SlideShare a Scribd company logo
1 of 8
Discussion: Command and Control Architecture
Now that you have explored the various unmanned system C3
(Command, control, and communication) architectural design
features and their associated elements, you should be able to
compare and contrast via analysis the different technologies
employed by the different operational domains (air, ground,
maritime). Think of the deltas between the different domains
and how those differences impact the use of unmanned systems
from multiple perspectives, control, safety, human factors,
policy, etc. Your response should include your analysis of two
domains (air vs ground, air vs maritime, or ground vs maritime)
and how the C3 architecture is both common and yet unique
between the two different domains. Areas that you may want to
explore could include any combination of the below elements or
others that you identify.
Uniqueness between 2 different domains:
· Environment (ex: air, water, mountain, sand …)
· Communication Links
· Command and Control Strategies
· Commonalities between 2 different domains
· Control Systems (ex: GCS, GUI …)
· Remote Vehicle (ex: UAV, UGV, UUV)
Risk Assessment Plan
Risk in Healthcare organization is prevalent. Thus any
healthcare company must have a qualified risk manager who can
assess, develop, implement & monitor risk management plan by
which company can minimize exposures to threats. Risk
assessment for all companies needs to be done after every
specific period, which helps the company to take measures
against new threats that might expose a vulnerability in future
and impact in a loss for a company such as a loss of servers,
loss of customer data, loss of company’s confidential
information. HealthNet Network Inc needs an updated risk
assessment so that management can make better decisions for
the future and save companies assets, money, and their
customers data. Currently, HealthNet has three main products
i.e., HealthNet Exchange, HealthNet Pay and HealthNet
Connect, and all three products access the company servers,
customer data, payment portals, hospitals data through their
website. Threat isn’t just the outside forces that can
compromise company system, there is always more to that such
as natural disasters, threat to system failure, Accidental human
and the most important one is Malicious threat. Currently,
HealthNet has three data centers at each location i.e.,
Minneapolis, Portland, and Arlington; third party vendor
manages all. There are more than 1000 data servers and around
650 corporate laptops with other mobile devices. Production
centers are also located at the data centers. With new Risk
assessment plan for HealthNet can check the most current
opportunities, threats, vulnerabilities, strengths of the company
which can help management to take better decisions in future
such as where & how much money do the company needs to
invest in protecting HealtNet products from possible future
Risks. For HealthNet company products to work properly; It is
essential to identify the scope of the plan to avoid the risk of
“Scope Creep,” i.e., the scope of the project increases
uncontrollably. One of the significant scope for HealthNet Inc
is to ensure HIPAA compliance for HealthNet Inc data. Some of
the other scope are defined as follows:
· HNet Exchange should be able to transfer data securely
between the hospitals or clinics.
· Exchange of medical messages between the customers should
be done safely, and electronic messages should maintain their
authenticity.
· All the payments should be made through HNet Pay portal.
· HNet Pay should support secure payments such as using
HTTPS links.
· HNet Connect contains all the doctor or patient information
that should not be leaked to everyone, so it should be made sure
only accessible person can look for doctors or patients profile.
· All the three products are accessible through internet so secure
network, good firewalls, updated antivirus and software,
Intrusion detection system, and high good quality servers and
equipment’s, should be used.
· Identification, storage, usage, and transmission of health data.
· Proper security policies are followed by all the employees.
For the Risk assessment, we can use the following equation to
check the impact of that Risk:
Risk = Threat * Vulnerability
Risk is always high is the vulnerability is high, and Risk is low
when our vulnerability is low. Threats are always out there, and
it’s the vulnerability that threat always exposes and results in
Risk. We can use the Risk Assessment Matrix to measure the
