First half page executive summary about company 150 words
· You are an Information Technology (IT) intern
· Health Network Inc.
· Headquartered in Minneapolis, Minnesota
· Two other locations
· Portland Oregon
· Arlington Virginia
· Over 600 employees
· $500 million USD annual revenue
· Each location is near a data center
· Managed by a third party vendor
· Production centers located at the data centers
·
Second half page about product of our company 100 words ( change word, give different example in 3 products don’t use similar sentence.
Health network’s Three products
· HNetExchange
· Handles secure electronic medical messages between
· Large customers such as hospitals and
· Small customers such as clinics
· HNetPay
· Web Portal to support secure payments
· Accepts various payment methods
· HNetConnect
· Allows customers to find Doctors
· Contains profiles of doctors, clinics and patients
Second Page risk management plan about 300 words, Current risk management plan outdated, Your assignment is to create a new one, Additional threats may be found during re-evaluation, No budget has been set on the project, google and find recent threat weakness and vulnerabilities.
Don’t use below fine new risk and how you can plan new risk assessment .
· Loss of company data due to hardware being removed from production systems
· Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops
· Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and so on
· Internet threats due to company products being accessible on the Internet
· Insider threats
· Changes in regulatory landscape that may impact operations
Compliance Laws and Regulations
<List the laws and regulations that affect this industry.>
150 words for above law
Third task is table
In column change below example and use it in below table with domain name and add risk factors
Risks, Threats, and Vulnerabilities
Unauthorized access from public Internet
Hacker penetrates IT infrastructure
Communication circuit outages
Workstations
Workstation operating system (OS) has a known software vulnerability
Denial of service attack on organization’s e-mail
Remote communications from home office
Workstation browser has software vulnerability
Weak ingress/egress traffic-filtering degrades performance
Wireless Local Area Network (WLAN) access points are needed for Local Area Network (LAN) connectivity within a warehouse
Need to prevent rogue users from unauthorized WLAN access
User destroys data in application, deletes all files, and gains access to internal network
Fire destroys primary data center
Intraoffice employee romance gone bad
Loss of production data server
Unauthorized access to organization-owned workstations
LAN server OS has a known software vulnerability
User downloads an unknown e-mail attachment
Service provider has a major network outage
Us.
First half page executive summary about company 150 words · You .docx
1. First half page executive summary about company 150 words
· You are an Information Technology (IT) intern
· Health Network Inc.
· Headquartered in Minneapolis, Minnesota
· Two other locations
· Portland Oregon
· Arlington Virginia
· Over 600 employees
· $500 million USD annual revenue
· Each location is near a data center
· Managed by a third party vendor
· Production centers located at the data centers
·
Second half page about product of our company 100 words (
change word, give different example in 3 products don’t use
similar sentence.
Health network’s Three products
· HNetExchange
· Handles secure electronic medical messages between
· Large customers such as hospitals and
· Small customers such as clinics
· HNetPay
· Web Portal to support secure payments
· Accepts various payment methods
· HNetConnect
· Allows customers to find Doctors
· Contains profiles of doctors, clinics and patients
Second Page risk management plan about 300 words, Current
risk management plan outdated, Your assignment is to create a
new one, Additional threats may be found during re-evaluation,
No budget has been set on the project, google and find recent
threat weakness and vulnerabilities.
Don’t use below fine new risk and how you can plan new risk
assessment .
2. · Loss of company data due to hardware being removed from
production systems
· Loss of company information on lost or stolen company-
owned assets, such as mobile devices and laptops
· Loss of customers due to production outages caused by various
events, such as natural disasters, change management, unstable
software, and so on
· Internet threats due to company products being accessible on
the Internet
· Insider threats
· Changes in regulatory landscape that may impact operations
Compliance Laws and Regulations
<List the laws and regulations that affect this industry.>
150 words for above law
Third task is table
In column change below example and use it in below table with
domain name and add risk factors
Risks, Threats, and Vulnerabilities
Unauthorized access from public Internet
Hacker penetrates IT infrastructure
Communication circuit outages
Workstations
Workstation operating system (OS) has a known software
vulnerability
Denial of service attack on organization’s e-mail
Remote communications from home office
Workstation browser has software vulnerability
Weak ingress/egress traffic-filtering degrades performance
Wireless Local Area Network (WLAN) access points are
needed for Local Area Network (LAN) connectivity within a
warehouse
Need to prevent rogue users from unauthorized WLAN access
User destroys data in application, deletes all files, and gains
access to internal network
Fire destroys primary data center
Intraoffice employee romance gone bad
3. Loss of production data server
Unauthorized access to organization-owned workstations
LAN server OS has a known software vulnerability
User downloads an unknown e-mail attachment
Service provider has a major network outage
User inserts CDs and USB hard drives with personal photos,
music, and videos on organizationowned computers
Virtual Private Network (VPN) tunneling between the remote
computer and ingress/egress router
R-T-W
Domain Impacted
Risk Impact / Factor
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness: