SlideShare a Scribd company logo
First half page executive summary about company 150 words
· You are an Information Technology (IT) intern
· Health Network Inc.
· Headquartered in Minneapolis, Minnesota
· Two other locations
· Portland Oregon
· Arlington Virginia
· Over 600 employees
· $500 million USD annual revenue
· Each location is near a data center
· Managed by a third party vendor
· Production centers located at the data centers
·
Second half page about product of our company 100 words (
change word, give different example in 3 products don’t use
similar sentence.
Health network’s Three products
· HNetExchange
· Handles secure electronic medical messages between
· Large customers such as hospitals and
· Small customers such as clinics
· HNetPay
· Web Portal to support secure payments
· Accepts various payment methods
· HNetConnect
· Allows customers to find Doctors
· Contains profiles of doctors, clinics and patients
Second Page risk management plan about 300 words, Current
risk management plan outdated, Your assignment is to create a
new one, Additional threats may be found during re-evaluation,
No budget has been set on the project, google and find recent
threat weakness and vulnerabilities.
Don’t use below fine new risk and how you can plan new risk
assessment .
· Loss of company data due to hardware being removed from
production systems
· Loss of company information on lost or stolen company-
owned assets, such as mobile devices and laptops
· Loss of customers due to production outages caused by various
events, such as natural disasters, change management, unstable
software, and so on
· Internet threats due to company products being accessible on
the Internet
· Insider threats
· Changes in regulatory landscape that may impact operations
Compliance Laws and Regulations
<List the laws and regulations that affect this industry.>
150 words for above law
Third task is table
In column change below example and use it in below table with
domain name and add risk factors
Risks, Threats, and Vulnerabilities
Unauthorized access from public Internet
Hacker penetrates IT infrastructure
Communication circuit outages
Workstations
Workstation operating system (OS) has a known software
vulnerability
Denial of service attack on organization’s e-mail
Remote communications from home office
Workstation browser has software vulnerability
Weak ingress/egress traffic-filtering degrades performance
Wireless Local Area Network (WLAN) access points are
needed for Local Area Network (LAN) connectivity within a
warehouse
Need to prevent rogue users from unauthorized WLAN access
User destroys data in application, deletes all files, and gains
access to internal network
Fire destroys primary data center
Intraoffice employee romance gone bad
Loss of production data server
Unauthorized access to organization-owned workstations
LAN server OS has a known software vulnerability
User downloads an unknown e-mail attachment
Service provider has a major network outage
User inserts CDs and USB hard drives with personal photos,
music, and videos on organizationowned computers
Virtual Private Network (VPN) tunneling between the remote
computer and ingress/egress router
R-T-W
Domain Impacted
Risk Impact / Factor
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Risk:
Threat:
Weakness:
Table 1

More Related Content

Similar to First half page executive summary about company 150 words · You .docx

Chapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxChapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docx
keturahhazelhurst
 
Chapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxChapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docx
walterl4
 
internet intranet and extranet
internet intranet and extranetinternet intranet and extranet
internet intranet and extranet
FLYMAN TECHNOLOGY LIMITED
 
MISO L007 managing system security
MISO L007 managing system securityMISO L007 managing system security
MISO L007 managing system security
Jan Wong
 
Submission Requirementsproject submissions should follow th.docx
Submission Requirementsproject submissions should follow th.docxSubmission Requirementsproject submissions should follow th.docx
Submission Requirementsproject submissions should follow th.docx
david4611
 
Problem Statement The subject is a cybersecurity solution fo.pdf
Problem Statement The subject is a cybersecurity solution fo.pdfProblem Statement The subject is a cybersecurity solution fo.pdf
Problem Statement The subject is a cybersecurity solution fo.pdf
SUNIL64154
 
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docxRunning head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
todd521
 
Managing System Security
Managing System SecurityManaging System Security
Managing System Security
PIREH
 
Electronic health records
Electronic health recordsElectronic health records
Electronic health records
Anurag Deb
 
Services and Products
Services and ProductsServices and Products
Services and Products
Technecessities
 
Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet  Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet
AyushJadon5
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
Anil Bilgihan
 
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docxExcel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
gitagrimston
 
Business Intelligence and Data Security for Long-Term Care Financial Professi...
Business Intelligence and Data Security for Long-Term Care Financial Professi...Business Intelligence and Data Security for Long-Term Care Financial Professi...
Business Intelligence and Data Security for Long-Term Care Financial Professi...
Gross, Mendelsohn & Associates
 
NH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 KamensNH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 Kamens
kamensm02
 
Audit Controls Paper
Audit Controls PaperAudit Controls Paper
Audit Controls Paper
Jennifer Lopez
 
