SlideShare a Scribd company logo
1 of 5
First half page executive summary about company 150 words
· You are an Information Technology (IT) intern
· Health Network Inc.
· Headquartered in Minneapolis, Minnesota
· Two other locations
· Portland Oregon
· Arlington Virginia
· Over 600 employees
· $500 million USD annual revenue
· Each location is near a data center
· Managed by a third party vendor
· Production centers located at the data centers
·
Second half page about product of our company 100 words (
change word, give different example in 3 products don’t use
similar sentence.
Health network’s Three products
· HNetExchange
· Handles secure electronic medical messages between
· Large customers such as hospitals and
· Small customers such as clinics
· HNetPay
· Web Portal to support secure payments
· Accepts various payment methods
· HNetConnect
· Allows customers to find Doctors
· Contains profiles of doctors, clinics and patients
Second Page risk management plan about 300 words, Current
risk management plan outdated, Your assignment is to create a
new one, Additional threats may be found during re-evaluation,
No budget has been set on the project, google and find recent
threat weakness and vulnerabilities.
Don’t use below fine new risk and how you can plan new risk
assessment .
· Loss of company data due to hardware being removed from
production systems
· Loss of company information on lost or stolen company-
owned assets, such as mobile devices and laptops
· Loss of customers due to production outages caused by various
events, such as natural disasters, change management, unstable
software, and so on
· Internet threats due to company products being accessible on
the Internet
· Insider threats
· Changes in regulatory landscape that may impact operations
Compliance Laws and Regulations
<List the laws and regulations that affect this industry.>
150 words for above law
Third task is table
In column change below example and use it in below table with
domain name and add risk factors
Risks, Threats, and Vulnerabilities
Unauthorized access from public Internet
Hacker penetrates IT infrastructure
Communication circuit outages
Workstations
Workstation operating system (OS) has a known software
vulnerability
Denial of service attack on organization’s e-mail
Remote communications from home office
Workstation browser has software vulnerability
Weak ingress/egress traffic-filtering degrades performance
Wireless Local Area Network (WLAN) access points are
needed for Local Area Network (LAN) connectivity within a
warehouse
Need to prevent rogue users from unauthorized WLAN access
User destroys data in application, deletes all files, and gains
access to internal network
Fire destroys primary data center
Intraoffice employee romance gone bad
Loss of production data server
Unauthorized access to organization-owned workstations
LAN server OS has a known software vulnerability
User downloads an unknown e-mail attachment
Service provider has a major network outage
User inserts CDs and USB hard drives with personal photos,
music, and videos on organizationowned computers
Virtual Private Network (VPN) tunneling between the remote
computer and ingress/egress router
R-T-W
Domain Impacted
Risk Impact / Factor
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Table 1

More Related Content

Similar to First half page executive summary about company 150 words · You .docx

Chapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxChapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxketurahhazelhurst
 
Chapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxChapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxwalterl4
 
MISO L007 managing system security
MISO L007 managing system securityMISO L007 managing system security
MISO L007 managing system securityJan Wong
 
Submission Requirementsproject submissions should follow th.docx
Submission Requirementsproject submissions should follow th.docxSubmission Requirementsproject submissions should follow th.docx
Submission Requirementsproject submissions should follow th.docxdavid4611
 
Problem Statement The subject is a cybersecurity solution fo.pdf
Problem Statement The subject is a cybersecurity solution fo.pdfProblem Statement The subject is a cybersecurity solution fo.pdf
Problem Statement The subject is a cybersecurity solution fo.pdfSUNIL64154
 
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docxRunning head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docxtodd521
 
Managing System Security
Managing System SecurityManaging System Security
Managing System SecurityPIREH
 
Electronic health records
Electronic health recordsElectronic health records
Electronic health recordsAnurag Deb
 
Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet  Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet AyushJadon5
 
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docxExcel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docxgitagrimston
 
Business Intelligence and Data Security for Long-Term Care Financial Professi...
Business Intelligence and Data Security for Long-Term Care Financial Professi...Business Intelligence and Data Security for Long-Term Care Financial Professi...
Business Intelligence and Data Security for Long-Term Care Financial Professi...Gross, Mendelsohn & Associates
 
NH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 KamensNH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 Kamenskamensm02
 
CST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.comCST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.comagathachristie265
 
CST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comCST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comchrysanthemu49
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data LeakagePatty Buckley
 
