SlideShare a Scribd company logo
1 of 24
Running Head: EXECUTIVE SUMMARY 6
Executive Summary
Student’s Name:
Professor’s Name:
Date:
Executive Summary
The Health Network Hospital has its headquarters located in
Minneapolis, Minnesota with 600 employees and generates an
average of $500 million annually. Furthermore, it has its
branches in Portland, Oregon, and Arlington, Virginia which
support combinations of collective operations with each
carrying out production systems managed by respective third-
party data center hosting buyers in the strategic locations near a
co-location data center.
The company comprises of three major products, that is, the net
exchange which securely handles electronic media message
from large hospital customers and routes them to the receiving
customers like clinics. HNetPay, on the other hand, is a web
portal that deals with the management of safe payments and
billing. HNetConnect is an online directory listing medical
staffs and facilities enabling customers to choose the service of
their choice as even doctors credentials are updated frequently
in their respective profiles
The institution operates in 3 production data centers providing
high availability across its products which host an average of
1,000 production servers, with 650 laptops as well as mobile
devices issued to employees.
The Information Technology in the Health Network Inc.
provides information security with the following objectives;
i) Information is made accessible to only the authorized users
whether externally or internally
ii) Protection of the information, as a way of maintaining
credibility and integrity to the Health Network users.
iii) Ensuring training of personnel pertaining to information
security
iv) Ensuring that breach of information and any suspected
weaknesses are reported on time.
Risks - Threats – Weaknesses within each domain
Project Part
Deliverable
Project Part 1
Task 1: Risk Management Plan
Task 2: Risk Assessment Plan
Task 3: Risk Mitigation Plan
Project Part 2
Task 1: Business Impact Analysis (BIA) Plan
Task 2: Business Continuity Plan (BCP)
Task 3: Disaster Recovery Plan (DRP)
Task 4: Computer Incident Response Team (CIRT) Plan
Project Part 3
Task 1: Data Loss
Task 2: Information Loss
Task 3: Customer Loss
Task 4: Internet Threat
Task 5: Internal Threats
Task 6: Regulatory Changes
R-T-W
Domain Impacted
Risk Impact / Factor
Risk: A user destroying data and deletes files in an organization
Threat: A user downloading unknown attachment from email
Weakness: A user failing to lock the company's computer with
weak password
.
User Domain
Minor
Risk: A user computer or devices which provide access to
computer resources
Threat: Stealing of assets owned by company like laptops and
mobile devices
Weakness: insufficient Security on Company’s Equipment
.
Workstation Domain
Critical
Risk: loss of Customers
Threat: production outages due to unforeseen circumstances like
natural calamities.
Weakness: possible weakness involves generation of alerts.
LAN Domain
Major
Risk: configuration errors of routers and firewall
Threat: viruses and communication outages well as DDoS
Attacks
Weakness: lack of Backup data due to a failure of following
procedures.
WAN-to-LAN Domain
Major
Risk: loss of Customers
Threat: production outages due to unforeseen circumstances like
natural calamities.
Weakness: lack of Backup data due to a failure of following
procedures.
WAN Domain
Major
Risk: Unpermitted access of company’s information public
Internet
Threat: Internal threats
Weakness: lack of proper control being put in place and failure
to monitor Networks.
Remote Access Domain
Major
Risk: Destruction of primary data center by fire
Threat:
Changes in regulatory landscape that may impact operations
Weakness: insufficient processes to content changes made on
regulations
System/Application Domain
Major
Compliance Laws and Regulations
Health Network Inc. Laws and regulations include;
i) Offering quality standards to their patients
ii) Offering Internet-related products and services through IT-
enabled systems,
References
Righthand, S., Kerr, B. B., & Drach, K. (2013). Child
Maltreatment Risk Assessments: An Evaluation Guide.
Hoboken: Taylor and Francis.
Rushton, R. (2006). What a week to risk it all. London:
Piccadilly Press.
Tasler, Nick, Schirner, & Buck. (2015). The Impulse Factor:
Why Some of Us Play It Safe and Others Risk It All. Brilliance
Audio.
Risk Assessment ChecklistRisk Assessment
ChecklistCategoryRiskImpactLikelihoodDifficulty of
DetectionOrganizationalProject lacks Executive-level
Sponsor11Budget reduces team’s capacity33Management insist
on decisions that lengthen schedule55Inefficient team structure
reduces productivity77Review/decision cycle slower than
expected99Vendor tasks take longer than expected11StaffHiring
resources takes longer than expected 31Work from a prior
project not be completed on time53Low motivation reduces
productivity74Lack of skills increases defects96Personnel with
critical skills unavailable13Personnel need extra time to learn
unfamiliar tools 33Contractors leave before the project
completion56Conflicts between team result in errors and extra
rework76Development EnvironmentFacilities not be available
on time99Facilities inadequate 11Development tools may not
be in place by the desired time31Development tools may not
work as expected51Learning curve for new tools longer than
expected71UserUser requirements are unstable 91User
review/decision cycles slower than expected19Users may not
participate in review cycles33Users may not accept the end
product55Users may have expectations than cannot be
met77ContractorContractor may not deliver work when
promised 99Contractor may deliver low quality
products11Contractor may have other high-priority
work33ExternalProduct depends on government regulations
55Product depends on draft technical standards77Specifications
poorly defined99Additional requirements added11Error-prone
modules may require more testing 33Components may not be
easily integrated 55ScheduleSchedule, resources, and product
definition unclear77Schedule is over-optimistic99Schedule
omits necessary tasks11Excessive schedule pressure may reduce
productivity33Schedule includes several tasks that have
multiple predecessors55Schedule includes milestones that have
not been clearly defined77
1
2
3
4
5
6
A
B
C
Category
Risk
Organizational
Project lacks Executive-level Sponsor
Budget reduces team’s capacity
Management insist on decisions that lengthen schedule
Risk Assessment Checklist
ISOL 533 - Information Security and Risk Management
Risk ASSessment Plan
University of the Cumberlands
Executive Summary
<Copy your Executive Summary from your ‘Part-I Task-1’ Risk
Management Plan.>Risks – threats – weaknesses within each
domain
<Using the table from your ‘Part-I Task-1’ Risk Management
Plan, complete the table on Page #2 of this template (review
your Lab #4 solution). For the Risk Factor/Impact column use
the following:
“1” is Critical: an R-T-W that impacts compliance and places
the organization in a position of increased liability.
“2” is Major: an R-T-W that impacts the C-I-A of an
organization’s intellectual property assets and IT infrastructure.
“3” is Minor: an R-T-W that can impact user or employee
productivity or availability of the IT infrastructure
Copy the R-T-W from your ‘Part-I Task-1’ Risk Management
Plan and update it to address the Risk Impact/Factors from the
table>Compliance Laws and Regulations
< Copy your Compliance Laws and Regulations from your
‘Part-I Task-1’ Risk Management Plan >
R-T-W
Domain Impacted
Risk Impact / Factor
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Table 1
Figure 1
Project: Risk Management Plan
© 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning
Company. All rights reserved.
www.jblearning.com Page 1
Deliverables
As discussed in this course, risk management is an important
process for all organizations. This is particularly true in
information systems, which provides critical support for
organizational missions. The heart of risk management is a
formal
risk management plan. The project activities described in this
document allow you to fulfill the role of an employee
participating in the risk management process in a specific
business situation.
The project is structured as follows:
Project Part Deliverable
Project Part 1 Task 1: Risk Management Plan
Task 2: Risk Assessment Plan
Task 3: Risk Mitigation Plan
Project Part 2 Task 1: Business Impact Analysis (BIA) Plan
Task 2: Business Continuity Plan (BCP)
Task 3: Disaster Recovery Plan (DRP)
Task 4: Computer Incident Response Team (CIRT) Plan
Submission Requirements
All project submissions should follow this format:
-point, double-space
Scenario
You are an information technology (IT) intern working for
Health Network, Inc. (Health Network), a fictitious health
services organization headquartered in Minneapolis, Minnesota.
Health Network has over 600 employees throughout the
organization and generates $500 million USD in annual
revenue. The company has two additional locations in Portland,
Oregon and Arlington, Virginia, which support a mix of
corporate operations. Each corporate facility is located near a
co-
location data center, where production systems are located and
