SlideShare a Scribd company logo
Cain and Abel
Ophcrack
Start Here
CYB610 Project 1(Transript)
You are a systems administrator in the IT department of a major
metropolitan hospital. Your duties are to ensure the
confidentiality, availability, and integrity of patient records, as
well as the other files and databases used throughout the
hospital. Your work affects several departments, including
Human Resources, Finance, Billing, Accounting, and
Scheduling. You also apply security controls on passwords for
user accounts.
Just before clocking out for the day, you notice something
strange in the hospital's computer system. Some person, or
group, has accessed user accounts and conducted unauthorized
activities. Recently, the hospital experienced intrusion into one
of its patient's billing accounts. After validating user profiles in
Active Directory and matching them with user credentials, you
suspect several user's passwords have been compromised to gain
access to the hospital's computer network. You schedule an
emergency meeting with the director of IT and the hospital
board.
In light of this security breach, they ask you to examine the
security posture of the hospital's information systems
infrastructure and implement defense techniques. This must be
done quickly, your director says. The hospital board is less
knowledgeable about information system security. The board
makes it clear that it has a limited cybersecurity budget.
However, if you can make a strong case to the board, it is likely
that they will increase your budget and implement your
recommended tool companywide.
You will share your findings on the hospital's security posture.
Your findings will be brought to the director of IT in a technical
report. You will also provide a nontechnical assessment of the
overall identity management system of the hospital and define
practices to restrict and permit access to information. You will
share this assessment with the hospital board in the form of a
narrated slide show presentation.
You know that identity management will increase the security
of the overall information system's infrastructure for the
hospital. You also know that, with a good identity management
system, the security and productivity benefits will outweigh
costs incurred. This is the argument you must make to those
stakeholders.
Daily life requires us to have access to a lot of information, and
information systems help us access that information. Desktop
computers, laptops, and mobile devices keep us connected to the
information we need through processes that work via hardware
and software components. Information systems infrastructure
makes this possible. However, our easy access to
communication and information also creates security and
privacy risks. Laws, regulations, policies, and guidelines exist
to protect information and information owners. Cybersecurity
ensures the confidentiality, integrity, and availability of the
information. Identity management is a fundamental practice.
Part of identity management is the governance of access,
authorization, and authentication of users to information
systems, Identity management is one part of a layered security
defense strategy within the information systems infrastructure.
Your work in this project will enable you to produce a technical
report and nontechnical presentation that addresses these
requirements.
There are six steps that will lead you through this project to
create your final deliverables. You should complete Project 1
during Week 1. After beginning with the workplace scenario,
continue to Step 1: "Defining the Information System
Infrastructure," which builds upon the problem presented in the
scenario.
When you submit your project, your work will be evaluated
using the competencies listed below. You can use the list below
to self-check your work before submission.
· 1.1: Organize document or presentation in a manner that
promotes understanding and meets the requirements of the
assignment.
· 2.3: Evaluate the information in logical manner to determine
value and relevance.
· 5.4: Identify potential threats to operating systems and the
security features necessary to guard against them.
· 6.2: Create a roadmap for organizations to use in development
of an IMA program (to address gaps in their current offerings).
Step 1: Defining the Information System Infrastructure
The director of IT and the members of the board would like an
as-is definition of the information system infrastructure of a
healthcare organization. You will begin your report with this
background description. You will provide the following
information in your review of the current information systems
infrastructure:
1. Choose and research a healthcare organization, noting its
organization and structure. Define the healthcare organization's
structure and identify the different business units and their
functions. You may use a variety of methods to provide this
information, such as an organizational chart.
2. Choose one or more mission critical systems of the healthcare
organization. Define the information needs, as they relate to the
organization's mission critical Protected Health Information
(PHI). This information is stored in database medical records
for doctors, nurses, and insurance claims billing systems, which
are used to fulfill the organizational information needs.
3. Define the workflows and processes for the high-level
information systems. Your definition should include a high-
level description of information systems hardware and software
components and their interactions. Take time to read the
following resources. They will help you construct your
definition.
· Information systems hardware
· Information systems software
You may supply this information as a diagram with inputs,
outputs, and technologies identified. Consider how you might
restrict access and protect billing and PHI information.
4. The links shown below provide access to essential
information you’ll need to complete this part of the hospital’s
information system infrastructure definition. Click each link,
review its resources, and refer to them as you compose this part
of the definition.
· Open Systems Interconnections (OSI) Model
· TCP/IP protocols
· network protocols
Step 2: Threats
Now that you have defined the hospital's information system
infrastructure, you will cover the web security and threats the
system faces and introduce identity management as a solution.
To complete this section of the report, you’ll brush up on your
knowledge of threats by reading the following resources: web
security issues, insider threats, intrusion motives/hacker
psychology, and CIA triad. Take what you learned from these
resources to convey the threats to the hospital's information
systems infrastructure. Include a brief summary of insider
threats, intrusion motives, and hacker psychology in your report
as it relates to your hospital data processing systems. Relate
these threats to the vulnerabilities in the CIA triad.
This section of your report will also include a description of the
purpose and components of an identity management system to
include authentication, authorization, and access control.
Include a discussion of possible use of laptop devices by
doctors who visit their patients at the hospital, and need access
to hospital PHI data. Review the content of the following
resources. As you’re reading, take any notes you think will
help you develop your description.
1. Authorization