Cst 610 Believe Possibilities / snaptutorial.com
Cst 610  Believe Possibilities / snaptutorial.comCst 610  Believe Possibilities / snaptutorial.com
Cst 610 Believe Possibilities / snaptutorial.comDavis10a
 

Similar to First half page executive summary about company 150 words · You .docx (20)

Chapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxChapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docx
 
Chapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxChapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docx
 
internet intranet and extranet
internet intranet and extranetinternet intranet and extranet
internet intranet and extranet
 
MISO L007 managing system security
MISO L007 managing system securityMISO L007 managing system security
MISO L007 managing system security
 
Submission Requirementsproject submissions should follow th.docx
Submission Requirementsproject submissions should follow th.docxSubmission Requirementsproject submissions should follow th.docx
Submission Requirementsproject submissions should follow th.docx
 
Problem Statement The subject is a cybersecurity solution fo.pdf
Problem Statement The subject is a cybersecurity solution fo.pdfProblem Statement The subject is a cybersecurity solution fo.pdf
Problem Statement The subject is a cybersecurity solution fo.pdf
 
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docxRunning head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
 
Managing System Security
Managing System SecurityManaging System Security
Managing System Security
 
Electronic health records
Electronic health recordsElectronic health records
Electronic health records
 
Services and Products
Services and ProductsServices and Products
Services and Products
 
Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet  Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docxExcel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
 
Business Intelligence and Data Security for Long-Term Care Financial Professi...
Business Intelligence and Data Security for Long-Term Care Financial Professi...Business Intelligence and Data Security for Long-Term Care Financial Professi...
Business Intelligence and Data Security for Long-Term Care Financial Professi...
 
NH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 KamensNH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 Kamens
 
Audit Controls Paper
Audit Controls PaperAudit Controls Paper
Audit Controls Paper
 
CST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.comCST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.com
 
CST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comCST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.com
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data Leakage
 
Cst 610 Believe Possibilities / snaptutorial.com
Cst 610  Believe Possibilities / snaptutorial.comCst 610  Believe Possibilities / snaptutorial.com
Cst 610 Believe Possibilities / snaptutorial.com
 

More from clydes2

Floridas Construction defect statute, F.S. 558.001 and the balance .docx
Floridas Construction defect statute, F.S. 558.001 and the balance .docxFloridas Construction defect statute, F.S. 558.001 and the balance .docx
Floridas Construction defect statute, F.S. 558.001 and the balance .docxclydes2
 
FLORIDA NATIONAL UNIVERSITYRN-BSN PROGRAMNURSING DEPARTMENTN.docx
FLORIDA NATIONAL UNIVERSITYRN-BSN PROGRAMNURSING DEPARTMENTN.docxFLORIDA NATIONAL UNIVERSITYRN-BSN PROGRAMNURSING DEPARTMENTN.docx
FLORIDA NATIONAL UNIVERSITYRN-BSN PROGRAMNURSING DEPARTMENTN.docxclydes2
 
FLORIDA’S ENDANGERED AND THREATENED SPECIES Upda.docx
FLORIDA’S ENDANGERED AND THREATENED SPECIES Upda.docxFLORIDA’S ENDANGERED AND THREATENED SPECIES Upda.docx
FLORIDA’S ENDANGERED AND THREATENED SPECIES Upda.docxclydes2
 
Florida National UniversityNursing DepartmentBSN Program.docx
Florida National UniversityNursing DepartmentBSN Program.docxFlorida National UniversityNursing DepartmentBSN Program.docx
Florida National UniversityNursing DepartmentBSN Program.docxclydes2
 
Florida National UniversityBiomedical Ethics Assignment Week 2.docx
Florida National UniversityBiomedical Ethics Assignment Week 2.docxFlorida National UniversityBiomedical Ethics Assignment Week 2.docx
Florida National UniversityBiomedical Ethics Assignment Week 2.docxclydes2
 
FLORIDA NATIONAL UNIVERSITYRN TO BSN PROGRAM,COMMUNITY HEALT.docx
FLORIDA NATIONAL UNIVERSITYRN TO BSN PROGRAM,COMMUNITY HEALT.docxFLORIDA NATIONAL UNIVERSITYRN TO BSN PROGRAM,COMMUNITY HEALT.docx
FLORIDA NATIONAL UNIVERSITYRN TO BSN PROGRAM,COMMUNITY HEALT.docxclydes2
 