impact of the Risk, which can weigh as High, Medium, and
Low. Following two techniques are used to assess the Risk for
HealthNet Inc.
· Quantitative Risk Assessment
Technique is used to calculate the actual cost and helped to
identify priority of risks and effectiveness of controls.
· Qualitative Risk Assessment
Is a subjective method based on opinions from expert? Experts
tell about their views about the likelihood & impact of the risks.
After looking at the following table, we can prioritize risks for
HNet inc. (Derril Gibson, 2015)
Attacks
Probability
Impact
Risk Level
Loss of Protected Health Information Leaked from unauthorized
Access
30
100
0.3*100
30%
DOS Attack
100
100
1.0*100
=100%
Accidental Human (Unintentional)
100
100
1.0*100
=100%
Web Defacing
50
90
.50*90
45%
Natural Disaster
50
100
.50*100
50%
Loss of website due to hardware or System Failure
30
100
.30*100
30%
Attacker or Hacker ,(Malicious Attack)
100
100
1.0*100
100%
By using these techniques following threats are recognized at
HealthCare Net Inc
· Production systems helps to produce information for the
company and to get the data. These systems should be working
correctly. Threat is noticed that company data losses when
hardware being removed from production systems.
· Many laptops and mobile devices are stolen, which are
considered to be as company assets, and with every stolen asset
company losses information.
· All three company products are accessible through the
internet, and there is always an internet threat such as any
hacker or malicious attack over the internet.
· Threat of Natural disasters such as floods, hurricane,
tornadoes, etc. can cause production outages, which can result
in a loss to the company.
· Insider Threat- Someone can make a mistake, and the threat of
doing this is very high. Threats of human doing accidentally is
always high.
· Threat of system failure. This threat will be low if we use
good and high-quality products or equipment for servers &
system safety. We should never eliminate the possibility of
system failure, or CPU fan is burn out, or power supply is out,
or motherboard dies. Threat of all this is happening is high if
equipment quality is low.
Following risk assessment matrix is used to tell the impact of
all the possible risk in HealthCare Net company environment.
(Derril Gibson, 2015)
Risk
Threat
Vulnerability
Impact of Risk
Loss of data because of Production system outage.
· Natural Disaster such as Floods
· Hurricanes
· Earthquakes
Location
High
Loss of data
· Insider Threat
· Internet Threat
· Hacker
· No Firewall
· Access control not properly implemented
· No Intrusion detection system on server
High
Network compromised
Malware
Antivirus software outdated or not renewed
High
Loss of company Information
· Stolen data
· Stolen assets such laptops, mobile devices
· Access Control not implemented
High
Loss of confidentiality
Hacker
Public facing server not protected with firewalls and intrusion
detection systems
High
Loss of customer
System Failure
Low quality equipment’s are used
High
Loss of Money
Internal
Lack of information about Policies such as HIPPA
Low
After Prioritizing the risk, Business Impact Analysis is done to
check the impact of these risk on HealthNet Inc. Following
threats are identified after doing the BIA.
· System outages
· Loss of confidential data
· loss of company Information,
· Loss of company Assets
· Loss of money
Resources are needed to get back our system online quickly if in
case system outages occur. Following measures should be
considered as soon as possible in the future to minimize the
vulnerabilities that lead HealthNet to above-stated risks.
· Cloud storage backup of data in case system outage occurs
· High-quality Intrusion detection system and proper access
controls should be implemented again to make sure there is no
unauthorized access.
· New insurance should be purchased for HealthNet, To insure
all the Assets
· Policies should be updated, and proper training held by
department managers
· Server protection software should be updated
· Antivirus software at the systems should be updated and
renewed till the time of next risk assessment
References:
· [Eli the Computer Guy] (2010, Dec 13) Introduction to Risk
Assessment. Retrieved from.
https://www.youtube.com/watch?v=EWdfovZIg2g
· Article, n.d. (2018). What Is Risk Management in Healthcare?
Retrieved from. https://catalyst.nejm.org/what-is-risk-
management-in-healthcare/
· Gibson, D. (2015). Managing Risk in Information Systems,
2nd edition. Burlington, MA: Jones & Bartlett, 2015