2. Access control
3. Passwords
4. Multi-factor authentication
Next, expand upon your description. Define the types of access
control management to include access control lists in operating
systems, role-based access controls, files, and database access
controls. Define types of authorization and authentication and
the use of passwords, password management, and password
protection in an identity management system. Describe common
factor authentication mechanisms to include multi-factor
authentication. Step 3: Password Cracking Tools
Note: You will utilize the tools in Workspace for this step. If
you need help outside the classroom to complete this project,
you must register for CLAB 699 Cyber Computing Lab
Assistance (go to the Discussions List for registration
information). Primary lab assistance is available from a team of
lab assistants. Lab assistants are professionals and trained to
help you.
Click here to access the Project 1 Workspace Exercise
Instructions. Explore the tutorials and user guides to learn more
about the tools you will use.
You have successfully examined the threats to a healthcare
organization's information systems infrastructure. Now, you
must begin your research into password cracking software. Start
by experimenting with the password cracking tools available to
you in the lab. Enter Workspace and complete the lab activities
related to authentication and password recovery/cracking. Do
some quick independent research on password cracking as it
applies to your organization.
Step 4: Comparing Software
Note: You will utilize the tools in Workspace for this step.
You have successfully tested more than one password cracking
tool. Compare them. Not all password cracking tools will
necessarily perform with the same speed, precision, and results,
making it important to test a few different products. The
comparison will be part of your assessment and help you make
recommendations on the use of such tools. You will test the
organization's systems for password strength and complexity
and complete validation testing. You will compare the results
obtained from your first and second tool.
1. Read this article about cyberattacks, perform two different
types of cyberattacks in the first, and in the second tool, crack
user account passwords. Describe them in simple nontechnical
terms for the leadership. You can identify which tool is the
most effective and why for your organization's IT environment
2. Compare and contrast the results from the two methods used
to crack the accounts for the three passwords (each encrypted
by the two hash algorithms). Show their benefits. You can make
certain conclusions that help your company's cybersecurity
posture after using these methods.
3. Explain to the director of IT and the members of the board
that the healthcare organization’s anti-virus software will detect
password cracking tools as malware. Also explain how this
impacts the effectiveness of testing security controls like
password strength. Help the leadership understand the risks and
benefits of using password cracking tools, through persuasive
arguments in your report and presentation. If any of the tools
take longer than 4-5 minutes to guess a password, record the
estimated length of time the tool anticipates to guess it.
Include this information in your presentation.
Step 5: The Non-Technical Presentation
You now have the information you need to prepare your product
for stakeholders. Based on the research and work you've
completed in Workspace, you will develop two items: a
technical report for the director of IT, and a nontechnical slide
show presentation for the members of the board. You will tailor
the language of your reports appropriately to the different
audiences.
The nontechnical presentation: Your upper-level management
team consists of technical and nontechnical leadership, and they
are interested in the bottom line. You must help these leaders
understand the identity management system vulnerabilities you
discovered in password cracking and access control. They need
to clearly see what actions they must either take or approve.
The following are a few questions to consider when creating
your presentation:
1. How do you present your technical findings succinctly to a
nontechnical audience? Your technical report for IT will span
many pages; but you will probably be afforded no more than 30
minutes or 8-10 slides for your presentation and the following
discussion with leadership.
2. How do you describe the most serious risks factually but
without sounding too temperamental? No one likes to hear that
their entire network has been hacked, data has been stolen, and
the attackers have won. You will need to describe the
seriousness of your findings while also assuring upper-level
management that these are not uncommon occurrences today.
3. How do your results affect business operations? Make sure
you are presenting these very technical password cracking
results in business terms upper-level management will
understand.
4. What do you propose? Management will not only want to
understand what you have discovered; they will want to know
what you propose as a solution.
Step 6: The Technical Report and Executive Summary
The technical report and the nontechnical presentation will
identify compromises and vulnerabilities in the information
systems infrastructure of the healthcare organization, and
identify risks to the organization's data. You will propose a way
to prioritize these risks and include possible remediation
actions.
The technical report: Provide recommendations for access
control and authentication mechanisms to increase the security
within the identity management system. After you have defined
the roles within the organization, recommend the accesses,
restrictions, and conditions for each role. Present these in a
tabular format, as part of your list of recommendations.
Provide a comparison of risk scenarios to include the following:
1. What will happen if the CIO and the leadership do nothing,
and decide to accept the risks?
2. Are there possible ways the CIO can transfer the risks?
3. Are there possible ways to mitigate the risks?
4. Are there possible ways to eliminate the risks?
5. What are the projected costs to address these risks?
Provide an overall recommendation, with technical details to the
director of IT.
The executive summary: In addition to your technical report,
also create a nontechnical report as an executive summary.
The deliverables for this project are as follows:
1. Nontechnical presentation: This is a 8-10 slide PowerPoint
presentation for business executives and board members.
2. Technical report: Your report should be a 6-7 page double-
spaced Word document with citations in APA format. The page
count does not include figures, diagrams, tables or citations.
3. Executive summary: This should be a 2-3 page double-spaced
Word document.
A good practice would be to use each competency as a self-
check to confirm you have incorporated all of them in your
work.
· 1.1: Organize document or presentation in a manner that
promotes understanding and meets the requirements of the
assignment.
· 2.3: Evaluate the information in logical manner to determine
value and relevance.
· 5.4: Identify potential threats to operating systems and the
security features necessary to guard against them.
· 6.2: Create a roadmap for organizations to use in development
of an IMA program (to address gaps in their current offerings).

More Related Content

Similar to Cain and AbelOphcrackStart H.docx

Csec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.comCsec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.com
robertlesew5
 
CSEC 610 Effective Communication - snaptutorial.com
CSEC 610 Effective Communication - snaptutorial.comCSEC 610 Effective Communication - snaptutorial.com
CSEC 610 Effective Communication - snaptutorial.com
donaldzs7
 
CST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.comCST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.com
agathachristie265
 
Cyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.comCyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.com
robertlesew8
 
Cyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.comCyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.com
McdonaldRyan80
 
CYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.comCYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.com
donaldzs9
 
CYB 610 Exceptional Education - snaptutorial.com
CYB 610   Exceptional Education - snaptutorial.comCYB 610   Exceptional Education - snaptutorial.com
CYB 610 Exceptional Education - snaptutorial.com
DavisMurphyA98
 
CST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Educational Specialist--cst610rank.comCST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Educational Specialist--cst610rank.com
VSNaipaul15
 
CST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.comCST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.com
agathachristie112
 
CST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.comCST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.com
KeatonJennings104
 
CST 610 Exceptional Education - snaptutorial.com
CST 610   Exceptional Education - snaptutorial.comCST 610   Exceptional Education - snaptutorial.com
CST 610 Exceptional Education - snaptutorial.com
DavisMurphyA97
 
CST 610 Effective Communication - snaptutorial.com
CST 610 Effective Communication - snaptutorial.comCST 610 Effective Communication - snaptutorial.com
CST 610 Effective Communication - snaptutorial.com
donaldzs7
 
CST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.comCST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.com
kopiko146
 
Cyb 610 Enhance teaching / snaptutorial.com
Cyb 610   Enhance teaching / snaptutorial.comCyb 610   Enhance teaching / snaptutorial.com
Cyb 610 Enhance teaching / snaptutorial.com
Baileyaby
 
Csec 610 Enhance teaching / snaptutorial.com
Csec 610  Enhance teaching / snaptutorial.comCsec 610  Enhance teaching / snaptutorial.com
Csec 610 Enhance teaching / snaptutorial.com
Baileyabv
 
Cst 610 Enhance teaching / snaptutorial.com
Cst 610  Enhance teaching / snaptutorial.comCst 610  Enhance teaching / snaptutorial.com
Cst 610 Enhance teaching / snaptutorial.com
Baileyabw
 
CST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.comCST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.com
claric240
 
The Technical Report and Executive SummaryTechnical report Your.docx
The Technical Report and Executive SummaryTechnical report Your.docxThe Technical Report and Executive SummaryTechnical report Your.docx
The Technical Report and Executive SummaryTechnical report Your.docx
gloriab9
 
Cst 610 Your world/newtonhelp.com
Cst 610 Your world/newtonhelp.comCst 610 Your world/newtonhelp.com
Cst 610 Your world/newtonhelp.com
amaranthbeg93
 
Cst 610 Motivated Minds/newtonhelp.com
Cst 610 Motivated Minds/newtonhelp.comCst 610 Motivated Minds/newtonhelp.com
Cst 610 Motivated Minds/newtonhelp.com
amaranthbeg53
 

Similar to Cain and AbelOphcrackStart H.docx (20)

Csec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.comCsec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.com
 
CSEC 610 Effective Communication - snaptutorial.com
CSEC 610 Effective Communication - snaptutorial.comCSEC 610 Effective Communication - snaptutorial.com
CSEC 610 Effective Communication - snaptutorial.com
 
CST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.comCST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.com
 
Cyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.comCyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.com
 
Cyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.comCyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.com
 
CYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.comCYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.com
 
CYB 610 Exceptional Education - snaptutorial.com
CYB 610   Exceptional Education - snaptutorial.comCYB 610   Exceptional Education - snaptutorial.com
CYB 610 Exceptional Education - snaptutorial.com
 
CST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Educational Specialist--cst610rank.comCST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Educational Specialist--cst610rank.com
 
CST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.comCST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.com
 
CST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.comCST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.com
 
CST 610 Exceptional Education - snaptutorial.com
CST 610   Exceptional Education - snaptutorial.comCST 610   Exceptional Education - snaptutorial.com
CST 610 Exceptional Education - snaptutorial.com
 
CST 610 Effective Communication - snaptutorial.com
CST 610 Effective Communication - snaptutorial.comCST 610 Effective Communication - snaptutorial.com
CST 610 Effective Communication - snaptutorial.com
 
CST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.comCST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.com
 
Cyb 610 Enhance teaching / snaptutorial.com
Cyb 610   Enhance teaching / snaptutorial.comCyb 610   Enhance teaching / snaptutorial.com
Cyb 610 Enhance teaching / snaptutorial.com
 
Csec 610 Enhance teaching / snaptutorial.com
Csec 610  Enhance teaching / snaptutorial.comCsec 610  Enhance teaching / snaptutorial.com
Csec 610 Enhance teaching / snaptutorial.com
 
Cst 610 Enhance teaching / snaptutorial.com
Cst 610  Enhance teaching / snaptutorial.comCst 610  Enhance teaching / snaptutorial.com
Cst 610 Enhance teaching / snaptutorial.com
 
CST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.comCST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.com
 
The Technical Report and Executive SummaryTechnical report Your.docx
The Technical Report and Executive SummaryTechnical report Your.docxThe Technical Report and Executive SummaryTechnical report Your.docx
The Technical Report and Executive SummaryTechnical report Your.docx
 
Cst 610 Your world/newtonhelp.com
Cst 610 Your world/newtonhelp.comCst 610 Your world/newtonhelp.com
Cst 610 Your world/newtonhelp.com
 
Cst 610 Motivated Minds/newtonhelp.com
Cst 610 Motivated Minds/newtonhelp.comCst 610 Motivated Minds/newtonhelp.com
Cst 610 Motivated Minds/newtonhelp.com
 

More from RAHUL126667

Applying the Four Principles Case StudyPart 1 Chart (60 points)B.docx
Applying the Four Principles Case StudyPart 1 Chart (60 points)B.docxApplying the Four Principles Case StudyPart 1 Chart (60 points)B.docx
Applying the Four Principles Case StudyPart 1 Chart (60 points)B.docx
RAHUL126667
 
APPLYING ANALYTIC TECHNIQUES TO BUSINESS1APPLYING ANALYTIC T.docx
APPLYING ANALYTIC TECHNIQUES TO BUSINESS1APPLYING ANALYTIC T.docxAPPLYING ANALYTIC TECHNIQUES TO BUSINESS1APPLYING ANALYTIC T.docx
APPLYING ANALYTIC TECHNIQUES TO BUSINESS1APPLYING ANALYTIC T.docx
RAHUL126667
 
Apply the general overview of court structure in the United States (.docx
Apply the general overview of court structure in the United States (.docxApply the general overview of court structure in the United States (.docx
Apply the general overview of court structure in the United States (.docx
RAHUL126667
 
Apply the Paramedic Method to the following five selections.docx
Apply the Paramedic Method to the following five selections.docxApply the Paramedic Method to the following five selections.docx
Apply the Paramedic Method to the following five selections.docx
RAHUL126667
 
Application of Standards of CareDiscuss the standard(s) of c.docx
Application of Standards of CareDiscuss the standard(s) of c.docxApplication of Standards of CareDiscuss the standard(s) of c.docx
Application of Standards of CareDiscuss the standard(s) of c.docx
RAHUL126667
 
Application of the Nursing Process to Deliver Culturally Compe.docx
Application of the Nursing Process to Deliver Culturally Compe.docxApplication of the Nursing Process to Deliver Culturally Compe.docx
Application of the Nursing Process to Deliver Culturally Compe.docx
RAHUL126667
 
Application Ware House-Application DesignAppointyAppoi.docx
Application Ware House-Application DesignAppointyAppoi.docxApplication Ware House-Application DesignAppointyAppoi.docx
Application Ware House-Application DesignAppointyAppoi.docx
RAHUL126667
 
Applied Psycholinguistics 31 (2010), 413–438doi10.1017S014.docx
Applied Psycholinguistics 31 (2010), 413–438doi10.1017S014.docxApplied Psycholinguistics 31 (2010), 413–438doi10.1017S014.docx
Applied Psycholinguistics 31 (2010), 413–438doi10.1017S014.docx
RAHUL126667
 
Application of the Belmont PrinciplesFirst, identify your .docx
Application of the Belmont PrinciplesFirst, identify your .docxApplication of the Belmont PrinciplesFirst, identify your .docx
Application of the Belmont PrinciplesFirst, identify your .docx
RAHUL126667
 
APPLE is only one of the multiple companies that have approved and d.docx
APPLE is only one of the multiple companies that have approved and d.docxAPPLE is only one of the multiple companies that have approved and d.docx
APPLE is only one of the multiple companies that have approved and d.docx
RAHUL126667
 
Appliance Warehouse Service Plan.The discussion focuses on the.docx
Appliance Warehouse Service Plan.The discussion focuses on the.docxAppliance Warehouse Service Plan.The discussion focuses on the.docx
Appliance Warehouse Service Plan.The discussion focuses on the.docx
RAHUL126667
 
Applicants must submit a 500 essay describing how current or future .docx
Applicants must submit a 500 essay describing how current or future .docxApplicants must submit a 500 essay describing how current or future .docx
Applicants must submit a 500 essay describing how current or future .docx
RAHUL126667
 
Apple Inc., Microsoft Corp., Berkshire Hathaway, and Facebook ha.docx
Apple Inc., Microsoft Corp., Berkshire Hathaway, and Facebook ha.docxApple Inc., Microsoft Corp., Berkshire Hathaway, and Facebook ha.docx
Apple Inc., Microsoft Corp., Berkshire Hathaway, and Facebook ha.docx
RAHUL126667
 
Appcelerator Titanium was released in December 2008, and has been st.docx
Appcelerator Titanium was released in December 2008, and has been st.docxAppcelerator Titanium was released in December 2008, and has been st.docx
Appcelerator Titanium was released in December 2008, and has been st.docx
RAHUL126667
 
APA Style300 words per topic2 peer reviewed resources per to.docx
APA Style300 words per topic2 peer reviewed resources per to.docxAPA Style300 words per topic2 peer reviewed resources per to.docx
APA Style300 words per topic2 peer reviewed resources per to.docx
RAHUL126667
 
Ape and Human Cognition What’s theDifferenceMichael To.docx
Ape and Human Cognition What’s theDifferenceMichael To.docxApe and Human Cognition What’s theDifferenceMichael To.docx
Ape and Human Cognition What’s theDifferenceMichael To.docx
RAHUL126667
 
Apply what you have learned about Health Promotion and Disease P.docx
Apply what you have learned about Health Promotion and Disease P.docxApply what you have learned about Health Promotion and Disease P.docx
Apply what you have learned about Health Promotion and Disease P.docx
RAHUL126667
 
APA formatCite there peer-reviewed, scholarly references300 .docx
APA formatCite there peer-reviewed, scholarly references300 .docxAPA formatCite there peer-reviewed, scholarly references300 .docx
APA formatCite there peer-reviewed, scholarly references300 .docx
RAHUL126667
 
APA formatCite 2 peer-reviewed reference175-265 word count.docx
APA formatCite 2 peer-reviewed reference175-265 word count.docxAPA formatCite 2 peer-reviewed reference175-265 word count.docx
APA formatCite 2 peer-reviewed reference175-265 word count.docx
RAHUL126667
 
APA formatCite at least 1 referenceWrite a 175- to 265-w.docx
APA formatCite at least 1 referenceWrite a 175- to 265-w.docxAPA formatCite at least 1 referenceWrite a 175- to 265-w.docx
APA formatCite at least 1 referenceWrite a 175- to 265-w.docx
RAHUL126667
 

More from RAHUL126667 (20)

Applying the Four Principles Case StudyPart 1 Chart (60 points)B.docx
Applying the Four Principles Case StudyPart 1 Chart (60 points)B.docxApplying the Four Principles Case StudyPart 1 Chart (60 points)B.docx
Applying the Four Principles Case StudyPart 1 Chart (60 points)B.docx
 
APPLYING ANALYTIC TECHNIQUES TO BUSINESS1APPLYING ANALYTIC T.docx
APPLYING ANALYTIC TECHNIQUES TO BUSINESS1APPLYING ANALYTIC T.docxAPPLYING ANALYTIC TECHNIQUES TO BUSINESS1APPLYING ANALYTIC T.docx
APPLYING ANALYTIC TECHNIQUES TO BUSINESS1APPLYING ANALYTIC T.docx
 
Apply the general overview of court structure in the United States (.docx
Apply the general overview of court structure in the United States (.docxApply the general overview of court structure in the United States (.docx
Apply the general overview of court structure in the United States (.docx
 
Apply the Paramedic Method to the following five selections.docx
Apply the Paramedic Method to the following five selections.docxApply the Paramedic Method to the following five selections.docx
Apply the Paramedic Method to the following five selections.docx
 
Application of Standards of CareDiscuss the standard(s) of c.docx
Application of Standards of CareDiscuss the standard(s) of c.docxApplication of Standards of CareDiscuss the standard(s) of c.docx
Application of Standards of CareDiscuss the standard(s) of c.docx
 