Flora DiamreyanLeading Health Promotion for Populations     .docx
Flora DiamreyanLeading Health Promotion for Populations     .docxFlora DiamreyanLeading Health Promotion for Populations     .docx
Flora DiamreyanLeading Health Promotion for Populations     .docxclydes2
 
Flood StoriesThe Epic of Gilgamesh (Norton 54-109) and .docx
Flood StoriesThe Epic of Gilgamesh (Norton 54-109) and .docxFlood StoriesThe Epic of Gilgamesh (Norton 54-109) and .docx
Flood StoriesThe Epic of Gilgamesh (Norton 54-109) and .docxclydes2
 
FLICKERING SNAPSHOTOF YAHOO S FUTUREMYSPACES BIC PLAN(.docx
FLICKERING SNAPSHOTOF YAHOO S FUTUREMYSPACES BIC PLAN(.docxFLICKERING SNAPSHOTOF YAHOO S FUTUREMYSPACES BIC PLAN(.docx
FLICKERING SNAPSHOTOF YAHOO S FUTUREMYSPACES BIC PLAN(.docxclydes2
 
Florida Department of Corrections- Suggested Action or Change Outlin.docx
Florida Department of Corrections- Suggested Action or Change Outlin.docxFlorida Department of Corrections- Suggested Action or Change Outlin.docx
Florida Department of Corrections- Suggested Action or Change Outlin.docxclydes2
 
Flora Smith and Harry Smith have one child. 10-year-old Mary Smith. .docx
Flora Smith and Harry Smith have one child. 10-year-old Mary Smith. .docxFlora Smith and Harry Smith have one child. 10-year-old Mary Smith. .docx
Flora Smith and Harry Smith have one child. 10-year-old Mary Smith. .docxclydes2
 
Flexible Budgeting and Analysis of Overhead CostsChapt.docx
Flexible Budgeting and Analysis of Overhead CostsChapt.docxFlexible Budgeting and Analysis of Overhead CostsChapt.docx
Flexible Budgeting and Analysis of Overhead CostsChapt.docxclydes2
 
Flashing Light BulbDeliverablescreate a single flashin.docx
Flashing Light BulbDeliverablescreate a single flashin.docxFlashing Light BulbDeliverablescreate a single flashin.docx
Flashing Light BulbDeliverablescreate a single flashin.docxclydes2
 
Flag question Question 1 Question 1 1ptsWhat two colo.docx
Flag question Question 1 Question 1 1ptsWhat two colo.docxFlag question Question 1 Question 1 1ptsWhat two colo.docx
Flag question Question 1 Question 1 1ptsWhat two colo.docxclydes2
 
Flag question Question 1 Question 1 1ptsIf the Sun .docx
Flag question Question 1 Question 1 1ptsIf the Sun .docxFlag question Question 1 Question 1 1ptsIf the Sun .docx
Flag question Question 1 Question 1 1ptsIf the Sun .docxclydes2
 
fl ast.indd 115723AM 01172014 Page xxffi rs..docx
fl ast.indd 115723AM  01172014 Page xxffi rs..docxfl ast.indd 115723AM  01172014 Page xxffi rs..docx
fl ast.indd 115723AM 01172014 Page xxffi rs..docxclydes2
 
FIVEWISHES®12345M Y W I S H F O R .docx
FIVEWISHES®12345M Y  W I S H  F O R .docxFIVEWISHES®12345M Y  W I S H  F O R .docx
FIVEWISHES®12345M Y W I S H F O R .docxclydes2
 
Five-year-old Xian Lei enters kindergarten with little under.docx
Five-year-old Xian Lei enters kindergarten with little under.docxFive-year-old Xian Lei enters kindergarten with little under.docx
Five-year-old Xian Lei enters kindergarten with little under.docxclydes2
 
FiveRivers Technologies  has been at the cutting edge of techn.docx
FiveRivers Technologies  has been at the cutting edge of techn.docxFiveRivers Technologies  has been at the cutting edge of techn.docx
FiveRivers Technologies  has been at the cutting edge of techn.docxclydes2
 
Five Training DesignLearningObjectivesAfterreading.docx
Five Training DesignLearningObjectivesAfterreading.docxFive Training DesignLearningObjectivesAfterreading.docx
Five Training DesignLearningObjectivesAfterreading.docxclydes2
 

More from clydes2 (20)

Floridas Construction defect statute, F.S. 558.001 and the balance .docx
Floridas Construction defect statute, F.S. 558.001 and the balance .docxFloridas Construction defect statute, F.S. 558.001 and the balance .docx
Floridas Construction defect statute, F.S. 558.001 and the balance .docx
 