More Related Content

Similar to C3 Architecture Differences Between Domains

Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxedgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docxfathwaitewalter
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1misecho
 
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptx
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptxESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptx
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptxhamzaalkhairi802
 
Recovering from a Cyber Attack
Recovering from a Cyber AttackRecovering from a Cyber Attack
Recovering from a Cyber AttackAggregage
 
Problem Statement The subject is a cybersecurity solution fo.pdf
Problem Statement The subject is a cybersecurity solution fo.pdfProblem Statement The subject is a cybersecurity solution fo.pdf
Problem Statement The subject is a cybersecurity solution fo.pdfSUNIL64154
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeAaron White
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The SystemSteven Cahill
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackamrutharam
 
Chapter 33Incident Response and Forensic AnalysisCopyright ©.docx
Chapter 33Incident Response and Forensic AnalysisCopyright ©.docxChapter 33Incident Response and Forensic AnalysisCopyright ©.docx
Chapter 33Incident Response and Forensic AnalysisCopyright ©.docxchristinemaritza
 
Health Network, Inc.HNetPay Payment DatabaseView Bill .docx
Health Network, Inc.HNetPay Payment DatabaseView Bill .docxHealth Network, Inc.HNetPay Payment DatabaseView Bill .docx
Health Network, Inc.HNetPay Payment DatabaseView Bill .docxpooleavelina
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfsrtwgwfwwgw
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank ReportYogesh Kumar
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02anjalee990
 
Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01rajkumar jonuboyena
 
Elements of cybersecurity
Elements of cybersecurityElements of cybersecurity
Elements of cybersecuritySonaliG6
 
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)ChristopherAntonius
 
How to analyze cyber threats
How to analyze cyber threatsHow to analyze cyber threats
How to analyze cyber threatsAkankshaPathak27
 

Similar to C3 Architecture Differences Between Domains (20)

Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Mis
MisMis
Mis
 
Mis
MisMis
Mis
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
 
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptx
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptxESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptx
ESTABLISHING A FRAMEWORK FOR SECURITY AND CONTROL.pptx
 
Recovering from a Cyber Attack
Recovering from a Cyber AttackRecovering from a Cyber Attack
Recovering from a Cyber Attack
 
Problem Statement The subject is a cybersecurity solution fo.pdf
Problem Statement The subject is a cybersecurity solution fo.pdfProblem Statement The subject is a cybersecurity solution fo.pdf
Problem Statement The subject is a cybersecurity solution fo.pdf
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
 
Threats To The System
Threats To The SystemThreats To The System
Threats To The System
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Chapter 33Incident Response and Forensic AnalysisCopyright ©.docx
Chapter 33Incident Response and Forensic AnalysisCopyright ©.docxChapter 33Incident Response and Forensic AnalysisCopyright ©.docx
Chapter 33Incident Response and Forensic AnalysisCopyright ©.docx
 
Health Network, Inc.HNetPay Payment DatabaseView Bill .docx
Health Network, Inc.HNetPay Payment DatabaseView Bill .docxHealth Network, Inc.HNetPay Payment DatabaseView Bill .docx
Health Network, Inc.HNetPay Payment DatabaseView Bill .docx
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
 
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
Securityandethicalchallengesofinfornationtechnology 090902132631-phpapp02
 
Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01Ethicalhackingalicencetohack 120223062548-phpapp01
Ethicalhackingalicencetohack 120223062548-phpapp01
 
Elements of cybersecurity
Elements of cybersecurityElements of cybersecurity
Elements of cybersecurity
 
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
 
How to analyze cyber threats
How to analyze cyber threatsHow to analyze cyber threats
How to analyze cyber threats
 

More from madlynplamondon

. According to your textbook, Contrary to a popular misconception.docx
. According to your textbook, Contrary to a popular misconception.docx. According to your textbook, Contrary to a popular misconception.docx
. According to your textbook, Contrary to a popular misconception.docxmadlynplamondon
 
-How did artwork produced in America from 1945 to 1960 compare to ar.docx
-How did artwork produced in America from 1945 to 1960 compare to ar.docx-How did artwork produced in America from 1945 to 1960 compare to ar.docx
-How did artwork produced in America from 1945 to 1960 compare to ar.docxmadlynplamondon
 
-Just thoughts and opinion on the reading-Consent and compen.docx
-Just thoughts and opinion on the reading-Consent and compen.docx-Just thoughts and opinion on the reading-Consent and compen.docx
-Just thoughts and opinion on the reading-Consent and compen.docxmadlynplamondon
 
. The Questioned Documents Unit (QDU) provides forensic support .docx
. The Questioned Documents Unit (QDU) provides forensic support .docx. The Questioned Documents Unit (QDU) provides forensic support .docx
. The Questioned Documents Unit (QDU) provides forensic support .docxmadlynplamondon
 
.  What is it about the fundamental nature and structure of the Olym.docx
.  What is it about the fundamental nature and structure of the Olym.docx.  What is it about the fundamental nature and structure of the Olym.docx
.  What is it about the fundamental nature and structure of the Olym.docxmadlynplamondon
 
-Learning objectives for presentation-Brief background o.docx
-Learning objectives for presentation-Brief background o.docx-Learning objectives for presentation-Brief background o.docx
-Learning objectives for presentation-Brief background o.docxmadlynplamondon
 
-You will need to play a phone game Angry Birds (any version) to mak.docx
-You will need to play a phone game Angry Birds (any version) to mak.docx-You will need to play a phone game Angry Birds (any version) to mak.docx
-You will need to play a phone game Angry Birds (any version) to mak.docxmadlynplamondon
 
. EDU 571 Week 5 Discussion 1 -Data Collection Please respond .docx
. EDU 571 Week 5 Discussion 1 -Data Collection Please respond .docx. EDU 571 Week 5 Discussion 1 -Data Collection Please respond .docx
. EDU 571 Week 5 Discussion 1 -Data Collection Please respond .docxmadlynplamondon
 
. What were the causes of World War II Explain how and why the Unit.docx
. What were the causes of World War II Explain how and why the Unit.docx. What were the causes of World War II Explain how and why the Unit.docx
. What were the causes of World War II Explain how and why the Unit.docxmadlynplamondon
 
. Complete the prewriting for the progress reportPrewriting p.docx
. Complete the prewriting for the progress reportPrewriting p.docx. Complete the prewriting for the progress reportPrewriting p.docx
. Complete the prewriting for the progress reportPrewriting p.docxmadlynplamondon
 
-in Filomena by Roberta Fernandez the author refers to the Mexican r.docx
-in Filomena by Roberta Fernandez the author refers to the Mexican r.docx-in Filomena by Roberta Fernandez the author refers to the Mexican r.docx
-in Filomena by Roberta Fernandez the author refers to the Mexican r.docxmadlynplamondon
 
-Write about a violent religious event in history.(Ex. Muslim ex.docx
-Write about a violent religious event in history.(Ex. Muslim ex.docx-Write about a violent religious event in history.(Ex. Muslim ex.docx
-Write about a violent religious event in history.(Ex. Muslim ex.docxmadlynplamondon
 
-This project is an opportunity to demonstrate the ability to analyz.docx
-This project is an opportunity to demonstrate the ability to analyz.docx-This project is an opportunity to demonstrate the ability to analyz.docx
-This project is an opportunity to demonstrate the ability to analyz.docxmadlynplamondon
 
-7 Three men are trapped in a cave with no hope of rescue and no foo.docx
-7 Three men are trapped in a cave with no hope of rescue and no foo.docx-7 Three men are trapped in a cave with no hope of rescue and no foo.docx
-7 Three men are trapped in a cave with no hope of rescue and no foo.docxmadlynplamondon
 
-1. Are the three main elements of compensation systems—internal.docx
-1. Are the three main elements of compensation systems—internal.docx-1. Are the three main elements of compensation systems—internal.docx
-1. Are the three main elements of compensation systems—internal.docxmadlynplamondon
 
- What are the key differences between national health service (.docx
- What are the key differences between national health service (.docx- What are the key differences between national health service (.docx
- What are the key differences between national health service (.docxmadlynplamondon
 
--Describe and analyze the ways in which Alfons Heck’s participation.docx
--Describe and analyze the ways in which Alfons Heck’s participation.docx--Describe and analyze the ways in which Alfons Heck’s participation.docx
--Describe and analyze the ways in which Alfons Heck’s participation.docxmadlynplamondon
 
------ Watch an online speechpresentation of 20 minutes or lo.docx
------ Watch an online speechpresentation of 20 minutes or lo.docx------ Watch an online speechpresentation of 20 minutes or lo.docx
------ Watch an online speechpresentation of 20 minutes or lo.docxmadlynplamondon
 
) Florida National UniversityNursing DepartmentBSN.docx
) Florida National UniversityNursing DepartmentBSN.docx) Florida National UniversityNursing DepartmentBSN.docx
) Florida National UniversityNursing DepartmentBSN.docxmadlynplamondon
 
- Please answer question 2 at the end of the case.- cita.docx
- Please answer question 2 at the end of the case.- cita.docx- Please answer question 2 at the end of the case.- cita.docx
- Please answer question 2 at the end of the case.- cita.docxmadlynplamondon
 