Application of the Nursing Process to Deliver Culturally Compe.docx
Application of the Nursing Process to Deliver Culturally Compe.docxApplication of the Nursing Process to Deliver Culturally Compe.docx
Application of the Nursing Process to Deliver Culturally Compe.docx
 
Application Ware House-Application DesignAppointyAppoi.docx
Application Ware House-Application DesignAppointyAppoi.docxApplication Ware House-Application DesignAppointyAppoi.docx
Application Ware House-Application DesignAppointyAppoi.docx
 
Applied Psycholinguistics 31 (2010), 413–438doi10.1017S014.docx
Applied Psycholinguistics 31 (2010), 413–438doi10.1017S014.docxApplied Psycholinguistics 31 (2010), 413–438doi10.1017S014.docx
Applied Psycholinguistics 31 (2010), 413–438doi10.1017S014.docx
 
Application of the Belmont PrinciplesFirst, identify your .docx
Application of the Belmont PrinciplesFirst, identify your .docxApplication of the Belmont PrinciplesFirst, identify your .docx
Application of the Belmont PrinciplesFirst, identify your .docx
 
APPLE is only one of the multiple companies that have approved and d.docx
APPLE is only one of the multiple companies that have approved and d.docxAPPLE is only one of the multiple companies that have approved and d.docx
APPLE is only one of the multiple companies that have approved and d.docx
 
Appliance Warehouse Service Plan.The discussion focuses on the.docx
Appliance Warehouse Service Plan.The discussion focuses on the.docxAppliance Warehouse Service Plan.The discussion focuses on the.docx
Appliance Warehouse Service Plan.The discussion focuses on the.docx
 
Applicants must submit a 500 essay describing how current or future .docx
Applicants must submit a 500 essay describing how current or future .docxApplicants must submit a 500 essay describing how current or future .docx
Applicants must submit a 500 essay describing how current or future .docx
 
Apple Inc., Microsoft Corp., Berkshire Hathaway, and Facebook ha.docx
Apple Inc., Microsoft Corp., Berkshire Hathaway, and Facebook ha.docxApple Inc., Microsoft Corp., Berkshire Hathaway, and Facebook ha.docx
Apple Inc., Microsoft Corp., Berkshire Hathaway, and Facebook ha.docx
 
Appcelerator Titanium was released in December 2008, and has been st.docx
Appcelerator Titanium was released in December 2008, and has been st.docxAppcelerator Titanium was released in December 2008, and has been st.docx
Appcelerator Titanium was released in December 2008, and has been st.docx
 
APA Style300 words per topic2 peer reviewed resources per to.docx
APA Style300 words per topic2 peer reviewed resources per to.docxAPA Style300 words per topic2 peer reviewed resources per to.docx
APA Style300 words per topic2 peer reviewed resources per to.docx
 
Ape and Human Cognition What’s theDifferenceMichael To.docx
Ape and Human Cognition What’s theDifferenceMichael To.docxApe and Human Cognition What’s theDifferenceMichael To.docx
Ape and Human Cognition What’s theDifferenceMichael To.docx
 
Apply what you have learned about Health Promotion and Disease P.docx
Apply what you have learned about Health Promotion and Disease P.docxApply what you have learned about Health Promotion and Disease P.docx
Apply what you have learned about Health Promotion and Disease P.docx
 
APA formatCite there peer-reviewed, scholarly references300 .docx
APA formatCite there peer-reviewed, scholarly references300 .docxAPA formatCite there peer-reviewed, scholarly references300 .docx
APA formatCite there peer-reviewed, scholarly references300 .docx
 
APA formatCite 2 peer-reviewed reference175-265 word count.docx
APA formatCite 2 peer-reviewed reference175-265 word count.docxAPA formatCite 2 peer-reviewed reference175-265 word count.docx
APA formatCite 2 peer-reviewed reference175-265 word count.docx
 
APA formatCite at least 1 referenceWrite a 175- to 265-w.docx
APA formatCite at least 1 referenceWrite a 175- to 265-w.docxAPA formatCite at least 1 referenceWrite a 175- to 265-w.docx
APA formatCite at least 1 referenceWrite a 175- to 265-w.docx
 

Recently uploaded

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 

Recently uploaded (20)

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 

Cain and AbelOphcrackStart H.docx

  • 1. Cain and Abel Ophcrack Start Here CYB610 Project 1(Transript) You are a systems administrator in the IT department of a major metropolitan hospital. Your duties are to ensure the confidentiality, availability, and integrity of patient records, as well as the other files and databases used throughout the hospital. Your work affects several departments, including Human Resources, Finance, Billing, Accounting, and Scheduling. You also apply security controls on passwords for user accounts. Just before clocking out for the day, you notice something strange in the hospital's computer system. Some person, or group, has accessed user accounts and conducted unauthorized activities. Recently, the hospital experienced intrusion into one
  • 2. of its patient's billing accounts. After validating user profiles in Active Directory and matching them with user credentials, you suspect several user's passwords have been compromised to gain access to the hospital's computer network. You schedule an emergency meeting with the director of IT and the hospital board. In light of this security breach, they ask you to examine the security posture of the hospital's information systems infrastructure and implement defense techniques. This must be done quickly, your director says. The hospital board is less knowledgeable about information system security. The board makes it clear that it has a limited cybersecurity budget. However, if you can make a strong case to the board, it is likely that they will increase your budget and implement your recommended tool companywide. You will share your findings on the hospital's security posture. Your findings will be brought to the director of IT in a technical report. You will also provide a nontechnical assessment of the overall identity management system of the hospital and define practices to restrict and permit access to information. You will share this assessment with the hospital board in the form of a narrated slide show presentation. You know that identity management will increase the security of the overall information system's infrastructure for the hospital. You also know that, with a good identity management system, the security and productivity benefits will outweigh costs incurred. This is the argument you must make to those stakeholders. Daily life requires us to have access to a lot of information, and information systems help us access that information. Desktop computers, laptops, and mobile devices keep us connected to the information we need through processes that work via hardware
  • 3. and software components. Information systems infrastructure makes this possible. However, our easy access to communication and information also creates security and privacy risks. Laws, regulations, policies, and guidelines exist to protect information and information owners. Cybersecurity ensures the confidentiality, integrity, and availability of the information. Identity management is a fundamental practice. Part of identity management is the governance of access, authorization, and authentication of users to information systems, Identity management is one part of a layered security defense strategy within the information systems infrastructure. Your work in this project will enable you to produce a technical report and nontechnical presentation that addresses these requirements. There are six steps that will lead you through this project to create your final deliverables. You should complete Project 1 during Week 1. After beginning with the workplace scenario, continue to Step 1: "Defining the Information System Infrastructure," which builds upon the problem presented in the scenario. When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission. · 1.1: Organize document or presentation in a manner that promotes understanding and meets the requirements of the assignment. · 2.3: Evaluate the information in logical manner to determine value and relevance. · 5.4: Identify potential threats to operating systems and the security features necessary to guard against them. · 6.2: Create a roadmap for organizations to use in development of an IMA program (to address gaps in their current offerings). Step 1: Defining the Information System Infrastructure The director of IT and the members of the board would like an as-is definition of the information system infrastructure of a healthcare organization. You will begin your report with this
  • 4. background description. You will provide the following information in your review of the current information systems infrastructure: 1. Choose and research a healthcare organization, noting its organization and structure. Define the healthcare organization's structure and identify the different business units and their functions. You may use a variety of methods to provide this information, such as an organizational chart. 2. Choose one or more mission critical systems of the healthcare organization. Define the information needs, as they relate to the organization's mission critical Protected Health Information (PHI). This information is stored in database medical records for doctors, nurses, and insurance claims billing systems, which are used to fulfill the organizational information needs. 3. Define the workflows and processes for the high-level information systems. Your definition should include a high- level description of information systems hardware and software components and their interactions. Take time to read the following resources. They will help you construct your definition. · Information systems hardware · Information systems software You may supply this information as a diagram with inputs, outputs, and technologies identified. Consider how you might restrict access and protect billing and PHI information. 4. The links shown below provide access to essential information you’ll need to complete this part of the hospital’s information system infrastructure definition. Click each link, review its resources, and refer to them as you compose this part of the definition. · Open Systems Interconnections (OSI) Model · TCP/IP protocols · network protocols Step 2: Threats Now that you have defined the hospital's information system infrastructure, you will cover the web security and threats the
  • 5. system faces and introduce identity management as a solution. To complete this section of the report, you’ll brush up on your knowledge of threats by reading the following resources: web security issues, insider threats, intrusion motives/hacker psychology, and CIA triad. Take what you learned from these resources to convey the threats to the hospital's information systems infrastructure. Include a brief summary of insider threats, intrusion motives, and hacker psychology in your report as it relates to your hospital data processing systems. Relate these threats to the vulnerabilities in the CIA triad. This section of your report will also include a description of the purpose and components of an identity management system to include authentication, authorization, and access control. Include a discussion of possible use of laptop devices by doctors who visit their patients at the hospital, and need access to hospital PHI data. Review the content of the following resources. As you’re reading, take any notes you think will help you develop your description. 1. Authorization 2. Access control 3. Passwords 4. Multi-factor authentication Next, expand upon your description. Define the types of access control management to include access control lists in operating systems, role-based access controls, files, and database access controls. Define types of authorization and authentication and the use of passwords, password management, and password protection in an identity management system. Describe common factor authentication mechanisms to include multi-factor authentication. Step 3: Password Cracking Tools Note: You will utilize the tools in Workspace for this step. If you need help outside the classroom to complete this project, you must register for CLAB 699 Cyber Computing Lab Assistance (go to the Discussions List for registration information). Primary lab assistance is available from a team of lab assistants. Lab assistants are professionals and trained to