FLORIDA NATIONAL UNIVERSITYRN-BSN PROGRAMNURSING DEPARTMENTN.docx
FLORIDA NATIONAL UNIVERSITYRN-BSN PROGRAMNURSING DEPARTMENTN.docxFLORIDA NATIONAL UNIVERSITYRN-BSN PROGRAMNURSING DEPARTMENTN.docx
FLORIDA NATIONAL UNIVERSITYRN-BSN PROGRAMNURSING DEPARTMENTN.docx
 
FLORIDA’S ENDANGERED AND THREATENED SPECIES Upda.docx
FLORIDA’S ENDANGERED AND THREATENED SPECIES Upda.docxFLORIDA’S ENDANGERED AND THREATENED SPECIES Upda.docx
FLORIDA’S ENDANGERED AND THREATENED SPECIES Upda.docx
 
Florida National UniversityNursing DepartmentBSN Program.docx
Florida National UniversityNursing DepartmentBSN Program.docxFlorida National UniversityNursing DepartmentBSN Program.docx
Florida National UniversityNursing DepartmentBSN Program.docx
 
Florida National UniversityBiomedical Ethics Assignment Week 2.docx
Florida National UniversityBiomedical Ethics Assignment Week 2.docxFlorida National UniversityBiomedical Ethics Assignment Week 2.docx
Florida National UniversityBiomedical Ethics Assignment Week 2.docx
 
FLORIDA NATIONAL UNIVERSITYRN TO BSN PROGRAM,COMMUNITY HEALT.docx
FLORIDA NATIONAL UNIVERSITYRN TO BSN PROGRAM,COMMUNITY HEALT.docxFLORIDA NATIONAL UNIVERSITYRN TO BSN PROGRAM,COMMUNITY HEALT.docx
FLORIDA NATIONAL UNIVERSITYRN TO BSN PROGRAM,COMMUNITY HEALT.docx
 
Flora DiamreyanLeading Health Promotion for Populations     .docx
Flora DiamreyanLeading Health Promotion for Populations     .docxFlora DiamreyanLeading Health Promotion for Populations     .docx
Flora DiamreyanLeading Health Promotion for Populations     .docx
 
Flood StoriesThe Epic of Gilgamesh (Norton 54-109) and .docx
Flood StoriesThe Epic of Gilgamesh (Norton 54-109) and .docxFlood StoriesThe Epic of Gilgamesh (Norton 54-109) and .docx
Flood StoriesThe Epic of Gilgamesh (Norton 54-109) and .docx
 
FLICKERING SNAPSHOTOF YAHOO S FUTUREMYSPACES BIC PLAN(.docx
FLICKERING SNAPSHOTOF YAHOO S FUTUREMYSPACES BIC PLAN(.docxFLICKERING SNAPSHOTOF YAHOO S FUTUREMYSPACES BIC PLAN(.docx
FLICKERING SNAPSHOTOF YAHOO S FUTUREMYSPACES BIC PLAN(.docx
 
Florida Department of Corrections- Suggested Action or Change Outlin.docx
Florida Department of Corrections- Suggested Action or Change Outlin.docxFlorida Department of Corrections- Suggested Action or Change Outlin.docx
Florida Department of Corrections- Suggested Action or Change Outlin.docx
 
Flora Smith and Harry Smith have one child. 10-year-old Mary Smith. .docx
Flora Smith and Harry Smith have one child. 10-year-old Mary Smith. .docxFlora Smith and Harry Smith have one child. 10-year-old Mary Smith. .docx
Flora Smith and Harry Smith have one child. 10-year-old Mary Smith. .docx
 
Flexible Budgeting and Analysis of Overhead CostsChapt.docx
Flexible Budgeting and Analysis of Overhead CostsChapt.docxFlexible Budgeting and Analysis of Overhead CostsChapt.docx
Flexible Budgeting and Analysis of Overhead CostsChapt.docx
 
Flashing Light BulbDeliverablescreate a single flashin.docx
Flashing Light BulbDeliverablescreate a single flashin.docxFlashing Light BulbDeliverablescreate a single flashin.docx
Flashing Light BulbDeliverablescreate a single flashin.docx
 
Flag question Question 1 Question 1 1ptsWhat two colo.docx
Flag question Question 1 Question 1 1ptsWhat two colo.docxFlag question Question 1 Question 1 1ptsWhat two colo.docx
Flag question Question 1 Question 1 1ptsWhat two colo.docx
 