More from madlynplamondon (20)

. According to your textbook, Contrary to a popular misconception.docx
. According to your textbook, Contrary to a popular misconception.docx. According to your textbook, Contrary to a popular misconception.docx
. According to your textbook, Contrary to a popular misconception.docx
 
-How did artwork produced in America from 1945 to 1960 compare to ar.docx
-How did artwork produced in America from 1945 to 1960 compare to ar.docx-How did artwork produced in America from 1945 to 1960 compare to ar.docx
-How did artwork produced in America from 1945 to 1960 compare to ar.docx
 
-Just thoughts and opinion on the reading-Consent and compen.docx
-Just thoughts and opinion on the reading-Consent and compen.docx-Just thoughts and opinion on the reading-Consent and compen.docx
-Just thoughts and opinion on the reading-Consent and compen.docx
 
. The Questioned Documents Unit (QDU) provides forensic support .docx
. The Questioned Documents Unit (QDU) provides forensic support .docx. The Questioned Documents Unit (QDU) provides forensic support .docx
. The Questioned Documents Unit (QDU) provides forensic support .docx
 
.  What is it about the fundamental nature and structure of the Olym.docx
.  What is it about the fundamental nature and structure of the Olym.docx.  What is it about the fundamental nature and structure of the Olym.docx
.  What is it about the fundamental nature and structure of the Olym.docx
 
-Learning objectives for presentation-Brief background o.docx
-Learning objectives for presentation-Brief background o.docx-Learning objectives for presentation-Brief background o.docx
-Learning objectives for presentation-Brief background o.docx
 
-You will need to play a phone game Angry Birds (any version) to mak.docx
-You will need to play a phone game Angry Birds (any version) to mak.docx-You will need to play a phone game Angry Birds (any version) to mak.docx
-You will need to play a phone game Angry Birds (any version) to mak.docx
 
. EDU 571 Week 5 Discussion 1 -Data Collection Please respond .docx
. EDU 571 Week 5 Discussion 1 -Data Collection Please respond .docx. EDU 571 Week 5 Discussion 1 -Data Collection Please respond .docx
. EDU 571 Week 5 Discussion 1 -Data Collection Please respond .docx
 
. What were the causes of World War II Explain how and why the Unit.docx
. What were the causes of World War II Explain how and why the Unit.docx. What were the causes of World War II Explain how and why the Unit.docx
. What were the causes of World War II Explain how and why the Unit.docx
 
. Complete the prewriting for the progress reportPrewriting p.docx
. Complete the prewriting for the progress reportPrewriting p.docx. Complete the prewriting for the progress reportPrewriting p.docx
. Complete the prewriting for the progress reportPrewriting p.docx
 
-in Filomena by Roberta Fernandez the author refers to the Mexican r.docx
-in Filomena by Roberta Fernandez the author refers to the Mexican r.docx-in Filomena by Roberta Fernandez the author refers to the Mexican r.docx
-in Filomena by Roberta Fernandez the author refers to the Mexican r.docx
 
-Write about a violent religious event in history.(Ex. Muslim ex.docx
-Write about a violent religious event in history.(Ex. Muslim ex.docx-Write about a violent religious event in history.(Ex. Muslim ex.docx
-Write about a violent religious event in history.(Ex. Muslim ex.docx
 
-This project is an opportunity to demonstrate the ability to analyz.docx
-This project is an opportunity to demonstrate the ability to analyz.docx-This project is an opportunity to demonstrate the ability to analyz.docx
-This project is an opportunity to demonstrate the ability to analyz.docx
 
-7 Three men are trapped in a cave with no hope of rescue and no foo.docx
-7 Three men are trapped in a cave with no hope of rescue and no foo.docx-7 Three men are trapped in a cave with no hope of rescue and no foo.docx
-7 Three men are trapped in a cave with no hope of rescue and no foo.docx
 
-1. Are the three main elements of compensation systems—internal.docx
-1. Are the three main elements of compensation systems—internal.docx-1. Are the three main elements of compensation systems—internal.docx
-1. Are the three main elements of compensation systems—internal.docx
 
- What are the key differences between national health service (.docx
- What are the key differences between national health service (.docx- What are the key differences between national health service (.docx
- What are the key differences between national health service (.docx
 