managed by third-party data center hosting vendors.
Company Products
Health Network has three main products: HNetExchange,
HNetPay, and HNetConnect.
HNetExchange is the primary source of revenue for the
company. The service handles secure electronic medical
messages that originate from its customers, such as large
hospitals, which are then routed to receiving customers such as
clinics.
Project: Risk Management Plan
© 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning
Company. All rights reserved.
www.jblearning.com Page 2
HNetPay is a Web portal used by many of the company’s
HNetExchange customers to support the management of
secure payments and billing. The HNetPay Web portal, hosted
at Health Network production sites, accepts various forms
of payments and interacts with credit-card processing
organizations much like a Web commerce shopping cart.
HNetConnect is an online directory that lists doctors, clinics,
and other medical facilities to allow Health Network
customers to find the right type of care at the right locations. It
contains doctors’ personal information, work addresses,
medical certifications, and types of services that the doctors and
clinics offer. Doctors are given credentials and are able
to update the information in their profile. Health Network
customers, which are the hospitals and clinics, connect to all
three of the company’s products using HTTPS connections.
Doctors and potential patients are able to make payments
and update their profiles using Internet-accessible HTTPS Web
sites.
Information Technology Infrastructure Overview
Health Network operates in three production data centers that
provide high availability across the company’s products.
The data centers host about 1,000 production servers, and
Health Network maintains 650 corporate laptops and
company-issued mobile devices for its employees.
Threats Identified
Upon review of the current risk management plan, the following
threats were identified:
production systems
any-
owned assets, such as mobile devices and laptops
various events, such as natural disasters, change
management, unstable software, and so on
ccessible on
the Internet
Management Request
Senior management at Health Network has determined that the
existing risk management plan for the organization is out
of date and a new risk management plan must be developed.
Because of the importance of risk management to the
organization, senior management is committed to and supportive
of the project to develop a new plan. You have been
assigned to develop this new plan.
Additional threats other than those described previously may be
discovered when re-evaluating the current threat
landscape during the risk assessment phase.
The budget for this project has not been defined due to senior
management’s desire to react to any and all material risks
that are identified within the new plan. Given the company’s
annual revenue, reasonable expectations can be determined.
Project: Risk Management Plan
© 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning
Company. All rights reserved.
www.jblearning.com Page 3
Project Part 1 Task 1: Risk Management Plan
For the first part of the assigned project, you must create an
initial draft of the final risk management plan. To do so, use
the template provided in class:
Evaluation Criteria and Rubrics
competencies covered in the course thus far?
management plan in the outline?
dent demonstrate good research, reasoning, and
decision-making skills in identifying key components
and compliance laws and regulations?
-developed draft
with proper grammar, spelling, and punctuation?
Project Part 1 Task 2: Risk Assessment Plan
After creating an initial draft of the risk management plan, the
second part of the assigned project requires you to create a
draft of the risk assessment (RA) plan. To do so, use the
template provided in class:
Evaluation Criteria and Rubrics
competencies covered in the course relating to risk
assessments?
plan in the outline?
dent demonstrate good research, reasoning, and
decision-making skills in identifying key components
and methodologies?
-developed draft
with proper grammar, spelling, and punctuation?
Project: Risk Management Plan
© 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning
Company. All rights reserved.
www.jblearning.com Page 4
Project Part 1 Task 3: Risk Mitigation Plan
Senior management at Health Network allocated funds to
support a risk mitigation plan, and have requested that the risk
manager and team create a plan in response to the deliverables
produced within the earlier phases of the project. The risk
mitigation plan should address the identified threats described
in the scenario for this project, as well as any new threats
that may have been discovered during the risk assessment. You
have been assigned to develop this new plan using the
template provided in class.
Evaluation Criteria and Rubrics
p a high-quality risk mitigation plan
based on material provided in the course?
parts of the project to build out a risk mitigation plan?
-developed draft
with proper grammar, spelling, and punctuation?
Project Part 2 Task 1: Business Impact Analysis (BIA) Plan
This part of the project is a continuation of Project Part 1 in
which you prepared an RA plan and a risk mitigation plan for
Health Network. Senior management at the company has
decided to allocate funds for a business impact analysis (BIA).
Because of the importance of risk management to the
organization, senior management is committed to and supportive
of
performing a BIA. You have been assigned to develop the BIA
plan.
Evaluation Criteria and Rubrics
instructor regarding feedback on submitted work?
identify critical business functions, identify critical
resources, identify MAO and impact, and identify recovery
objectives?
-developed report
with proper grammar, spelling, and punctuation?
Project: Risk Management Plan
© 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning
Company. All rights reserved.
www.jblearning.com Page 5
Project Part 2 Task 2: Business Continuity Plan (BCP)
After having reviewed and being impressed by your business
impact analysis (BIA), senior management at Health
Network has decided that your team must also develop a BCP.
Management has allocated all funds for a BCP and your
team has their full support, as well as permission to contact any
of them directly for participation or inclusion in your BCP
plan. You have been assigned to develop this new plan.
Winter storms on the East Coast have affected the ability of
Health Network employees to reach the Arlington offices in a
safe and timely manner. However, no BCP plan currently exists
to address corporate operations. The Arlington office is
the primary location for business units, such as Finance, Legal,
and Customer Support. Some of the corporate systems,
such as the payroll and accounting applications, are located
only in the corporate offices. Each corporate location is able
to access the other two, and remote virtual private network
(VPN) exist between each Production data center and the
corporate locations.
The corporate systems are not currently being backed up and
should be addressed in the new plan. The BCP should also
include some details regarding how the BCP will be tested.
You may refer to the following additional resources to help you
and your team develop a BCP, and you may use a BCP
template if found during your research.
References:
Questions (Protiviti, 2013),
http://www.protiviti.com/en-US/Documents/Resource-
Guides/Guide-to-BCM-Third-Edition-Protiviti.pdf
http://www.ready.gov/business/implementation/continuity
Evaluation Criteria and Rubrics
operations while efforts are ongoing to restart
pervious operations?
during their research?
presented in class?
processes?
ent create a professional, well-developed report
with proper grammar, spelling, and punctuation?
Project: Risk Management Plan
© 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning
Company. All rights reserved.
www.jblearning.com Page 6
Project Part 2 Task 3: Disaster Recovery Plan (DRP)
Your project on risk management, the BIA, and the BCP have
been well received by senior management at Health
Network. They now want you to develop a DRP in order to
overcome any mishaps that might occur in the future. You may
research and use National Institute of Standards and Technology
(NIST) templates to develop a DRP plan for the
company.
Evaluation Criteria and Rubrics
operations while efforts are ongoing to restart
pervious operations?
research?
presented in class?
rofessional, well-developed report
with proper grammar, spelling, and punctuation?
Project Part 2 Task 4: Computer Incident Response Team
(CIRT) Plan
By now you should have developed an RA, a risk mitigation
plan, and a BIA, BCP, and DRP.
In this part of the project, you will create a CIRT plan for
Health Network. The company headquarters (HQ) handles all
incidents because the information security organization is
located in Minneapolis, so the plan will have its roots at HQ.
Make sure to incorporate your instructor’s feedback on earlier
submissions if applicable to the CIRT plan.
Evaluation Criteria and Rubrics
submissions?
id the student create a professional, well-developed report
with proper grammar, spelling, and punctuation?

More Related Content

Similar to Running Head EXECUTIVE SUMMARY6Executive SummaryS.docx

Project Risk Management Plan © 2015 by Jones & Bartl.docx
 Project Risk Management Plan © 2015 by Jones & Bartl.docx Project Risk Management Plan © 2015 by Jones & Bartl.docx
Project Risk Management Plan © 2015 by Jones & Bartl.docxaryan532920
 
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive ApproachThe 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive ApproachProtected Harbor
 
© 2017 Journal of the Practice of Cardiovascular Sciences Pu.docx
© 2017 Journal of the Practice of Cardiovascular Sciences  Pu.docx© 2017 Journal of the Practice of Cardiovascular Sciences  Pu.docx
© 2017 Journal of the Practice of Cardiovascular Sciences Pu.docxgerardkortney
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comPrescottLunt386
 
PurposeThis project provides an opportunity to apply the com.docx
PurposeThis project provides an opportunity to apply the com.docxPurposeThis project provides an opportunity to apply the com.docx
PurposeThis project provides an opportunity to apply the com.docxnanamonkton
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...robbiesamuel
 
case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)ishan parikh production
 
As IAS professionals, you are facing unprecedented challenges—and op.docx
As IAS professionals, you are facing unprecedented challenges—and op.docxAs IAS professionals, you are facing unprecedented challenges—and op.docx
As IAS professionals, you are facing unprecedented challenges—and op.docxrosemaryralphs52525
 
PurposeThis project provides an opportunity to apply the com
PurposeThis project provides an opportunity to apply the comPurposeThis project provides an opportunity to apply the com
PurposeThis project provides an opportunity to apply the comTakishaPeck109
 
Project Task Risk Management PlanFor the first part of the a
Project Task  Risk Management PlanFor the first part of the aProject Task  Risk Management PlanFor the first part of the a
Project Task Risk Management PlanFor the first part of the adavieec5f
 
Sample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdfSample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdfSathishKumar960827
 
Project Risk Management PlanPurposeThis project provides .docx
Project Risk Management PlanPurposeThis project provides .docxProject Risk Management PlanPurposeThis project provides .docx
Project Risk Management PlanPurposeThis project provides .docxbriancrawford30935
 
REAL TIME ENDPOINT INSIGHTS
REAL TIME ENDPOINT INSIGHTS REAL TIME ENDPOINT INSIGHTS
REAL TIME ENDPOINT INSIGHTS Accelerite
 
Submission Requirementsproject submissions should follow th.docx
Submission Requirementsproject submissions should follow th.docxSubmission Requirementsproject submissions should follow th.docx
Submission Requirementsproject submissions should follow th.docxdavid4611
 
Cst 610 Your world/newtonhelp.com
Cst 610 Your world/newtonhelp.comCst 610 Your world/newtonhelp.com
Cst 610 Your world/newtonhelp.comamaranthbeg93
 
Cst 610 Education is Power/newtonhelp.com
Cst 610 Education is Power/newtonhelp.comCst 610 Education is Power/newtonhelp.com
Cst 610 Education is Power/newtonhelp.comamaranthbeg73
 
Cst 610 Motivated Minds/newtonhelp.com
Cst 610 Motivated Minds/newtonhelp.comCst 610 Motivated Minds/newtonhelp.com
Cst 610 Motivated Minds/newtonhelp.comamaranthbeg53
 
Got Your Resilience On? Reducing the Risk of Disaster with Business Continuit...
Got Your Resilience On? Reducing the Risk of Disaster with Business Continuit...Got Your Resilience On? Reducing the Risk of Disaster with Business Continuit...
Got Your Resilience On? Reducing the Risk of Disaster with Business Continuit...Healthcare Network marcus evans
 
The impact of consumerization
The impact of consumerizationThe impact of consumerization
The impact of consumerizationMichel de Goede
 

Similar to Running Head EXECUTIVE SUMMARY6Executive SummaryS.docx (20)

Project Risk Management Plan © 2015 by Jones & Bartl.docx
 Project Risk Management Plan © 2015 by Jones & Bartl.docx Project Risk Management Plan © 2015 by Jones & Bartl.docx
Project Risk Management Plan © 2015 by Jones & Bartl.docx
 
FMEA Final Project
FMEA Final ProjectFMEA Final Project
FMEA Final Project
 
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive ApproachThe 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
The 7 Steps to Prevent IT-Caused Outages- A Comprehensive Approach
 
© 2017 Journal of the Practice of Cardiovascular Sciences Pu.docx
© 2017 Journal of the Practice of Cardiovascular Sciences  Pu.docx© 2017 Journal of the Practice of Cardiovascular Sciences  Pu.docx
© 2017 Journal of the Practice of Cardiovascular Sciences Pu.docx
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.com
 
PurposeThis project provides an opportunity to apply the com.docx
PurposeThis project provides an opportunity to apply the com.docxPurposeThis project provides an opportunity to apply the com.docx
PurposeThis project provides an opportunity to apply the com.docx
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
 
case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)case studies on risk management in IT enabled organisation(vadodara)
case studies on risk management in IT enabled organisation(vadodara)
 
As IAS professionals, you are facing unprecedented challenges—and op.docx
As IAS professionals, you are facing unprecedented challenges—and op.docxAs IAS professionals, you are facing unprecedented challenges—and op.docx
As IAS professionals, you are facing unprecedented challenges—and op.docx
 
PurposeThis project provides an opportunity to apply the com
PurposeThis project provides an opportunity to apply the comPurposeThis project provides an opportunity to apply the com
PurposeThis project provides an opportunity to apply the com
 
Project Task Risk Management PlanFor the first part of the a
Project Task  Risk Management PlanFor the first part of the aProject Task  Risk Management PlanFor the first part of the a
Project Task Risk Management PlanFor the first part of the a
 
Sample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdfSample Risk Assessment Report- QuantumBanking.pdf
Sample Risk Assessment Report- QuantumBanking.pdf
 
Project Risk Management PlanPurposeThis project provides .docx
Project Risk Management PlanPurposeThis project provides .docxProject Risk Management PlanPurposeThis project provides .docx
Project Risk Management PlanPurposeThis project provides .docx
 
REAL TIME ENDPOINT INSIGHTS
REAL TIME ENDPOINT INSIGHTS REAL TIME ENDPOINT INSIGHTS
REAL TIME ENDPOINT INSIGHTS
 
Submission Requirementsproject submissions should follow th.docx
Submission Requirementsproject submissions should follow th.docxSubmission Requirementsproject submissions should follow th.docx
Submission Requirementsproject submissions should follow th.docx
 
Cst 610 Your world/newtonhelp.com
Cst 610 Your world/newtonhelp.comCst 610 Your world/newtonhelp.com
Cst 610 Your world/newtonhelp.com
 
Cst 610 Education is Power/newtonhelp.com
Cst 610 Education is Power/newtonhelp.comCst 610 Education is Power/newtonhelp.com
Cst 610 Education is Power/newtonhelp.com
 
Cst 610 Motivated Minds/newtonhelp.com
Cst 610 Motivated Minds/newtonhelp.comCst 610 Motivated Minds/newtonhelp.com
Cst 610 Motivated Minds/newtonhelp.com
 
Got Your Resilience On? Reducing the Risk of Disaster with Business Continuit...
Got Your Resilience On? Reducing the Risk of Disaster with Business Continuit...Got Your Resilience On? Reducing the Risk of Disaster with Business Continuit...
Got Your Resilience On? Reducing the Risk of Disaster with Business Continuit...
 
The impact of consumerization
The impact of consumerizationThe impact of consumerization
The impact of consumerization
 

More from cowinhelen

Case Study 1 Applying Theory to PracticeSocial scientists hav.docx
Case Study 1 Applying Theory to PracticeSocial scientists hav.docxCase Study 1 Applying Theory to PracticeSocial scientists hav.docx
Case Study 1 Applying Theory to PracticeSocial scientists hav.docxcowinhelen
 
Case Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docx
Case Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docxCase Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docx
Case Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docxcowinhelen
 
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxCase Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxcowinhelen
 
Case Study - APA paper with min 4 page content Review the Blai.docx
Case Study - APA paper with min 4 page content Review the Blai.docxCase Study - APA paper with min 4 page content Review the Blai.docx
Case Study - APA paper with min 4 page content Review the Blai.docxcowinhelen
 
Case Study - Global Mobile Corporation Damn it, .docx
Case Study - Global Mobile Corporation      Damn it, .docxCase Study - Global Mobile Corporation      Damn it, .docx
Case Study - Global Mobile Corporation Damn it, .docxcowinhelen
 
Case Study #3Apple Suppliers & Labor PracticesWith its h.docx
Case Study #3Apple Suppliers & Labor PracticesWith its h.docxCase Study #3Apple Suppliers & Labor PracticesWith its h.docx
Case Study #3Apple Suppliers & Labor PracticesWith its h.docxcowinhelen
 
CASE STUDY (Individual) Scotland  In terms of its physical l.docx
CASE STUDY (Individual) Scotland  In terms of its physical l.docxCASE STUDY (Individual) Scotland  In terms of its physical l.docx
CASE STUDY (Individual) Scotland  In terms of its physical l.docxcowinhelen
 
Case Study #2 T.D. enjoys caring for the children and young peop.docx
Case Study #2 T.D. enjoys caring for the children and young peop.docxCase Study #2 T.D. enjoys caring for the children and young peop.docx
Case Study #2 T.D. enjoys caring for the children and young peop.docxcowinhelen
 
CASE STUDY #2 Chief Complaint I have pain in my belly”.docx
CASE STUDY #2 Chief Complaint I have pain in my belly”.docxCASE STUDY #2 Chief Complaint I have pain in my belly”.docx
CASE STUDY #2 Chief Complaint I have pain in my belly”.docxcowinhelen
 
Case Study #1Jennifer is a 29-year-old administrative assistan.docx
Case Study #1Jennifer is a 29-year-old administrative assistan.docxCase Study #1Jennifer is a 29-year-old administrative assistan.docx
Case Study #1Jennifer is a 29-year-old administrative assistan.docxcowinhelen
 
Case Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docx
Case Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docxCase Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docx
Case Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docxcowinhelen
 
Case Study – Multicultural ParadeRead the Case below, and answe.docx
Case Study  – Multicultural ParadeRead the Case below, and answe.docxCase Study  – Multicultural ParadeRead the Case below, and answe.docx
Case Study – Multicultural ParadeRead the Case below, and answe.docxcowinhelen
 
Case Study   THE INVISIBLE SPONSOR1BackgroundSome execut.docx
Case Study    THE INVISIBLE SPONSOR1BackgroundSome execut.docxCase Study    THE INVISIBLE SPONSOR1BackgroundSome execut.docx
Case Study   THE INVISIBLE SPONSOR1BackgroundSome execut.docxcowinhelen
 
CASE STUDY Experiential training encourages changes in work beha.docx
CASE STUDY  Experiential training encourages changes in work beha.docxCASE STUDY  Experiential training encourages changes in work beha.docx
CASE STUDY Experiential training encourages changes in work beha.docxcowinhelen
 
Case Study Hereditary AngioedemaAll responses must be in your .docx
Case Study  Hereditary AngioedemaAll responses must be in your .docxCase Study  Hereditary AngioedemaAll responses must be in your .docx
Case Study Hereditary AngioedemaAll responses must be in your .docxcowinhelen
 
case studieson Gentrification and Displacement in the Sa.docx
case studieson Gentrification and Displacement in the Sa.docxcase studieson Gentrification and Displacement in the Sa.docx
case studieson Gentrification and Displacement in the Sa.docxcowinhelen
 
Case Studt on KFC Introduction1) Identify the type of .docx
Case Studt on KFC Introduction1) Identify the type of .docxCase Studt on KFC Introduction1) Identify the type of .docx
Case Studt on KFC Introduction1) Identify the type of .docxcowinhelen
 
Case Study Crocs Revolutionizing an Industry’s Supply Chain .docx
Case Study  Crocs Revolutionizing an Industry’s Supply Chain .docxCase Study  Crocs Revolutionizing an Industry’s Supply Chain .docx
Case Study Crocs Revolutionizing an Industry’s Supply Chain .docxcowinhelen
 
Case Studies Student must complete 5 case studies as instructed.docx
Case Studies Student must complete 5 case studies as instructed.docxCase Studies Student must complete 5 case studies as instructed.docx
Case Studies Student must complete 5 case studies as instructed.docxcowinhelen
 
Case Studies in Telehealth AdoptionThe mission of The Comm.docx
Case Studies in Telehealth AdoptionThe mission of The Comm.docxCase Studies in Telehealth AdoptionThe mission of The Comm.docx
Case Studies in Telehealth AdoptionThe mission of The Comm.docxcowinhelen
 

More from cowinhelen (20)

Case Study 1 Applying Theory to PracticeSocial scientists hav.docx
Case Study 1 Applying Theory to PracticeSocial scientists hav.docxCase Study 1 Applying Theory to PracticeSocial scientists hav.docx
Case Study 1 Applying Theory to PracticeSocial scientists hav.docx
 
Case Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docx
Case Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docxCase Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docx
Case Study - Option 3 BarbaraBarbara is a 22 year old woman who h.docx
 
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docxCase Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
Case Study - Cyberterrorism—A New RealityWhen hackers claiming .docx
 
Case Study - APA paper with min 4 page content Review the Blai.docx
Case Study - APA paper with min 4 page content Review the Blai.docxCase Study - APA paper with min 4 page content Review the Blai.docx
Case Study - APA paper with min 4 page content Review the Blai.docx
 
Case Study - Global Mobile Corporation Damn it, .docx
Case Study - Global Mobile Corporation      Damn it, .docxCase Study - Global Mobile Corporation      Damn it, .docx
Case Study - Global Mobile Corporation Damn it, .docx
 
Case Study #3Apple Suppliers & Labor PracticesWith its h.docx
Case Study #3Apple Suppliers & Labor PracticesWith its h.docxCase Study #3Apple Suppliers & Labor PracticesWith its h.docx
Case Study #3Apple Suppliers & Labor PracticesWith its h.docx
 
CASE STUDY (Individual) Scotland  In terms of its physical l.docx
CASE STUDY (Individual) Scotland  In terms of its physical l.docxCASE STUDY (Individual) Scotland  In terms of its physical l.docx
CASE STUDY (Individual) Scotland  In terms of its physical l.docx
 
Case Study #2 T.D. enjoys caring for the children and young peop.docx
Case Study #2 T.D. enjoys caring for the children and young peop.docxCase Study #2 T.D. enjoys caring for the children and young peop.docx
Case Study #2 T.D. enjoys caring for the children and young peop.docx
 
CASE STUDY #2 Chief Complaint I have pain in my belly”.docx
CASE STUDY #2 Chief Complaint I have pain in my belly”.docxCASE STUDY #2 Chief Complaint I have pain in my belly”.docx
CASE STUDY #2 Chief Complaint I have pain in my belly”.docx
 
Case Study #1Jennifer is a 29-year-old administrative assistan.docx
Case Study #1Jennifer is a 29-year-old administrative assistan.docxCase Study #1Jennifer is a 29-year-old administrative assistan.docx
Case Study #1Jennifer is a 29-year-old administrative assistan.docx
 
Case Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docx
Case Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docxCase Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docx
Case Study # 2 –Danny’s Unhappy DutyEmployee ProfilesCaro.docx
 
Case Study – Multicultural ParadeRead the Case below, and answe.docx
Case Study  – Multicultural ParadeRead the Case below, and answe.docxCase Study  – Multicultural ParadeRead the Case below, and answe.docx
Case Study – Multicultural ParadeRead the Case below, and answe.docx
 
Case Study   THE INVISIBLE SPONSOR1BackgroundSome execut.docx
Case Study    THE INVISIBLE SPONSOR1BackgroundSome execut.docxCase Study    THE INVISIBLE SPONSOR1BackgroundSome execut.docx
Case Study   THE INVISIBLE SPONSOR1BackgroundSome execut.docx
 
CASE STUDY Experiential training encourages changes in work beha.docx
CASE STUDY  Experiential training encourages changes in work beha.docxCASE STUDY  Experiential training encourages changes in work beha.docx
CASE STUDY Experiential training encourages changes in work beha.docx
 
Case Study Hereditary AngioedemaAll responses must be in your .docx
Case Study  Hereditary AngioedemaAll responses must be in your .docxCase Study  Hereditary AngioedemaAll responses must be in your .docx
Case Study Hereditary AngioedemaAll responses must be in your .docx
 
case studieson Gentrification and Displacement in the Sa.docx
case studieson Gentrification and Displacement in the Sa.docxcase studieson Gentrification and Displacement in the Sa.docx
case studieson Gentrification and Displacement in the Sa.docx
 
Case Studt on KFC Introduction1) Identify the type of .docx
Case Studt on KFC Introduction1) Identify the type of .docxCase Studt on KFC Introduction1) Identify the type of .docx
Case Studt on KFC Introduction1) Identify the type of .docx
 
Case Study Crocs Revolutionizing an Industry’s Supply Chain .docx
Case Study  Crocs Revolutionizing an Industry’s Supply Chain .docxCase Study  Crocs Revolutionizing an Industry’s Supply Chain .docx
Case Study Crocs Revolutionizing an Industry’s Supply Chain .docx
 
Case Studies Student must complete 5 case studies as instructed.docx
Case Studies Student must complete 5 case studies as instructed.docxCase Studies Student must complete 5 case studies as instructed.docx
Case Studies Student must complete 5 case studies as instructed.docx
 
Case Studies in Telehealth AdoptionThe mission of The Comm.docx
Case Studies in Telehealth AdoptionThe mission of The Comm.docxCase Studies in Telehealth AdoptionThe mission of The Comm.docx
Case Studies in Telehealth AdoptionThe mission of The Comm.docx
 

Recently uploaded

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Recently uploaded (20)

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

Running Head EXECUTIVE SUMMARY6Executive SummaryS.docx

  • 1. Running Head: EXECUTIVE SUMMARY 6 Executive Summary Student’s Name: Professor’s Name: Date: Executive Summary The Health Network Hospital has its headquarters located in Minneapolis, Minnesota with 600 employees and generates an average of $500 million annually. Furthermore, it has its branches in Portland, Oregon, and Arlington, Virginia which support combinations of collective operations with each carrying out production systems managed by respective third- party data center hosting buyers in the strategic locations near a co-location data center. The company comprises of three major products, that is, the net exchange which securely handles electronic media message from large hospital customers and routes them to the receiving customers like clinics. HNetPay, on the other hand, is a web portal that deals with the management of safe payments and billing. HNetConnect is an online directory listing medical staffs and facilities enabling customers to choose the service of
  • 2. their choice as even doctors credentials are updated frequently in their respective profiles The institution operates in 3 production data centers providing high availability across its products which host an average of 1,000 production servers, with 650 laptops as well as mobile devices issued to employees. The Information Technology in the Health Network Inc. provides information security with the following objectives; i) Information is made accessible to only the authorized users whether externally or internally ii) Protection of the information, as a way of maintaining credibility and integrity to the Health Network users. iii) Ensuring training of personnel pertaining to information security iv) Ensuring that breach of information and any suspected weaknesses are reported on time. Risks - Threats – Weaknesses within each domain Project Part Deliverable Project Part 1 Task 1: Risk Management Plan Task 2: Risk Assessment Plan Task 3: Risk Mitigation Plan Project Part 2 Task 1: Business Impact Analysis (BIA) Plan Task 2: Business Continuity Plan (BCP)
  • 3. Task 3: Disaster Recovery Plan (DRP) Task 4: Computer Incident Response Team (CIRT) Plan Project Part 3 Task 1: Data Loss Task 2: Information Loss Task 3: Customer Loss Task 4: Internet Threat Task 5: Internal Threats Task 6: Regulatory Changes
  • 4. R-T-W Domain Impacted Risk Impact / Factor Risk: A user destroying data and deletes files in an organization Threat: A user downloading unknown attachment from email Weakness: A user failing to lock the company's computer with weak password . User Domain Minor Risk: A user computer or devices which provide access to computer resources Threat: Stealing of assets owned by company like laptops and mobile devices Weakness: insufficient Security on Company’s Equipment . Workstation Domain Critical Risk: loss of Customers Threat: production outages due to unforeseen circumstances like natural calamities. Weakness: possible weakness involves generation of alerts. LAN Domain Major Risk: configuration errors of routers and firewall
  • 5. Threat: viruses and communication outages well as DDoS Attacks Weakness: lack of Backup data due to a failure of following procedures. WAN-to-LAN Domain Major Risk: loss of Customers Threat: production outages due to unforeseen circumstances like natural calamities. Weakness: lack of Backup data due to a failure of following procedures. WAN Domain Major Risk: Unpermitted access of company’s information public Internet Threat: Internal threats Weakness: lack of proper control being put in place and failure to monitor Networks. Remote Access Domain Major Risk: Destruction of primary data center by fire Threat: Changes in regulatory landscape that may impact operations Weakness: insufficient processes to content changes made on regulations System/Application Domain Major
  • 6. Compliance Laws and Regulations Health Network Inc. Laws and regulations include; i) Offering quality standards to their patients ii) Offering Internet-related products and services through IT- enabled systems, References Righthand, S., Kerr, B. B., & Drach, K. (2013). Child Maltreatment Risk Assessments: An Evaluation Guide. Hoboken: Taylor and Francis. Rushton, R. (2006). What a week to risk it all. London: Piccadilly Press. Tasler, Nick, Schirner, & Buck. (2015). The Impulse Factor: Why Some of Us Play It Safe and Others Risk It All. Brilliance Audio. Risk Assessment ChecklistRisk Assessment ChecklistCategoryRiskImpactLikelihoodDifficulty of DetectionOrganizationalProject lacks Executive-level
  • 7. Sponsor11Budget reduces team’s capacity33Management insist on decisions that lengthen schedule55Inefficient team structure reduces productivity77Review/decision cycle slower than expected99Vendor tasks take longer than expected11StaffHiring resources takes longer than expected 31Work from a prior project not be completed on time53Low motivation reduces productivity74Lack of skills increases defects96Personnel with critical skills unavailable13Personnel need extra time to learn unfamiliar tools 33Contractors leave before the project completion56Conflicts between team result in errors and extra rework76Development EnvironmentFacilities not be available on time99Facilities inadequate 11Development tools may not be in place by the desired time31Development tools may not work as expected51Learning curve for new tools longer than expected71UserUser requirements are unstable 91User review/decision cycles slower than expected19Users may not participate in review cycles33Users may not accept the end product55Users may have expectations than cannot be met77ContractorContractor may not deliver work when promised 99Contractor may deliver low quality products11Contractor may have other high-priority work33ExternalProduct depends on government regulations 55Product depends on draft technical standards77Specifications poorly defined99Additional requirements added11Error-prone modules may require more testing 33Components may not be easily integrated 55ScheduleSchedule, resources, and product definition unclear77Schedule is over-optimistic99Schedule omits necessary tasks11Excessive schedule pressure may reduce productivity33Schedule includes several tasks that have multiple predecessors55Schedule includes milestones that have not been clearly defined77 1 2 3 4
  • 8. 5 6 A B C Category Risk Organizational Project lacks Executive-level Sponsor Budget reduces team’s capacity Management insist on decisions that lengthen schedule Risk Assessment Checklist ISOL 533 - Information Security and Risk Management Risk ASSessment Plan University of the Cumberlands Executive Summary <Copy your Executive Summary from your ‘Part-I Task-1’ Risk Management Plan.>Risks – threats – weaknesses within each domain <Using the table from your ‘Part-I Task-1’ Risk Management Plan, complete the table on Page #2 of this template (review your Lab #4 solution). For the Risk Factor/Impact column use the following: “1” is Critical: an R-T-W that impacts compliance and places the organization in a position of increased liability. “2” is Major: an R-T-W that impacts the C-I-A of an organization’s intellectual property assets and IT infrastructure. “3” is Minor: an R-T-W that can impact user or employee productivity or availability of the IT infrastructure Copy the R-T-W from your ‘Part-I Task-1’ Risk Management Plan and update it to address the Risk Impact/Factors from the table>Compliance Laws and Regulations < Copy your Compliance Laws and Regulations from your ‘Part-I Task-1’ Risk Management Plan >
  • 9. R-T-W Domain Impacted Risk Impact / Factor Risk: Threat: Weakness: Risk: Threat: Weakness: Risk: Threat: Weakness: Risk: Threat: Weakness: Risk: Threat: Weakness: Risk: Threat: Weakness: Risk: Threat: Weakness:
  • 11. Risk: Threat: Weakness: Risk: Threat: Weakness: Table 1 Figure 1 Project: Risk Management Plan © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 1 Deliverables As discussed in this course, risk management is an important process for all organizations. This is particularly true in information systems, which provides critical support for organizational missions. The heart of risk management is a formal
  • 12. risk management plan. The project activities described in this document allow you to fulfill the role of an employee participating in the risk management process in a specific business situation. The project is structured as follows: Project Part Deliverable Project Part 1 Task 1: Risk Management Plan Task 2: Risk Assessment Plan Task 3: Risk Mitigation Plan Project Part 2 Task 1: Business Impact Analysis (BIA) Plan Task 2: Business Continuity Plan (BCP) Task 3: Disaster Recovery Plan (DRP) Task 4: Computer Incident Response Team (CIRT) Plan Submission Requirements All project submissions should follow this format: -point, double-space Scenario
  • 13. You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a co- location data center, where production systems are located and managed by third-party data center hosting vendors. Company Products Health Network has three main products: HNetExchange, HNetPay, and HNetConnect. HNetExchange is the primary source of revenue for the company. The service handles secure electronic medical messages that originate from its customers, such as large hospitals, which are then routed to receiving customers such as clinics. Project: Risk Management Plan © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning
  • 14. Company. All rights reserved. www.jblearning.com Page 2 HNetPay is a Web portal used by many of the company’s HNetExchange customers to support the management of secure payments and billing. The HNetPay Web portal, hosted at Health Network production sites, accepts various forms of payments and interacts with credit-card processing organizations much like a Web commerce shopping cart. HNetConnect is an online directory that lists doctors, clinics, and other medical facilities to allow Health Network customers to find the right type of care at the right locations. It contains doctors’ personal information, work addresses, medical certifications, and types of services that the doctors and clinics offer. Doctors are given credentials and are able to update the information in their profile. Health Network customers, which are the hospitals and clinics, connect to all three of the company’s products using HTTPS connections. Doctors and potential patients are able to make payments and update their profiles using Internet-accessible HTTPS Web sites. Information Technology Infrastructure Overview Health Network operates in three production data centers that provide high availability across the company’s products. The data centers host about 1,000 production servers, and
  • 15. Health Network maintains 650 corporate laptops and company-issued mobile devices for its employees. Threats Identified Upon review of the current risk management plan, the following threats were identified: production systems any- owned assets, such as mobile devices and laptops various events, such as natural disasters, change management, unstable software, and so on ccessible on the Internet Management Request Senior management at Health Network has determined that the existing risk management plan for the organization is out of date and a new risk management plan must be developed. Because of the importance of risk management to the organization, senior management is committed to and supportive
  • 16. of the project to develop a new plan. You have been assigned to develop this new plan. Additional threats other than those described previously may be discovered when re-evaluating the current threat landscape during the risk assessment phase. The budget for this project has not been defined due to senior management’s desire to react to any and all material risks that are identified within the new plan. Given the company’s annual revenue, reasonable expectations can be determined. Project: Risk Management Plan © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 3 Project Part 1 Task 1: Risk Management Plan For the first part of the assigned project, you must create an initial draft of the final risk management plan. To do so, use the template provided in class: Evaluation Criteria and Rubrics competencies covered in the course thus far?
  • 17. management plan in the outline? dent demonstrate good research, reasoning, and decision-making skills in identifying key components and compliance laws and regulations? -developed draft with proper grammar, spelling, and punctuation? Project Part 1 Task 2: Risk Assessment Plan After creating an initial draft of the risk management plan, the second part of the assigned project requires you to create a draft of the risk assessment (RA) plan. To do so, use the template provided in class: Evaluation Criteria and Rubrics competencies covered in the course relating to risk assessments? plan in the outline? dent demonstrate good research, reasoning, and decision-making skills in identifying key components and methodologies?
  • 18. -developed draft with proper grammar, spelling, and punctuation? Project: Risk Management Plan © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 4 Project Part 1 Task 3: Risk Mitigation Plan Senior management at Health Network allocated funds to support a risk mitigation plan, and have requested that the risk manager and team create a plan in response to the deliverables produced within the earlier phases of the project. The risk mitigation plan should address the identified threats described in the scenario for this project, as well as any new threats that may have been discovered during the risk assessment. You have been assigned to develop this new plan using the template provided in class. Evaluation Criteria and Rubrics p a high-quality risk mitigation plan based on material provided in the course?
  • 19. parts of the project to build out a risk mitigation plan? -developed draft with proper grammar, spelling, and punctuation? Project Part 2 Task 1: Business Impact Analysis (BIA) Plan This part of the project is a continuation of Project Part 1 in which you prepared an RA plan and a risk mitigation plan for Health Network. Senior management at the company has decided to allocate funds for a business impact analysis (BIA). Because of the importance of risk management to the organization, senior management is committed to and supportive of performing a BIA. You have been assigned to develop the BIA plan. Evaluation Criteria and Rubrics instructor regarding feedback on submitted work? identify critical business functions, identify critical resources, identify MAO and impact, and identify recovery objectives?
  • 20. -developed report with proper grammar, spelling, and punctuation? Project: Risk Management Plan © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 5 Project Part 2 Task 2: Business Continuity Plan (BCP) After having reviewed and being impressed by your business impact analysis (BIA), senior management at Health Network has decided that your team must also develop a BCP. Management has allocated all funds for a BCP and your team has their full support, as well as permission to contact any of them directly for participation or inclusion in your BCP plan. You have been assigned to develop this new plan. Winter storms on the East Coast have affected the ability of Health Network employees to reach the Arlington offices in a safe and timely manner. However, no BCP plan currently exists to address corporate operations. The Arlington office is
  • 21. the primary location for business units, such as Finance, Legal, and Customer Support. Some of the corporate systems, such as the payroll and accounting applications, are located only in the corporate offices. Each corporate location is able to access the other two, and remote virtual private network (VPN) exist between each Production data center and the corporate locations. The corporate systems are not currently being backed up and should be addressed in the new plan. The BCP should also include some details regarding how the BCP will be tested. You may refer to the following additional resources to help you and your team develop a BCP, and you may use a BCP template if found during your research. References: Questions (Protiviti, 2013), http://www.protiviti.com/en-US/Documents/Resource- Guides/Guide-to-BCM-Third-Edition-Protiviti.pdf http://www.ready.gov/business/implementation/continuity
  • 22. Evaluation Criteria and Rubrics operations while efforts are ongoing to restart pervious operations? during their research? presented in class? processes? ent create a professional, well-developed report with proper grammar, spelling, and punctuation? Project: Risk Management Plan © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 6 Project Part 2 Task 3: Disaster Recovery Plan (DRP) Your project on risk management, the BIA, and the BCP have been well received by senior management at Health
  • 23. Network. They now want you to develop a DRP in order to overcome any mishaps that might occur in the future. You may research and use National Institute of Standards and Technology (NIST) templates to develop a DRP plan for the company. Evaluation Criteria and Rubrics operations while efforts are ongoing to restart pervious operations? research? presented in class? rofessional, well-developed report with proper grammar, spelling, and punctuation? Project Part 2 Task 4: Computer Incident Response Team (CIRT) Plan By now you should have developed an RA, a risk mitigation plan, and a BIA, BCP, and DRP.
  • 24. In this part of the project, you will create a CIRT plan for Health Network. The company headquarters (HQ) handles all incidents because the information security organization is located in Minneapolis, so the plan will have its roots at HQ. Make sure to incorporate your instructor’s feedback on earlier submissions if applicable to the CIRT plan. Evaluation Criteria and Rubrics submissions? id the student create a professional, well-developed report with proper grammar, spelling, and punctuation?