  • 6. help you. Click here to access the Project 1 Workspace Exercise Instructions. Explore the tutorials and user guides to learn more about the tools you will use. You have successfully examined the threats to a healthcare organization's information systems infrastructure. Now, you must begin your research into password cracking software. Start by experimenting with the password cracking tools available to you in the lab. Enter Workspace and complete the lab activities related to authentication and password recovery/cracking. Do some quick independent research on password cracking as it applies to your organization. Step 4: Comparing Software Note: You will utilize the tools in Workspace for this step. You have successfully tested more than one password cracking tool. Compare them. Not all password cracking tools will necessarily perform with the same speed, precision, and results, making it important to test a few different products. The comparison will be part of your assessment and help you make recommendations on the use of such tools. You will test the organization's systems for password strength and complexity and complete validation testing. You will compare the results obtained from your first and second tool. 1. Read this article about cyberattacks, perform two different types of cyberattacks in the first, and in the second tool, crack user account passwords. Describe them in simple nontechnical terms for the leadership. You can identify which tool is the most effective and why for your organization's IT environment 2. Compare and contrast the results from the two methods used to crack the accounts for the three passwords (each encrypted by the two hash algorithms). Show their benefits. You can make certain conclusions that help your company's cybersecurity posture after using these methods. 3. Explain to the director of IT and the members of the board that the healthcare organization’s anti-virus software will detect password cracking tools as malware. Also explain how this
  • 7. impacts the effectiveness of testing security controls like password strength. Help the leadership understand the risks and benefits of using password cracking tools, through persuasive arguments in your report and presentation. If any of the tools take longer than 4-5 minutes to guess a password, record the estimated length of time the tool anticipates to guess it. Include this information in your presentation. Step 5: The Non-Technical Presentation You now have the information you need to prepare your product for stakeholders. Based on the research and work you've completed in Workspace, you will develop two items: a technical report for the director of IT, and a nontechnical slide show presentation for the members of the board. You will tailor the language of your reports appropriately to the different audiences. The nontechnical presentation: Your upper-level management team consists of technical and nontechnical leadership, and they are interested in the bottom line. You must help these leaders understand the identity management system vulnerabilities you discovered in password cracking and access control. They need to clearly see what actions they must either take or approve. The following are a few questions to consider when creating your presentation: 1. How do you present your technical findings succinctly to a nontechnical audience? Your technical report for IT will span many pages; but you will probably be afforded no more than 30 minutes or 8-10 slides for your presentation and the following discussion with leadership. 2. How do you describe the most serious risks factually but without sounding too temperamental? No one likes to hear that their entire network has been hacked, data has been stolen, and the attackers have won. You will need to describe the seriousness of your findings while also assuring upper-level management that these are not uncommon occurrences today. 3. How do your results affect business operations? Make sure you are presenting these very technical password cracking
  • 8. results in business terms upper-level management will understand. 4. What do you propose? Management will not only want to understand what you have discovered; they will want to know what you propose as a solution. Step 6: The Technical Report and Executive Summary The technical report and the nontechnical presentation will identify compromises and vulnerabilities in the information systems infrastructure of the healthcare organization, and identify risks to the organization's data. You will propose a way to prioritize these risks and include possible remediation actions. The technical report: Provide recommendations for access control and authentication mechanisms to increase the security within the identity management system. After you have defined the roles within the organization, recommend the accesses, restrictions, and conditions for each role. Present these in a tabular format, as part of your list of recommendations. Provide a comparison of risk scenarios to include the following: 1. What will happen if the CIO and the leadership do nothing, and decide to accept the risks? 2. Are there possible ways the CIO can transfer the risks? 3. Are there possible ways to mitigate the risks? 4. Are there possible ways to eliminate the risks? 5. What are the projected costs to address these risks? Provide an overall recommendation, with technical details to the director of IT. The executive summary: In addition to your technical report, also create a nontechnical report as an executive summary. The deliverables for this project are as follows: 1. Nontechnical presentation: This is a 8-10 slide PowerPoint presentation for business executives and board members. 2. Technical report: Your report should be a 6-7 page double- spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables or citations. 3. Executive summary: This should be a 2-3 page double-spaced
  • 9. Word document. A good practice would be to use each competency as a self- check to confirm you have incorporated all of them in your work. · 1.1: Organize document or presentation in a manner that promotes understanding and meets the requirements of the assignment. · 2.3: Evaluate the information in logical manner to determine value and relevance. · 5.4: Identify potential threats to operating systems and the security features necessary to guard against them. · 6.2: Create a roadmap for organizations to use in development of an IMA program (to address gaps in their current offerings).