--Describe and analyze the ways in which Alfons Heck’s participation.docx
--Describe and analyze the ways in which Alfons Heck’s participation.docx--Describe and analyze the ways in which Alfons Heck’s participation.docx
--Describe and analyze the ways in which Alfons Heck’s participation.docx
 
------ Watch an online speechpresentation of 20 minutes or lo.docx
------ Watch an online speechpresentation of 20 minutes or lo.docx------ Watch an online speechpresentation of 20 minutes or lo.docx
------ Watch an online speechpresentation of 20 minutes or lo.docx
 
) Florida National UniversityNursing DepartmentBSN.docx
) Florida National UniversityNursing DepartmentBSN.docx) Florida National UniversityNursing DepartmentBSN.docx
) Florida National UniversityNursing DepartmentBSN.docx
 
- Please answer question 2 at the end of the case.- cita.docx
- Please answer question 2 at the end of the case.- cita.docx- Please answer question 2 at the end of the case.- cita.docx
- Please answer question 2 at the end of the case.- cita.docx
 

Recently uploaded

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 

Recently uploaded (20)

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

C3 Architecture Differences Between Domains

  • 1. Discussion: Command and Control Architecture Now that you have explored the various unmanned system C3 (Command, control, and communication) architectural design features and their associated elements, you should be able to compare and contrast via analysis the different technologies employed by the different operational domains (air, ground, maritime). Think of the deltas between the different domains and how those differences impact the use of unmanned systems from multiple perspectives, control, safety, human factors, policy, etc. Your response should include your analysis of two domains (air vs ground, air vs maritime, or ground vs maritime) and how the C3 architecture is both common and yet unique between the two different domains. Areas that you may want to explore could include any combination of the below elements or others that you identify. Uniqueness between 2 different domains: · Environment (ex: air, water, mountain, sand …) · Communication Links · Command and Control Strategies · Commonalities between 2 different domains · Control Systems (ex: GCS, GUI …) · Remote Vehicle (ex: UAV, UGV, UUV) Risk Assessment Plan
  • 2. Risk in Healthcare organization is prevalent. Thus any healthcare company must have a qualified risk manager who can assess, develop, implement & monitor risk management plan by which company can minimize exposures to threats. Risk assessment for all companies needs to be done after every specific period, which helps the company to take measures against new threats that might expose a vulnerability in future and impact in a loss for a company such as a loss of servers, loss of customer data, loss of company’s confidential information. HealthNet Network Inc needs an updated risk assessment so that management can make better decisions for the future and save companies assets, money, and their customers data. Currently, HealthNet has three main products i.e., HealthNet Exchange, HealthNet Pay and HealthNet Connect, and all three products access the company servers, customer data, payment portals, hospitals data through their website. Threat isn’t just the outside forces that can compromise company system, there is always more to that such as natural disasters, threat to system failure, Accidental human and the most important one is Malicious threat. Currently, HealthNet has three data centers at each location i.e., Minneapolis, Portland, and Arlington; third party vendor manages all. There are more than 1000 data servers and around 650 corporate laptops with other mobile devices. Production centers are also located at the data centers. With new Risk assessment plan for HealthNet can check the most current opportunities, threats, vulnerabilities, strengths of the company which can help management to take better decisions in future such as where & how much money do the company needs to invest in protecting HealtNet products from possible future Risks. For HealthNet company products to work properly; It is essential to identify the scope of the plan to avoid the risk of “Scope Creep,” i.e., the scope of the project increases uncontrollably. One of the significant scope for HealthNet Inc is to ensure HIPAA compliance for HealthNet Inc data. Some of the other scope are defined as follows:
  • 3. · HNet Exchange should be able to transfer data securely between the hospitals or clinics. · Exchange of medical messages between the customers should be done safely, and electronic messages should maintain their authenticity. · All the payments should be made through HNet Pay portal. · HNet Pay should support secure payments such as using HTTPS links. · HNet Connect contains all the doctor or patient information that should not be leaked to everyone, so it should be made sure only accessible person can look for doctors or patients profile. · All the three products are accessible through internet so secure network, good firewalls, updated antivirus and software, Intrusion detection system, and high good quality servers and equipment’s, should be used. · Identification, storage, usage, and transmission of health data. · Proper security policies are followed by all the employees. For the Risk assessment, we can use the following equation to check the impact of that Risk: Risk = Threat * Vulnerability Risk is always high is the vulnerability is high, and Risk is low when our vulnerability is low. Threats are always out there, and it’s the vulnerability that threat always exposes and results in Risk. We can use the Risk Assessment Matrix to measure the impact of the Risk, which can weigh as High, Medium, and Low. Following two techniques are used to assess the Risk for HealthNet Inc. · Quantitative Risk Assessment Technique is used to calculate the actual cost and helped to identify priority of risks and effectiveness of controls. · Qualitative Risk Assessment Is a subjective method based on opinions from expert? Experts tell about their views about the likelihood & impact of the risks. After looking at the following table, we can prioritize risks for
  • 4. HNet inc. (Derril Gibson, 2015) Attacks Probability Impact Risk Level Loss of Protected Health Information Leaked from unauthorized Access 30 100 0.3*100 30% DOS Attack 100 100 1.0*100 =100% Accidental Human (Unintentional) 100 100 1.0*100 =100% Web Defacing 50 90 .50*90 45% Natural Disaster 50 100 .50*100 50% Loss of website due to hardware or System Failure 30
  • 5. 100 .30*100 30% Attacker or Hacker ,(Malicious Attack) 100 100 1.0*100 100% By using these techniques following threats are recognized at HealthCare Net Inc · Production systems helps to produce information for the company and to get the data. These systems should be working correctly. Threat is noticed that company data losses when hardware being removed from production systems. · Many laptops and mobile devices are stolen, which are considered to be as company assets, and with every stolen asset company losses information. · All three company products are accessible through the internet, and there is always an internet threat such as any hacker or malicious attack over the internet. · Threat of Natural disasters such as floods, hurricane, tornadoes, etc. can cause production outages, which can result in a loss to the company. · Insider Threat- Someone can make a mistake, and the threat of doing this is very high. Threats of human doing accidentally is always high. · Threat of system failure. This threat will be low if we use good and high-quality products or equipment for servers & system safety. We should never eliminate the possibility of system failure, or CPU fan is burn out, or power supply is out, or motherboard dies. Threat of all this is happening is high if equipment quality is low. Following risk assessment matrix is used to tell the impact of all the possible risk in HealthCare Net company environment. (Derril Gibson, 2015)
  • 6. Risk Threat Vulnerability Impact of Risk Loss of data because of Production system outage. · Natural Disaster such as Floods · Hurricanes · Earthquakes Location High Loss of data · Insider Threat · Internet Threat · Hacker · No Firewall · Access control not properly implemented · No Intrusion detection system on server High Network compromised Malware Antivirus software outdated or not renewed High Loss of company Information · Stolen data · Stolen assets such laptops, mobile devices · Access Control not implemented High Loss of confidentiality Hacker Public facing server not protected with firewalls and intrusion detection systems High Loss of customer
  • 7. System Failure Low quality equipment’s are used High Loss of Money Internal Lack of information about Policies such as HIPPA Low After Prioritizing the risk, Business Impact Analysis is done to check the impact of these risk on HealthNet Inc. Following threats are identified after doing the BIA. · System outages · Loss of confidential data · loss of company Information, · Loss of company Assets · Loss of money Resources are needed to get back our system online quickly if in case system outages occur. Following measures should be considered as soon as possible in the future to minimize the vulnerabilities that lead HealthNet to above-stated risks. · Cloud storage backup of data in case system outage occurs · High-quality Intrusion detection system and proper access controls should be implemented again to make sure there is no unauthorized access. · New insurance should be purchased for HealthNet, To insure all the Assets · Policies should be updated, and proper training held by department managers · Server protection software should be updated · Antivirus software at the systems should be updated and renewed till the time of next risk assessment
  • 8. References: · [Eli the Computer Guy] (2010, Dec 13) Introduction to Risk Assessment. Retrieved from. https://www.youtube.com/watch?v=EWdfovZIg2g · Article, n.d. (2018). What Is Risk Management in Healthcare? Retrieved from. https://catalyst.nejm.org/what-is-risk- management-in-healthcare/ · Gibson, D. (2015). Managing Risk in Information Systems, 2nd edition. Burlington, MA: Jones & Bartlett, 2015