Flag question Question 1 Question 1 1ptsIf the Sun .docx
Flag question Question 1 Question 1 1ptsIf the Sun .docxFlag question Question 1 Question 1 1ptsIf the Sun .docx
Flag question Question 1 Question 1 1ptsIf the Sun .docx
 
fl ast.indd 115723AM 01172014 Page xxffi rs..docx
fl ast.indd 115723AM  01172014 Page xxffi rs..docxfl ast.indd 115723AM  01172014 Page xxffi rs..docx
fl ast.indd 115723AM 01172014 Page xxffi rs..docx
 
FIVEWISHES®12345M Y W I S H F O R .docx
FIVEWISHES®12345M Y  W I S H  F O R .docxFIVEWISHES®12345M Y  W I S H  F O R .docx
FIVEWISHES®12345M Y W I S H F O R .docx
 
Five-year-old Xian Lei enters kindergarten with little under.docx
Five-year-old Xian Lei enters kindergarten with little under.docxFive-year-old Xian Lei enters kindergarten with little under.docx
Five-year-old Xian Lei enters kindergarten with little under.docx
 
FiveRivers Technologies  has been at the cutting edge of techn.docx
FiveRivers Technologies  has been at the cutting edge of techn.docxFiveRivers Technologies  has been at the cutting edge of techn.docx
FiveRivers Technologies  has been at the cutting edge of techn.docx
 
Five Training DesignLearningObjectivesAfterreading.docx
Five Training DesignLearningObjectivesAfterreading.docxFive Training DesignLearningObjectivesAfterreading.docx
Five Training DesignLearningObjectivesAfterreading.docx
 

Recently uploaded

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Recently uploaded (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

First half page executive summary about company 150 words · You .docx

  • 1. First half page executive summary about company 150 words · You are an Information Technology (IT) intern · Health Network Inc. · Headquartered in Minneapolis, Minnesota · Two other locations · Portland Oregon · Arlington Virginia · Over 600 employees · $500 million USD annual revenue · Each location is near a data center · Managed by a third party vendor · Production centers located at the data centers · Second half page about product of our company 100 words ( change word, give different example in 3 products don’t use similar sentence. Health network’s Three products · HNetExchange · Handles secure electronic medical messages between · Large customers such as hospitals and · Small customers such as clinics · HNetPay · Web Portal to support secure payments · Accepts various payment methods · HNetConnect · Allows customers to find Doctors · Contains profiles of doctors, clinics and patients Second Page risk management plan about 300 words, Current risk management plan outdated, Your assignment is to create a new one, Additional threats may be found during re-evaluation, No budget has been set on the project, google and find recent threat weakness and vulnerabilities. Don’t use below fine new risk and how you can plan new risk assessment .
  • 2. · Loss of company data due to hardware being removed from production systems · Loss of company information on lost or stolen company- owned assets, such as mobile devices and laptops · Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and so on · Internet threats due to company products being accessible on the Internet · Insider threats · Changes in regulatory landscape that may impact operations Compliance Laws and Regulations <List the laws and regulations that affect this industry.> 150 words for above law Third task is table In column change below example and use it in below table with domain name and add risk factors Risks, Threats, and Vulnerabilities Unauthorized access from public Internet Hacker penetrates IT infrastructure Communication circuit outages Workstations Workstation operating system (OS) has a known software vulnerability Denial of service attack on organization’s e-mail Remote communications from home office Workstation browser has software vulnerability Weak ingress/egress traffic-filtering degrades performance Wireless Local Area Network (WLAN) access points are needed for Local Area Network (LAN) connectivity within a warehouse Need to prevent rogue users from unauthorized WLAN access User destroys data in application, deletes all files, and gains access to internal network Fire destroys primary data center Intraoffice employee romance gone bad
  • 3. Loss of production data server Unauthorized access to organization-owned workstations LAN server OS has a known software vulnerability User downloads an unknown e-mail attachment Service provider has a major network outage User inserts CDs and USB hard drives with personal photos, music, and videos on organizationowned computers Virtual Private Network (VPN) tunneling between the remote computer and ingress/egress router R-T-W Domain Impacted Risk Impact / Factor Risk: Threat: Weakness: Risk: Threat: Weakness: Risk: Threat: Weakness: Risk: Threat: Weakness: Risk: Threat: Weakness: