SlideShare a Scribd company logo
1 of 9
The Technical Report and Executive Summary
Technical report: Your report should be a 6-7 page double-
spaced Word document with citations in APA format. The page
count does not include figures, diagrams, tables or citations.
The technical report: Provide recommendations for access
control and authentication mechanisms to increase the security
within the identity management system. Review the mission and
organization structure of this healthcare organization. Review
the roles within the organization, and recommend the accesses,
restrictions, and conditions for each role. Present these in a
tabular format as part of your list of recommendations.
Provide a comparison of risk scenarios to include the following:
1. What will happen if the CIO and the leadership do nothing,
and decide to accept the risks?
2. Are there possible ways the CIO can transfer the risks?
3. Are there possible ways to mitigate the risks?
4. Are there possible ways to eliminate the risks?
5. What are the projected costs to address these risks?
Provide an overall recommendation, with technical details to the
director of IT.
The executive summary: In addition to your technical report,
also create a nontechnical report as an executive summary. This
should be a 2-3 page double-spaced Word document.
Scenario
You are a systems administrator in the IT department of a
major metropolitan hospital. Your
duties are to ensure the confidentiality, availability, and
integrity of patient records, as well as
the other files and databases used throughout the hospital. Your
work affects several departments, including Human Resources,
Finance, Billing, Accounting, and Scheduling. You
also apply security controls on passwords for user accounts.
Just before clocking out for the day, you notice something
strange in the hospital's computer
system. Some person, or group, has accessed user accounts and
conducted unauthorized activities. Recently, the hospital
experienced intrusion into one of its patient's billing accounts.
After validating user profiles in Active Directory and matching
them with user credentials, you
suspect several user's passwords have been compromised to gain
access to the hospital's computer network. You schedule an
emergency meeting with the director of IT and the hospital
board. In light of this security breach, they ask you to examine
the security posture of the hospital's
information systems infrastructure and implement defense
techniques. This must be done quickly, your director says. The
hospital board is less knowledgeable about information system
security. The board makes it clear that it has a limited
cybersecurity budget. However, if you can
make a strong case to the board, it is likely that they will
increase your budget and implement
your recommended tool companywide.
You will share your findings on the hospital's security posture.
Your findings will be brought to the director of IT in a technical
report. You will also provide a nontechnical assessment of the
overall identity management system of the hospital and define
practices to restrict and permit access to information. You will
share this assessment with the hospital board in the form of a
narrated slide show presentation.
You know that identity management will increase the
security of the overall information system's
infrastructure for the hospital. You also know that, with a good
identity management system, the
security and productivity benefits will outweigh costs incurred.
This is the argument you must make to those stakeholders.
Step 1: Defining the Information System Infrastructure
Select a hospital or healthcare organization to research. You
may choose an organization you are familiar with or can readily
obtain information about. To maintain confidentiality, you do
not need to mention the name of the organization. You may also
choose a hypothetical/fictitious healthcare organization.
Others have researched several healthcare organizations, which
have suffered major security breaches, extensively.
1. Describe the organization and structure including the
different business units and their functions. You may use an
organizational chart to provide this information.
2. Choose one or more mission-critical systems of the
healthcare organization. Define the information protection
needs for the organization's mission-critical protected health
information (PHI). This information is stored in database
medical records for doctors, nurses, and insurance claims
billing systems, which are used to fulfill the organizational
information needs.
3. Define the workflows and processes for the high-level
information systems that you have just identified that will store
PHI. Workflows and processes for healthcare organizations
define how the organization gets its work done. They describe
the movement of patient information to the business units that
have needs to process and manage that information, from billing
to physician care. All these organizations have hardware and
software implementations of their information systems, and it is
critical to understand these components, and how they are
connected (known as their topology), so the appropriate
protections can be applied. Your research may produce
instances and examples of how an information system is
connected, to include cybersecurity components like firewalls,
in the information system and network diagram. Be sure you
understand the benefits and weaknesses for the different
network topologies.
You may incorporate what you find in your research, in your
definition for workflows and processes for the high-level
information systems and provide explanation of how that
topology fulfills the mission for the health care organization.
Your definition should include a high-level description of
information systems hardware and software components and
their interactions.
· Information systems hardware
· Information systems software
Supply this information as a diagram with inputs, outputs, and
technologies identified. Consider how you might restrict access
and protect billing and PHI information.
4. Also include following definitions:
· Open Systems Interconnections (OSI) Model
· TCP/IP protocols
· network protocolsStep 2: Threats
Now that you have defined the hospital's information system
infrastructure, you will have to understand what are the threats
to those systems and describe the types of measures that could
address those threats. In this section, you will learn about
different types of identity access management solutions and how
they protect against the threat of unauthorized access.
To complete this section of the report, you’ll brush up on your
knowledge of threats by reading the following resources: web
security issues, insider threats, intrusion motives/hacker
psychology, and CIA triad. Take what you learned from these
resources to convey the threats to the hospital's information
systems infrastructure. Include a brief summary of insider
threats, intrusion motives, and hacker psychology in your report
as it relates to your hospital data processing systems. Relate
these threats to the vulnerabilities in the CIA triad.
This section of your report will also include a description of the
purpose and components of an identity management system to
include authentication, authorization, and access control.
Include a discussion of possible use of laptop devices by
doctors who visit their patients at the hospital, and need access
to hospital PHI data.
You will include following information in your report:
1. Authorization
2. Access control
3. Passwords
4. Multi-factor authentication
Define the types of access control management to include
access control lists in operating systems, role-based access
controls, files, and database access controls. Define types of
authorization and authentication and the use of passwords,
password management, and password protection in an identity
management system. Describe common factor authentication
mechanisms to include multi-factor authentication.Step 3:
Password Cracking Tools
You have successfully examined the threats to a healthcare
organization's information systems infrastructure. Now, you
must begin your research into password cracking software. Do
some quick independent research on password cracking as it
applies to your organization.
Not all password cracking tools will necessarily perform with
the same speed, precision, and results, making it important to
test a few different products. Compare the password cracking
tools (Cain & Abel and Ophcrack) based on these
characteristics, and include as part of your assessment and
recommendations on the use of such tools. You will test the
organization's systems for password strength and complexity
and complete validation testing. You will compare the results
obtained from your first and second tool.
You have tested and made comparisons of the performance of
various password cracking tools and you have the data to
support your recommendations for the use of such tools.
Assignment Details
In Unit 2, you have learned about three different types of
distributions: Normal, binomial, and Poisson. You can take data
that you collect and plot it out onto graphs to see a visual
representation of the data. By simply looking at data on a
graph, you can tell a lot about how related your observed data
are and if they fit into a normal distribution.
For this submission, you will be given a series of scenarios and
small collections of data. You should plot the data or calculate
probabilities using excel. Then, you will create your own real or
hypothetical scenario to graph and explain.
Answer the following:
· The mean temperature for the month of July in Boston,
Massachusetts is 73 degrees Fahrenheit. Plot the following data,
which represent the observed mean temperature in Boston over
the last 20 years:
1998
72
1999
69
2000
78
2001
70
2002
67
2003
74
2004
73
2005
65
2006
77
2007
71
2008
75
2009
68
2010
72
2011
77
2012
65
2013
79
2014
77
2015
78
2016
72
2017
74
·
a. Is this a normal distribution? Explain your reasoning.
b. What is an outlier? Are there any outliers in this distribution?
Explain your reasoning fully.
c. Using the above data, what is the probability that the mean
will be over 76 in any given July?
d. Using the above data, what is the probability that the mean
will be over 80 in any given July?
· A heatwave is defined as 3 or more days in a row with a high
temperature over 90 degrees Fahrenheit. Given the following
high temperatures recorded over a period of 20 days, what is the
probability that there will be a heatwave in the next 10 days?
Day 1
93
Day 2
88
Day 3
91
Day 4
86
Day 5
92
Day 6
91
Day 7
90
Day 8
88
Day 9
85
Day 10
91
Day 11
84
Day 12
86
Day 13
85
Day 14
90
Day 15
92
Day 16
89
Day 17
88
Day 18
90
Day 19
88
Day 20
90
Customer surveys reveal that 40% of customers purchase
products online versus in the physical store location. Suppose
that this business makes 12 sales in a given day
a. Does this situation fit the parameters for a binomial
distribution? Explain why or why not?
b. Find the probability of the 12 sales on a given day exactly 4
are made online
c. Find the probability of the 12 sales fewer than 6 are made
online
d. Find the probability of the 12 sales more than 8 are made
online
Your own example:
· Choose a company that you have recently seen in the news
because it is having some sort of problem or scandal, and
complete the following:
· Discuss the situation, and describe how the company could use
distributions and probability statistics to learn more about how
the scandal could affect its business.
· If you were a business analyst for the company, what research
would you want to do, and what kind of data would you want to
collect to create a distribution?
· Would this be a standard, binomial, or Poisson distribution?
Why?
· List and discuss at least 3 questions that you would want to
create probabilities for (e.g.,What is the chance that the
company loses 10% of its customers in the next year?).
· What would you hope to learn from calculating these
probabilities?
· Assuming that upper management does not see the value in
expending the time and money necessary to collect data to
analyze, make an argument (at least 100 words) convincing
them that the expenditure is necessary and explaining some
dangers the company could face by not knowing what the data
predict.

More Related Content

Similar to The Technical Report and Executive SummaryTechnical report Your.docx

CST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.comCST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.comagathachristie112
 
CST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.comCST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.comKeatonJennings104
 
CST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comCST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comchrysanthemu49
 
CST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.comCST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.comagathachristie265
 
CST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.comCST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.comkopiko146
 
CST 610 Exceptional Education - snaptutorial.com
CST 610   Exceptional Education - snaptutorial.comCST 610   Exceptional Education - snaptutorial.com
CST 610 Exceptional Education - snaptutorial.comDavisMurphyA97
 
CST 610 Effective Communication - snaptutorial.com
CST 610 Effective Communication - snaptutorial.comCST 610 Effective Communication - snaptutorial.com
CST 610 Effective Communication - snaptutorial.comdonaldzs7
 
Cyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.comCyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.comMcdonaldRyan80
 
CYB 610 Effective Communication/tutorialrank.com
 CYB 610 Effective Communication/tutorialrank.com CYB 610 Effective Communication/tutorialrank.com
CYB 610 Effective Communication/tutorialrank.comjonhson199
 
CST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.comCST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.comclaric240
 
Cyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.comCyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.comrobertlesew8
 
Cyb 610 Believe Possibilities / snaptutorial.com
Cyb 610  Believe Possibilities / snaptutorial.comCyb 610  Believe Possibilities / snaptutorial.com
Cyb 610 Believe Possibilities / snaptutorial.comDavis12a
 
Csec 610 Enhance teaching / snaptutorial.com
Csec 610  Enhance teaching / snaptutorial.comCsec 610  Enhance teaching / snaptutorial.com
Csec 610 Enhance teaching / snaptutorial.comBaileyabv
 
Cst 610 Enhance teaching / snaptutorial.com
Cst 610  Enhance teaching / snaptutorial.comCst 610  Enhance teaching / snaptutorial.com
Cst 610 Enhance teaching / snaptutorial.comBaileyabw
 
CYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.comCYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.comdonaldzs9
 
CYB 610 Exceptional Education - snaptutorial.com
CYB 610   Exceptional Education - snaptutorial.comCYB 610   Exceptional Education - snaptutorial.com
CYB 610 Exceptional Education - snaptutorial.comDavisMurphyA98
 
Cyb 610 Enhance teaching / snaptutorial.com
Cyb 610   Enhance teaching / snaptutorial.comCyb 610   Enhance teaching / snaptutorial.com
Cyb 610 Enhance teaching / snaptutorial.comBaileyaby
 
Cain and AbelOphcrackStart H.docx
Cain and AbelOphcrackStart H.docxCain and AbelOphcrackStart H.docx
Cain and AbelOphcrackStart H.docxRAHUL126667
 
Cst 610 Your world/newtonhelp.com
Cst 610 Your world/newtonhelp.comCst 610 Your world/newtonhelp.com
Cst 610 Your world/newtonhelp.comamaranthbeg93
 
Cst 610 Education is Power/newtonhelp.com
Cst 610 Education is Power/newtonhelp.comCst 610 Education is Power/newtonhelp.com
Cst 610 Education is Power/newtonhelp.comamaranthbeg73
 

Similar to The Technical Report and Executive SummaryTechnical report Your.docx (20)

CST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.comCST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.com
 
CST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.comCST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.com
 
CST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comCST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.com
 
CST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.comCST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.com
 
CST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.comCST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.com
 
CST 610 Exceptional Education - snaptutorial.com
CST 610   Exceptional Education - snaptutorial.comCST 610   Exceptional Education - snaptutorial.com
CST 610 Exceptional Education - snaptutorial.com
 
CST 610 Effective Communication - snaptutorial.com
CST 610 Effective Communication - snaptutorial.comCST 610 Effective Communication - snaptutorial.com
CST 610 Effective Communication - snaptutorial.com
 
Cyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.comCyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.com
 
CYB 610 Effective Communication/tutorialrank.com
 CYB 610 Effective Communication/tutorialrank.com CYB 610 Effective Communication/tutorialrank.com
CYB 610 Effective Communication/tutorialrank.com
 
CST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.comCST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.com
 
Cyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.comCyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.com
 
Cyb 610 Believe Possibilities / snaptutorial.com
Cyb 610  Believe Possibilities / snaptutorial.comCyb 610  Believe Possibilities / snaptutorial.com
Cyb 610 Believe Possibilities / snaptutorial.com
 
Csec 610 Enhance teaching / snaptutorial.com
Csec 610  Enhance teaching / snaptutorial.comCsec 610  Enhance teaching / snaptutorial.com
Csec 610 Enhance teaching / snaptutorial.com
 
Cst 610 Enhance teaching / snaptutorial.com
Cst 610  Enhance teaching / snaptutorial.comCst 610  Enhance teaching / snaptutorial.com
Cst 610 Enhance teaching / snaptutorial.com
 
CYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.comCYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.com
 
CYB 610 Exceptional Education - snaptutorial.com
CYB 610   Exceptional Education - snaptutorial.comCYB 610   Exceptional Education - snaptutorial.com
CYB 610 Exceptional Education - snaptutorial.com
 
Cyb 610 Enhance teaching / snaptutorial.com
Cyb 610   Enhance teaching / snaptutorial.comCyb 610   Enhance teaching / snaptutorial.com
Cyb 610 Enhance teaching / snaptutorial.com
 
Cain and AbelOphcrackStart H.docx
Cain and AbelOphcrackStart H.docxCain and AbelOphcrackStart H.docx
Cain and AbelOphcrackStart H.docx
 
Cst 610 Your world/newtonhelp.com
Cst 610 Your world/newtonhelp.comCst 610 Your world/newtonhelp.com
Cst 610 Your world/newtonhelp.com
 
Cst 610 Education is Power/newtonhelp.com
Cst 610 Education is Power/newtonhelp.comCst 610 Education is Power/newtonhelp.com
Cst 610 Education is Power/newtonhelp.com
 

More from gloriab9

The thought that the continents had coastlines that looked like they.docx
The thought that the continents had coastlines that looked like they.docxThe thought that the continents had coastlines that looked like they.docx
The thought that the continents had coastlines that looked like they.docxgloriab9
 
The Theory of Moral SentimentsAdam SmithCopyright © Jo.docx
The Theory of Moral SentimentsAdam SmithCopyright © Jo.docxThe Theory of Moral SentimentsAdam SmithCopyright © Jo.docx
The Theory of Moral SentimentsAdam SmithCopyright © Jo.docxgloriab9
 
The thesis statement is often (but not always) the l.docx
The thesis statement is often (but not always) the l.docxThe thesis statement is often (but not always) the l.docx
The thesis statement is often (but not always) the l.docxgloriab9
 
The Theory of the Leisure Class summary (1page 250~300words)you .docx
The Theory of the Leisure Class summary (1page 250~300words)you .docxThe Theory of the Leisure Class summary (1page 250~300words)you .docx
The Theory of the Leisure Class summary (1page 250~300words)you .docxgloriab9
 
The theory is  Parent Child Interaction Model( Barnard)Describe .docx
The theory is  Parent Child Interaction Model( Barnard)Describe .docxThe theory is  Parent Child Interaction Model( Barnard)Describe .docx
The theory is  Parent Child Interaction Model( Barnard)Describe .docxgloriab9
 
The Texts of the MassKyrieKyrie, eleison. Lord, have mercy.docx
The Texts of the MassKyrieKyrie, eleison. Lord, have mercy.docxThe Texts of the MassKyrieKyrie, eleison. Lord, have mercy.docx
The Texts of the MassKyrieKyrie, eleison. Lord, have mercy.docxgloriab9
 
The textbook’s authors presented three different characterizatio.docx
The textbook’s authors presented three different characterizatio.docxThe textbook’s authors presented three different characterizatio.docx
The textbook’s authors presented three different characterizatio.docxgloriab9
 
The textbook introduced you to types of physical security barriers, .docx
The textbook introduced you to types of physical security barriers, .docxThe textbook introduced you to types of physical security barriers, .docx
The textbook introduced you to types of physical security barriers, .docxgloriab9
 
The textbook highlights four distinct styles of parenting   authori.docx
The textbook highlights four distinct styles of parenting   authori.docxThe textbook highlights four distinct styles of parenting   authori.docx
The textbook highlights four distinct styles of parenting   authori.docxgloriab9
 
The textbook highlights four distinct styles of parenting authorita.docx
The textbook highlights four distinct styles of parenting authorita.docxThe textbook highlights four distinct styles of parenting authorita.docx
The textbook highlights four distinct styles of parenting authorita.docxgloriab9
 
The textbook highlights four distinct styles of parenting autho.docx
The textbook highlights four distinct styles of parenting autho.docxThe textbook highlights four distinct styles of parenting autho.docx
The textbook highlights four distinct styles of parenting autho.docxgloriab9
 
The textbook content for Understanding Operating Systems is organize.docx
The textbook content for Understanding Operating Systems is organize.docxThe textbook content for Understanding Operating Systems is organize.docx
The textbook content for Understanding Operating Systems is organize.docxgloriab9
 
The term public administration is traditionally defined as a gov.docx
The term public administration is traditionally defined as a gov.docxThe term public administration is traditionally defined as a gov.docx
The term public administration is traditionally defined as a gov.docxgloriab9
 
The terrorist attacks on September 11, 2001 forever changed U.S..docx
The terrorist attacks on September 11, 2001 forever changed U.S..docxThe terrorist attacks on September 11, 2001 forever changed U.S..docx
The terrorist attacks on September 11, 2001 forever changed U.S..docxgloriab9
 
The term used to denote the beliefs that people have about political.docx
The term used to denote the beliefs that people have about political.docxThe term used to denote the beliefs that people have about political.docx
The term used to denote the beliefs that people have about political.docxgloriab9
 
The TermsMany terms mean different things in our common language a.docx
The TermsMany terms mean different things in our common language a.docxThe TermsMany terms mean different things in our common language a.docx
The TermsMany terms mean different things in our common language a.docxgloriab9
 
The term 21st century skills suggests that there is a new set of.docx
The term 21st century skills suggests that there is a new set of.docxThe term 21st century skills suggests that there is a new set of.docx
The term 21st century skills suggests that there is a new set of.docxgloriab9
 
The term network economy” is used to emphasize the features of the .docx
The term network economy” is used to emphasize the features of the .docxThe term network economy” is used to emphasize the features of the .docx
The term network economy” is used to emphasize the features of the .docxgloriab9
 
The term narcissist gets overused. I define it as not having empathy.docx
The term narcissist gets overused. I define it as not having empathy.docxThe term narcissist gets overused. I define it as not having empathy.docx
The term narcissist gets overused. I define it as not having empathy.docxgloriab9
 
The term paper it should be of professional quality and be in th.docx
The term paper it should be of professional quality and be in th.docxThe term paper it should be of professional quality and be in th.docx
The term paper it should be of professional quality and be in th.docxgloriab9
 

More from gloriab9 (20)

The thought that the continents had coastlines that looked like they.docx
The thought that the continents had coastlines that looked like they.docxThe thought that the continents had coastlines that looked like they.docx
The thought that the continents had coastlines that looked like they.docx
 
The Theory of Moral SentimentsAdam SmithCopyright © Jo.docx
The Theory of Moral SentimentsAdam SmithCopyright © Jo.docxThe Theory of Moral SentimentsAdam SmithCopyright © Jo.docx
The Theory of Moral SentimentsAdam SmithCopyright © Jo.docx
 
The thesis statement is often (but not always) the l.docx
The thesis statement is often (but not always) the l.docxThe thesis statement is often (but not always) the l.docx
The thesis statement is often (but not always) the l.docx
 
The Theory of the Leisure Class summary (1page 250~300words)you .docx
The Theory of the Leisure Class summary (1page 250~300words)you .docxThe Theory of the Leisure Class summary (1page 250~300words)you .docx
The Theory of the Leisure Class summary (1page 250~300words)you .docx
 
The theory is  Parent Child Interaction Model( Barnard)Describe .docx
The theory is  Parent Child Interaction Model( Barnard)Describe .docxThe theory is  Parent Child Interaction Model( Barnard)Describe .docx
The theory is  Parent Child Interaction Model( Barnard)Describe .docx
 
The Texts of the MassKyrieKyrie, eleison. Lord, have mercy.docx
The Texts of the MassKyrieKyrie, eleison. Lord, have mercy.docxThe Texts of the MassKyrieKyrie, eleison. Lord, have mercy.docx
The Texts of the MassKyrieKyrie, eleison. Lord, have mercy.docx
 
The textbook’s authors presented three different characterizatio.docx
The textbook’s authors presented three different characterizatio.docxThe textbook’s authors presented three different characterizatio.docx
The textbook’s authors presented three different characterizatio.docx
 
The textbook introduced you to types of physical security barriers, .docx
The textbook introduced you to types of physical security barriers, .docxThe textbook introduced you to types of physical security barriers, .docx
The textbook introduced you to types of physical security barriers, .docx
 
The textbook highlights four distinct styles of parenting   authori.docx
The textbook highlights four distinct styles of parenting   authori.docxThe textbook highlights four distinct styles of parenting   authori.docx
The textbook highlights four distinct styles of parenting   authori.docx
 
The textbook highlights four distinct styles of parenting authorita.docx
The textbook highlights four distinct styles of parenting authorita.docxThe textbook highlights four distinct styles of parenting authorita.docx
The textbook highlights four distinct styles of parenting authorita.docx
 
The textbook highlights four distinct styles of parenting autho.docx
The textbook highlights four distinct styles of parenting autho.docxThe textbook highlights four distinct styles of parenting autho.docx
The textbook highlights four distinct styles of parenting autho.docx
 
The textbook content for Understanding Operating Systems is organize.docx
The textbook content for Understanding Operating Systems is organize.docxThe textbook content for Understanding Operating Systems is organize.docx
The textbook content for Understanding Operating Systems is organize.docx
 
The term public administration is traditionally defined as a gov.docx
The term public administration is traditionally defined as a gov.docxThe term public administration is traditionally defined as a gov.docx
The term public administration is traditionally defined as a gov.docx
 
The terrorist attacks on September 11, 2001 forever changed U.S..docx
The terrorist attacks on September 11, 2001 forever changed U.S..docxThe terrorist attacks on September 11, 2001 forever changed U.S..docx
The terrorist attacks on September 11, 2001 forever changed U.S..docx
 
The term used to denote the beliefs that people have about political.docx
The term used to denote the beliefs that people have about political.docxThe term used to denote the beliefs that people have about political.docx
The term used to denote the beliefs that people have about political.docx
 
The TermsMany terms mean different things in our common language a.docx
The TermsMany terms mean different things in our common language a.docxThe TermsMany terms mean different things in our common language a.docx
The TermsMany terms mean different things in our common language a.docx
 
The term 21st century skills suggests that there is a new set of.docx
The term 21st century skills suggests that there is a new set of.docxThe term 21st century skills suggests that there is a new set of.docx
The term 21st century skills suggests that there is a new set of.docx
 
The term network economy” is used to emphasize the features of the .docx
The term network economy” is used to emphasize the features of the .docxThe term network economy” is used to emphasize the features of the .docx
The term network economy” is used to emphasize the features of the .docx
 
The term narcissist gets overused. I define it as not having empathy.docx
The term narcissist gets overused. I define it as not having empathy.docxThe term narcissist gets overused. I define it as not having empathy.docx
The term narcissist gets overused. I define it as not having empathy.docx
 
The term paper it should be of professional quality and be in th.docx
The term paper it should be of professional quality and be in th.docxThe term paper it should be of professional quality and be in th.docx
The term paper it should be of professional quality and be in th.docx
 

Recently uploaded

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Recently uploaded (20)

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 

The Technical Report and Executive SummaryTechnical report Your.docx

  • 1. The Technical Report and Executive Summary Technical report: Your report should be a 6-7 page double- spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables or citations. The technical report: Provide recommendations for access control and authentication mechanisms to increase the security within the identity management system. Review the mission and organization structure of this healthcare organization. Review the roles within the organization, and recommend the accesses, restrictions, and conditions for each role. Present these in a tabular format as part of your list of recommendations. Provide a comparison of risk scenarios to include the following: 1. What will happen if the CIO and the leadership do nothing, and decide to accept the risks? 2. Are there possible ways the CIO can transfer the risks? 3. Are there possible ways to mitigate the risks? 4. Are there possible ways to eliminate the risks? 5. What are the projected costs to address these risks? Provide an overall recommendation, with technical details to the director of IT. The executive summary: In addition to your technical report, also create a nontechnical report as an executive summary. This should be a 2-3 page double-spaced Word document. Scenario You are a systems administrator in the IT department of a major metropolitan hospital. Your duties are to ensure the confidentiality, availability, and integrity of patient records, as well as the other files and databases used throughout the hospital. Your work affects several departments, including Human Resources, Finance, Billing, Accounting, and Scheduling. You also apply security controls on passwords for user accounts. Just before clocking out for the day, you notice something
  • 2. strange in the hospital's computer system. Some person, or group, has accessed user accounts and conducted unauthorized activities. Recently, the hospital experienced intrusion into one of its patient's billing accounts. After validating user profiles in Active Directory and matching them with user credentials, you suspect several user's passwords have been compromised to gain access to the hospital's computer network. You schedule an emergency meeting with the director of IT and the hospital board. In light of this security breach, they ask you to examine the security posture of the hospital's information systems infrastructure and implement defense techniques. This must be done quickly, your director says. The hospital board is less knowledgeable about information system security. The board makes it clear that it has a limited cybersecurity budget. However, if you can make a strong case to the board, it is likely that they will increase your budget and implement your recommended tool companywide. You will share your findings on the hospital's security posture. Your findings will be brought to the director of IT in a technical report. You will also provide a nontechnical assessment of the overall identity management system of the hospital and define practices to restrict and permit access to information. You will share this assessment with the hospital board in the form of a narrated slide show presentation. You know that identity management will increase the security of the overall information system's infrastructure for the hospital. You also know that, with a good identity management system, the security and productivity benefits will outweigh costs incurred. This is the argument you must make to those stakeholders. Step 1: Defining the Information System Infrastructure Select a hospital or healthcare organization to research. You may choose an organization you are familiar with or can readily obtain information about. To maintain confidentiality, you do
  • 3. not need to mention the name of the organization. You may also choose a hypothetical/fictitious healthcare organization. Others have researched several healthcare organizations, which have suffered major security breaches, extensively. 1. Describe the organization and structure including the different business units and their functions. You may use an organizational chart to provide this information. 2. Choose one or more mission-critical systems of the healthcare organization. Define the information protection needs for the organization's mission-critical protected health information (PHI). This information is stored in database medical records for doctors, nurses, and insurance claims billing systems, which are used to fulfill the organizational information needs. 3. Define the workflows and processes for the high-level information systems that you have just identified that will store PHI. Workflows and processes for healthcare organizations define how the organization gets its work done. They describe the movement of patient information to the business units that have needs to process and manage that information, from billing to physician care. All these organizations have hardware and software implementations of their information systems, and it is critical to understand these components, and how they are connected (known as their topology), so the appropriate protections can be applied. Your research may produce instances and examples of how an information system is connected, to include cybersecurity components like firewalls, in the information system and network diagram. Be sure you understand the benefits and weaknesses for the different network topologies. You may incorporate what you find in your research, in your definition for workflows and processes for the high-level information systems and provide explanation of how that topology fulfills the mission for the health care organization. Your definition should include a high-level description of
  • 4. information systems hardware and software components and their interactions. · Information systems hardware · Information systems software Supply this information as a diagram with inputs, outputs, and technologies identified. Consider how you might restrict access and protect billing and PHI information. 4. Also include following definitions: · Open Systems Interconnections (OSI) Model · TCP/IP protocols · network protocolsStep 2: Threats Now that you have defined the hospital's information system infrastructure, you will have to understand what are the threats to those systems and describe the types of measures that could address those threats. In this section, you will learn about different types of identity access management solutions and how they protect against the threat of unauthorized access. To complete this section of the report, you’ll brush up on your knowledge of threats by reading the following resources: web security issues, insider threats, intrusion motives/hacker psychology, and CIA triad. Take what you learned from these resources to convey the threats to the hospital's information systems infrastructure. Include a brief summary of insider threats, intrusion motives, and hacker psychology in your report as it relates to your hospital data processing systems. Relate these threats to the vulnerabilities in the CIA triad. This section of your report will also include a description of the purpose and components of an identity management system to include authentication, authorization, and access control. Include a discussion of possible use of laptop devices by doctors who visit their patients at the hospital, and need access to hospital PHI data. You will include following information in your report: 1. Authorization 2. Access control 3. Passwords
  • 5. 4. Multi-factor authentication Define the types of access control management to include access control lists in operating systems, role-based access controls, files, and database access controls. Define types of authorization and authentication and the use of passwords, password management, and password protection in an identity management system. Describe common factor authentication mechanisms to include multi-factor authentication.Step 3: Password Cracking Tools You have successfully examined the threats to a healthcare organization's information systems infrastructure. Now, you must begin your research into password cracking software. Do some quick independent research on password cracking as it applies to your organization. Not all password cracking tools will necessarily perform with the same speed, precision, and results, making it important to test a few different products. Compare the password cracking tools (Cain & Abel and Ophcrack) based on these characteristics, and include as part of your assessment and recommendations on the use of such tools. You will test the organization's systems for password strength and complexity and complete validation testing. You will compare the results obtained from your first and second tool. You have tested and made comparisons of the performance of various password cracking tools and you have the data to support your recommendations for the use of such tools. Assignment Details In Unit 2, you have learned about three different types of distributions: Normal, binomial, and Poisson. You can take data that you collect and plot it out onto graphs to see a visual representation of the data. By simply looking at data on a graph, you can tell a lot about how related your observed data are and if they fit into a normal distribution. For this submission, you will be given a series of scenarios and
  • 6. small collections of data. You should plot the data or calculate probabilities using excel. Then, you will create your own real or hypothetical scenario to graph and explain. Answer the following: · The mean temperature for the month of July in Boston, Massachusetts is 73 degrees Fahrenheit. Plot the following data, which represent the observed mean temperature in Boston over the last 20 years: 1998 72 1999 69 2000 78 2001 70 2002 67 2003 74 2004 73 2005 65 2006 77 2007 71 2008 75 2009 68 2010 72 2011 77
  • 7. 2012 65 2013 79 2014 77 2015 78 2016 72 2017 74 · a. Is this a normal distribution? Explain your reasoning. b. What is an outlier? Are there any outliers in this distribution? Explain your reasoning fully. c. Using the above data, what is the probability that the mean will be over 76 in any given July? d. Using the above data, what is the probability that the mean will be over 80 in any given July? · A heatwave is defined as 3 or more days in a row with a high temperature over 90 degrees Fahrenheit. Given the following high temperatures recorded over a period of 20 days, what is the probability that there will be a heatwave in the next 10 days? Day 1 93 Day 2 88 Day 3 91 Day 4 86 Day 5
  • 8. 92 Day 6 91 Day 7 90 Day 8 88 Day 9 85 Day 10 91 Day 11 84 Day 12 86 Day 13 85 Day 14 90 Day 15 92 Day 16 89 Day 17 88 Day 18 90 Day 19 88 Day 20 90 Customer surveys reveal that 40% of customers purchase products online versus in the physical store location. Suppose that this business makes 12 sales in a given day a. Does this situation fit the parameters for a binomial distribution? Explain why or why not?
  • 9. b. Find the probability of the 12 sales on a given day exactly 4 are made online c. Find the probability of the 12 sales fewer than 6 are made online d. Find the probability of the 12 sales more than 8 are made online Your own example: · Choose a company that you have recently seen in the news because it is having some sort of problem or scandal, and complete the following: · Discuss the situation, and describe how the company could use distributions and probability statistics to learn more about how the scandal could affect its business. · If you were a business analyst for the company, what research would you want to do, and what kind of data would you want to collect to create a distribution? · Would this be a standard, binomial, or Poisson distribution? Why? · List and discuss at least 3 questions that you would want to create probabilities for (e.g.,What is the chance that the company loses 10% of its customers in the next year?). · What would you hope to learn from calculating these probabilities? · Assuming that upper management does not see the value in expending the time and money necessary to collect data to analyze, make an argument (at least 100 words) convincing them that the expenditure is necessary and explaining some dangers the company could face by not knowing what the data predict.