validity of GDP as a measure of well.pdfSUNIL64154
 
Skysong Corporation acquired a 34 interest in Sheridan Comp.pdf
Skysong Corporation acquired a 34 interest in Sheridan Comp.pdfSkysong Corporation acquired a 34 interest in Sheridan Comp.pdf
Skysong Corporation acquired a 34 interest in Sheridan Comp.pdfSUNIL64154
 
Select either WiFi5 80211ac or WiFi6 80211ax capable .pdf
Select either WiFi5 80211ac or WiFi6 80211ax capable .pdfSelect either WiFi5 80211ac or WiFi6 80211ax capable .pdf
Select either WiFi5 80211ac or WiFi6 80211ax capable .pdfSUNIL64154
 
Review and analyze the following RFP below at httpswwwc.pdf
Review and analyze the following RFP below at httpswwwc.pdfReview and analyze the following RFP below at httpswwwc.pdf
Review and analyze the following RFP below at httpswwwc.pdfSUNIL64154
 
Refer to the diagram to the right What is the incremental c.pdf
Refer to the diagram to the right What is the incremental c.pdfRefer to the diagram to the right What is the incremental c.pdf
Refer to the diagram to the right What is the incremental c.pdfSUNIL64154
 
Practice for blood pathway to the arm Fill in the vessels .pdf
Practice for blood pathway to the arm Fill in the vessels .pdfPractice for blood pathway to the arm Fill in the vessels .pdf
Practice for blood pathway to the arm Fill in the vessels .pdfSUNIL64154
 
P1512A LO6 AP Three different lease transactions are pre.pdf
P1512A  LO6 AP Three different lease transactions are pre.pdfP1512A  LO6 AP Three different lease transactions are pre.pdf
P1512A LO6 AP Three different lease transactions are pre.pdfSUNIL64154
 
On January 1 Sarasota Corp had 62400 shares of nopar com.pdf
On January 1 Sarasota Corp had 62400 shares of nopar com.pdfOn January 1 Sarasota Corp had 62400 shares of nopar com.pdf
On January 1 Sarasota Corp had 62400 shares of nopar com.pdfSUNIL64154
 
Ortak bir farkl varlklar kmesinde optimum eitlendirme yapa.pdf
Ortak bir farkl varlklar kmesinde optimum eitlendirme yapa.pdfOrtak bir farkl varlklar kmesinde optimum eitlendirme yapa.pdf
Ortak bir farkl varlklar kmesinde optimum eitlendirme yapa.pdfSUNIL64154
 
MZAKERE Pozisyonel Duru ve Pozisyonel Pazarlk arasndaki fa.pdf
MZAKERE  Pozisyonel Duru ve Pozisyonel Pazarlk arasndaki fa.pdfMZAKERE  Pozisyonel Duru ve Pozisyonel Pazarlk arasndaki fa.pdf
MZAKERE Pozisyonel Duru ve Pozisyonel Pazarlk arasndaki fa.pdfSUNIL64154
 
Madde 1 Aadaki durumda orijinal kaynak materyal bir renc.pdf
Madde 1  Aadaki durumda orijinal kaynak materyal bir renc.pdfMadde 1  Aadaki durumda orijinal kaynak materyal bir renc.pdf
Madde 1 Aadaki durumda orijinal kaynak materyal bir renc.pdfSUNIL64154
 
Let X1Xn be an iid sample from the mixture distribut.pdf
Let X1Xn be an iid sample from the mixture distribut.pdfLet X1Xn be an iid sample from the mixture distribut.pdf
Let X1Xn be an iid sample from the mixture distribut.pdfSUNIL64154
 
In humans the ABO blood type is under the control of autoso.pdf
In humans the ABO blood type is under the control of autoso.pdfIn humans the ABO blood type is under the control of autoso.pdf
In humans the ABO blood type is under the control of autoso.pdfSUNIL64154
 
Let D161921E16181920 and F1517181921 List.pdf
Let D161921E16181920 and F1517181921 List.pdfLet D161921E16181920 and F1517181921 List.pdf
Let D161921E16181920 and F1517181921 List.pdfSUNIL64154
 
Im doing homework for my OOP class and I cannot figure out.pdf
Im doing homework for my OOP class and I cannot figure out.pdfIm doing homework for my OOP class and I cannot figure out.pdf
Im doing homework for my OOP class and I cannot figure out.pdfSUNIL64154
 

More from SUNIL64154 (20)

The Sebeka Company reports the following information pertain.pdf
The Sebeka Company reports the following information pertain.pdfThe Sebeka Company reports the following information pertain.pdf
The Sebeka Company reports the following information pertain.pdf
 
Which of the following services is used to connect to the Li.pdf
Which of the following services is used to connect to the Li.pdfWhich of the following services is used to connect to the Li.pdf
Which of the following services is used to connect to the Li.pdf
 
Suppose that Any makes a new carh deposit ef 120000 at her.pdf
Suppose that Any makes a new carh deposit ef 120000 at her.pdfSuppose that Any makes a new carh deposit ef 120000 at her.pdf
Suppose that Any makes a new carh deposit ef 120000 at her.pdf
 
Question 2 58 marks Anamaria Tial Balance The following b.pdf
Question 2 58 marks Anamaria Tial Balance The following b.pdfQuestion 2 58 marks Anamaria Tial Balance The following b.pdf
Question 2 58 marks Anamaria Tial Balance The following b.pdf
 
Aadakilerden hangisi abiyotik faktr veya ekosistemdir Biri.pdf
Aadakilerden hangisi abiyotik faktr veya ekosistemdir Biri.pdfAadakilerden hangisi abiyotik faktr veya ekosistemdir Biri.pdf
Aadakilerden hangisi abiyotik faktr veya ekosistemdir Biri.pdf
 
Some people dispute the validity of GDP as a measure of well.pdf
Some people dispute the validity of GDP as a measure of well.pdfSome people dispute the validity of GDP as a measure of well.pdf
Some people dispute the validity of GDP as a measure of well.pdf
 
Skysong Corporation acquired a 34 interest in Sheridan Comp.pdf
Skysong Corporation acquired a 34 interest in Sheridan Comp.pdfSkysong Corporation acquired a 34 interest in Sheridan Comp.pdf
Skysong Corporation acquired a 34 interest in Sheridan Comp.pdf
 
Select either WiFi5 80211ac or WiFi6 80211ax capable .pdf
Select either WiFi5 80211ac or WiFi6 80211ax capable .pdfSelect either WiFi5 80211ac or WiFi6 80211ax capable .pdf
Select either WiFi5 80211ac or WiFi6 80211ax capable .pdf
 
Review and analyze the following RFP below at httpswwwc.pdf
Review and analyze the following RFP below at httpswwwc.pdfReview and analyze the following RFP below at httpswwwc.pdf
Review and analyze the following RFP below at httpswwwc.pdf
 
Refer to the diagram to the right What is the incremental c.pdf
Refer to the diagram to the right What is the incremental c.pdfRefer to the diagram to the right What is the incremental c.pdf
Refer to the diagram to the right What is the incremental c.pdf
 
Practice for blood pathway to the arm Fill in the vessels .pdf
Practice for blood pathway to the arm Fill in the vessels .pdfPractice for blood pathway to the arm Fill in the vessels .pdf
Practice for blood pathway to the arm Fill in the vessels .pdf
 
P1512A LO6 AP Three different lease transactions are pre.pdf
P1512A  LO6 AP Three different lease transactions are pre.pdfP1512A  LO6 AP Three different lease transactions are pre.pdf
P1512A LO6 AP Three different lease transactions are pre.pdf
 
On January 1 Sarasota Corp had 62400 shares of nopar com.pdf
On January 1 Sarasota Corp had 62400 shares of nopar com.pdfOn January 1 Sarasota Corp had 62400 shares of nopar com.pdf
On January 1 Sarasota Corp had 62400 shares of nopar com.pdf
 
Ortak bir farkl varlklar kmesinde optimum eitlendirme yapa.pdf
Ortak bir farkl varlklar kmesinde optimum eitlendirme yapa.pdfOrtak bir farkl varlklar kmesinde optimum eitlendirme yapa.pdf
Ortak bir farkl varlklar kmesinde optimum eitlendirme yapa.pdf
 
MZAKERE Pozisyonel Duru ve Pozisyonel Pazarlk arasndaki fa.pdf
MZAKERE  Pozisyonel Duru ve Pozisyonel Pazarlk arasndaki fa.pdfMZAKERE  Pozisyonel Duru ve Pozisyonel Pazarlk arasndaki fa.pdf
MZAKERE Pozisyonel Duru ve Pozisyonel Pazarlk arasndaki fa.pdf
 
Madde 1 Aadaki durumda orijinal kaynak materyal bir renc.pdf
Madde 1  Aadaki durumda orijinal kaynak materyal bir renc.pdfMadde 1  Aadaki durumda orijinal kaynak materyal bir renc.pdf
Madde 1 Aadaki durumda orijinal kaynak materyal bir renc.pdf
 
Let X1Xn be an iid sample from the mixture distribut.pdf
Let X1Xn be an iid sample from the mixture distribut.pdfLet X1Xn be an iid sample from the mixture distribut.pdf
Let X1Xn be an iid sample from the mixture distribut.pdf
 
In humans the ABO blood type is under the control of autoso.pdf
In humans the ABO blood type is under the control of autoso.pdfIn humans the ABO blood type is under the control of autoso.pdf
In humans the ABO blood type is under the control of autoso.pdf
 
Let D161921E16181920 and F1517181921 List.pdf
Let D161921E16181920 and F1517181921 List.pdfLet D161921E16181920 and F1517181921 List.pdf
Let D161921E16181920 and F1517181921 List.pdf
 
Im doing homework for my OOP class and I cannot figure out.pdf
Im doing homework for my OOP class and I cannot figure out.pdfIm doing homework for my OOP class and I cannot figure out.pdf
Im doing homework for my OOP class and I cannot figure out.pdf
 

Recently uploaded

COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 

Recently uploaded (20)

COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 

Problem Statement The subject is a cybersecurity solution fo.pdf

  • 1. Problem Statement The subject is a cybersecurity solution for a major hospital, identified as Big City Hospital. The hospital uses a variety of IT systems connected via a hospital local area network (LAN) to create a hospital information enterprise. The enterprise interacts with external organizations and users via the public Internet. This IT environment is used to manage: Patient records and related data. Pharmacy data on drug inventories, dispensing, ordering, disposal, etc. Medical supplies data, including inventories, usage, and ordering. Scheduling of operating theaters, treatment facilities, and other shared facilities, equipment, and resources. Staff records, including medical professionals, affiliated providers, administrative staff, and maintenance staff. Food service operations, including a cafeteria and room service for patients. General operations data such as building and equipment maintenance, janitorial services, non- medical supplies, telecommunications and net-work services, etc. Much of the hospitals data is highly sensitive. Patient information is protected by public law (e.g. HIPAA), and other personal data requires a high level of protection. Pharmacy data can be stolen or corrupted as part of the theft of expensive drugs for illegal resale. Personal data on staff members is also subject to theft, including identity theft. Other data requires various levels of protection based on its sensitivity. Corruption, hostile encryption, or deletion of patient records has major implications for their care and thus raises a serious safety concern. Threats to these information assets can arise from the full spectrum of Threat Agents. A particular concern of the health care industry is ransomware attacks, in which the attacker gains access to data repositories, encrypts them, and demands payment to provide the key to decrypt the files. Organized crime is known to be using stolen drugs as a major source of revenue. Hackers, disgruntled current or former employees, and others may attempt to breach the hospital enterprise for a variety of reasons. Insiders, both malicious and inadvertent, are involved in many attack scenarios. The hospitals owners and executives have promulgated a security policy with the following key features: Business Security Objectives the following represent the acceptable level of residual risk after security controls are implemented: No more than one data breach per year of any kind. Probability of exposure of Most Sensitive data < 1% per year (1 exposure every 100 years). System Availability > 98%. IT Security Policy the following specific security measures will be implemented as part of an overall balanced and operationally effective cybersecurity solution: Strong Authentication maximize confidentiality by minimizing the risk of unauthorized access to resources. Mandatory Access Control all sensitive assets will have explicit access permissions. Role-Based Fine-Grained Authorizations/Access Permissions each distinct protected asset will have specific access permissions.
  • 2. Active User Account Management accounts will be actively maintained to enforce only current access permissions, will be monitored for unusual activity, and will be closed immediately upon employee termination/departure. Principle of Least Privilege users will be granted only the access permissions associated with their current job responsibilities. Layered Defense security controls will be implemented in an architecture based on Defense-in- Depth and Zero-Trust. Data Integrity maximize integrity by protecting data at rest, in use, and in motion. Intrusion Prevention/Data Loss Prevention active protection will be implemented to detect and block suspicious or unauthorized at-tempts to access protected assets. Protection Against Insider Threats measures will be implemented to train and motivate employees in secure practices and to identify suspicious behaviors that may indicate malicious activity. Questions (4) Assume a risk has been identified resulting from a vulnerability in the system that manages the Patient Information Database. The estimated cost to restore the database if it is entirely lost or corrupted is assessed as $1M, and the economic damage due to patients and doctors moving to other hospitals is estimated to be an additional $1M. Based on published information on cyberattacks in the health care industry, the estimated number of successful attacks based on exploitation of the vulnerability is four (4) per year, and each successful attack is estimated to cost the hospital 5% of the estimated total potential loss. Further assume that a commercial product has been identified that will reduce the loss from a breach by a factor of ten (10) to 0.5% of the total. What is the maximum annual total cost for this product to achieve a positive return on the investment to procure it (i.e., a positive Control Value)? (3) Layered Defense. Describe a layered defense strategy for the Big City Hospital IT enterprise based on Defense-in-Depth and Zero-Trust. Base your approach on the Problem Statement, including the threats and vulnerabilities you have identified, various levels of asset sensitivity, and the IT Security Policy. Consider the balance between the cost and operational impact of your solution vs. achieving the acceptable level of risk (dont just write down every countermeasure youve heard of). At a minimum, address the following: (a) Identify a set of DiD layers and specific security controls to be implemented in each layer. [25 points] (b) Identify an approach to network segmentation. [15 points] (c) Briefly describe how other elements of a Zero-Trust architecture can be implemented. [20 points] (d) Briefly describe an approach to maintain data Integrity. [15 points] (5) Governance. Summarize a Cybersecurity Governance strategy for the Big City Hospital. Specifically: (a) Identify organizational roles and responsibilities in Governance. [20 points] (b) Identify three Administrative Governance activities. [15 points] (c) Identify three Technical Governance activities. [15 points]