CST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.comCST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.com
agathachristie265
 
CST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comCST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.com
chrysanthemu49
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data Leakage
Patty Buckley
 
Cst 610 Believe Possibilities / snaptutorial.com
Cst 610  Believe Possibilities / snaptutorial.comCst 610  Believe Possibilities / snaptutorial.com
Cst 610 Believe Possibilities / snaptutorial.com
Davis10a
 

Similar to First half page executive summary about company 150 words · You .docx (20)

Chapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxChapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docx
 
Chapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxChapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docx
 
internet intranet and extranet
internet intranet and extranetinternet intranet and extranet
internet intranet and extranet
 
MISO L007 managing system security
MISO L007 managing system securityMISO L007 managing system security
MISO L007 managing system security
 
Submission Requirementsproject submissions should follow th.docx
Submission Requirementsproject submissions should follow th.docxSubmission Requirementsproject submissions should follow th.docx
Submission Requirementsproject submissions should follow th.docx
 
Problem Statement The subject is a cybersecurity solution fo.pdf
Problem Statement The subject is a cybersecurity solution fo.pdfProblem Statement The subject is a cybersecurity solution fo.pdf
Problem Statement The subject is a cybersecurity solution fo.pdf
 
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docxRunning head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
Running head THREATS, ATTACKS AND VULNERABILITY ASSESSMENT .docx
 
Managing System Security
Managing System SecurityManaging System Security
Managing System Security
 
Electronic health records
Electronic health recordsElectronic health records
Electronic health records
 
Services and Products
Services and ProductsServices and Products
Services and Products
 
Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet  Introduction to internet, intranet and Extranet . Myths about internet
Introduction to internet, intranet and Extranet . Myths about internet
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docxExcel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
Excel Data Reporting Assignment 3 Data Analysis (Feasibility .docx
 
Business Intelligence and Data Security for Long-Term Care Financial Professi...
Business Intelligence and Data Security for Long-Term Care Financial Professi...Business Intelligence and Data Security for Long-Term Care Financial Professi...
Business Intelligence and Data Security for Long-Term Care Financial Professi...
 
NH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 KamensNH Bankers 10 08 07 Kamens
NH Bankers 10 08 07 Kamens
 
Audit Controls Paper
Audit Controls PaperAudit Controls Paper
Audit Controls Paper
 
CST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.comCST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.com
 
CST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comCST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.com
 
Causes And Consequences Of Data Leakage
Causes And Consequences Of Data LeakageCauses And Consequences Of Data Leakage
Causes And Consequences Of Data Leakage
 
Cst 610 Believe Possibilities / snaptutorial.com
Cst 610  Believe Possibilities / snaptutorial.comCst 610  Believe Possibilities / snaptutorial.com
Cst 610 Believe Possibilities / snaptutorial.com
 

More from clydes2

Floridas Construction defect statute, F.S. 558.001 and the balance .docx
Floridas Construction defect statute, F.S. 558.001 and the balance .docxFloridas Construction defect statute, F.S. 558.001 and the balance .docx
Floridas Construction defect statute, F.S. 558.001 and the balance .docx
clydes2
 
FLORIDA NATIONAL UNIVERSITYRN-BSN PROGRAMNURSING DEPARTMENTN.docx
FLORIDA NATIONAL UNIVERSITYRN-BSN PROGRAMNURSING DEPARTMENTN.docxFLORIDA NATIONAL UNIVERSITYRN-BSN PROGRAMNURSING DEPARTMENTN.docx
FLORIDA NATIONAL UNIVERSITYRN-BSN PROGRAMNURSING DEPARTMENTN.docx
clydes2
 
FLORIDA’S ENDANGERED AND THREATENED SPECIES Upda.docx
FLORIDA’S ENDANGERED AND THREATENED SPECIES Upda.docxFLORIDA’S ENDANGERED AND THREATENED SPECIES Upda.docx
FLORIDA’S ENDANGERED AND THREATENED SPECIES Upda.docx
clydes2
 
Florida National UniversityNursing DepartmentBSN Program.docx
Florida National UniversityNursing DepartmentBSN Program.docxFlorida National UniversityNursing DepartmentBSN Program.docx
Florida National UniversityNursing DepartmentBSN Program.docx
clydes2
 
Florida National UniversityBiomedical Ethics Assignment Week 2.docx
Florida National UniversityBiomedical Ethics Assignment Week 2.docxFlorida National UniversityBiomedical Ethics Assignment Week 2.docx
Florida National UniversityBiomedical Ethics Assignment Week 2.docx
clydes2
 
FLORIDA NATIONAL UNIVERSITYRN TO BSN PROGRAM,COMMUNITY HEALT.docx
FLORIDA NATIONAL UNIVERSITYRN TO BSN PROGRAM,COMMUNITY HEALT.docxFLORIDA NATIONAL UNIVERSITYRN TO BSN PROGRAM,COMMUNITY HEALT.docx
FLORIDA NATIONAL UNIVERSITYRN TO BSN PROGRAM,COMMUNITY HEALT.docx
clydes2
 
Flora DiamreyanLeading Health Promotion for Populations     .docx
Flora DiamreyanLeading Health Promotion for Populations     .docxFlora DiamreyanLeading Health Promotion for Populations     .docx
Flora DiamreyanLeading Health Promotion for Populations     .docx
clydes2
 
Flood StoriesThe Epic of Gilgamesh (Norton 54-109) and .docx
Flood StoriesThe Epic of Gilgamesh (Norton 54-109) and .docxFlood StoriesThe Epic of Gilgamesh (Norton 54-109) and .docx
Flood StoriesThe Epic of Gilgamesh (Norton 54-109) and .docx
clydes2
 
FLICKERING SNAPSHOTOF YAHOO S FUTUREMYSPACES BIC PLAN(.docx
FLICKERING SNAPSHOTOF YAHOO S FUTUREMYSPACES BIC PLAN(.docxFLICKERING SNAPSHOTOF YAHOO S FUTUREMYSPACES BIC PLAN(.docx
FLICKERING SNAPSHOTOF YAHOO S FUTUREMYSPACES BIC PLAN(.docx
clydes2
 
Florida Department of Corrections- Suggested Action or Change Outlin.docx
Florida Department of Corrections- Suggested Action or Change Outlin.docxFlorida Department of Corrections- Suggested Action or Change Outlin.docx
Florida Department of Corrections- Suggested Action or Change Outlin.docx
clydes2
 
Flora Smith and Harry Smith have one child. 10-year-old Mary Smith. .docx
Flora Smith and Harry Smith have one child. 10-year-old Mary Smith. .docxFlora Smith and Harry Smith have one child. 10-year-old Mary Smith. .docx
Flora Smith and Harry Smith have one child. 10-year-old Mary Smith. .docx
clydes2
 
Flexible Budgeting and Analysis of Overhead CostsChapt.docx
Flexible Budgeting and Analysis of Overhead CostsChapt.docxFlexible Budgeting and Analysis of Overhead CostsChapt.docx
Flexible Budgeting and Analysis of Overhead CostsChapt.docx
clydes2
 
Flashing Light BulbDeliverablescreate a single flashin.docx
Flashing Light BulbDeliverablescreate a single flashin.docxFlashing Light BulbDeliverablescreate a single flashin.docx
Flashing Light BulbDeliverablescreate a single flashin.docx
clydes2
 
Flag question Question 1 Question 1 1ptsWhat two colo.docx
Flag question Question 1 Question 1 1ptsWhat two colo.docxFlag question Question 1 Question 1 1ptsWhat two colo.docx
Flag question Question 1 Question 1 1ptsWhat two colo.docx
clydes2
 
Flag question Question 1 Question 1 1ptsIf the Sun .docx
Flag question Question 1 Question 1 1ptsIf the Sun .docxFlag question Question 1 Question 1 1ptsIf the Sun .docx
Flag question Question 1 Question 1 1ptsIf the Sun .docx
clydes2
 
fl ast.indd 115723AM 01172014 Page xxffi rs..docx
fl ast.indd 115723AM  01172014 Page xxffi rs..docxfl ast.indd 115723AM  01172014 Page xxffi rs..docx
fl ast.indd 115723AM 01172014 Page xxffi rs..docx
clydes2
 
FIVEWISHES®12345M Y W I S H F O R .docx
FIVEWISHES®12345M Y  W I S H  F O R .docxFIVEWISHES®12345M Y  W I S H  F O R .docx
FIVEWISHES®12345M Y W I S H F O R .docx
clydes2
 
Five-year-old Xian Lei enters kindergarten with little under.docx
Five-year-old Xian Lei enters kindergarten with little under.docxFive-year-old Xian Lei enters kindergarten with little under.docx
Five-year-old Xian Lei enters kindergarten with little under.docx
clydes2
 
FiveRivers Technologies  has been at the cutting edge of techn.docx
FiveRivers Technologies  has been at the cutting edge of techn.docxFiveRivers Technologies  has been at the cutting edge of techn.docx
FiveRivers Technologies  has been at the cutting edge of techn.docx
clydes2
 
Five Training DesignLearningObjectivesAfterreading.docx
Five Training DesignLearningObjectivesAfterreading.docxFive Training DesignLearningObjectivesAfterreading.docx
Five Training DesignLearningObjectivesAfterreading.docx
clydes2
 

More from clydes2 (20)

Floridas Construction defect statute, F.S. 558.001 and the balance .docx
Floridas Construction defect statute, F.S. 558.001 and the balance .docxFloridas Construction defect statute, F.S. 558.001 and the balance .docx
Floridas Construction defect statute, F.S. 558.001 and the balance .docx
 
FLORIDA NATIONAL UNIVERSITYRN-BSN PROGRAMNURSING DEPARTMENTN.docx
FLORIDA NATIONAL UNIVERSITYRN-BSN PROGRAMNURSING DEPARTMENTN.docxFLORIDA NATIONAL UNIVERSITYRN-BSN PROGRAMNURSING DEPARTMENTN.docx
FLORIDA NATIONAL UNIVERSITYRN-BSN PROGRAMNURSING DEPARTMENTN.docx
 
FLORIDA’S ENDANGERED AND THREATENED SPECIES Upda.docx
FLORIDA’S ENDANGERED AND THREATENED SPECIES Upda.docxFLORIDA’S ENDANGERED AND THREATENED SPECIES Upda.docx
FLORIDA’S ENDANGERED AND THREATENED SPECIES Upda.docx
 
Florida National UniversityNursing DepartmentBSN Program.docx
Florida National UniversityNursing DepartmentBSN Program.docxFlorida National UniversityNursing DepartmentBSN Program.docx
Florida National UniversityNursing DepartmentBSN Program.docx
 
Florida National UniversityBiomedical Ethics Assignment Week 2.docx
Florida National UniversityBiomedical Ethics Assignment Week 2.docxFlorida National UniversityBiomedical Ethics Assignment Week 2.docx
Florida National UniversityBiomedical Ethics Assignment Week 2.docx
 
FLORIDA NATIONAL UNIVERSITYRN TO BSN PROGRAM,COMMUNITY HEALT.docx
FLORIDA NATIONAL UNIVERSITYRN TO BSN PROGRAM,COMMUNITY HEALT.docxFLORIDA NATIONAL UNIVERSITYRN TO BSN PROGRAM,COMMUNITY HEALT.docx
FLORIDA NATIONAL UNIVERSITYRN TO BSN PROGRAM,COMMUNITY HEALT.docx
 
Flora DiamreyanLeading Health Promotion for Populations     .docx
Flora DiamreyanLeading Health Promotion for Populations     .docxFlora DiamreyanLeading Health Promotion for Populations     .docx
Flora DiamreyanLeading Health Promotion for Populations     .docx
 
Flood StoriesThe Epic of Gilgamesh (Norton 54-109) and .docx
Flood StoriesThe Epic of Gilgamesh (Norton 54-109) and .docxFlood StoriesThe Epic of Gilgamesh (Norton 54-109) and .docx
Flood StoriesThe Epic of Gilgamesh (Norton 54-109) and .docx
 
FLICKERING SNAPSHOTOF YAHOO S FUTUREMYSPACES BIC PLAN(.docx
FLICKERING SNAPSHOTOF YAHOO S FUTUREMYSPACES BIC PLAN(.docxFLICKERING SNAPSHOTOF YAHOO S FUTUREMYSPACES BIC PLAN(.docx
FLICKERING SNAPSHOTOF YAHOO S FUTUREMYSPACES BIC PLAN(.docx
 
Florida Department of Corrections- Suggested Action or Change Outlin.docx
Florida Department of Corrections- Suggested Action or Change Outlin.docxFlorida Department of Corrections- Suggested Action or Change Outlin.docx
Florida Department of Corrections- Suggested Action or Change Outlin.docx
 
Flora Smith and Harry Smith have one child. 10-year-old Mary Smith. .docx
Flora Smith and Harry Smith have one child. 10-year-old Mary Smith. .docxFlora Smith and Harry Smith have one child. 10-year-old Mary Smith. .docx
Flora Smith and Harry Smith have one child. 10-year-old Mary Smith. .docx
 
Flexible Budgeting and Analysis of Overhead CostsChapt.docx
Flexible Budgeting and Analysis of Overhead CostsChapt.docxFlexible Budgeting and Analysis of Overhead CostsChapt.docx
Flexible Budgeting and Analysis of Overhead CostsChapt.docx
 
Flashing Light BulbDeliverablescreate a single flashin.docx
Flashing Light BulbDeliverablescreate a single flashin.docxFlashing Light BulbDeliverablescreate a single flashin.docx
Flashing Light BulbDeliverablescreate a single flashin.docx
 
Flag question Question 1 Question 1 1ptsWhat two colo.docx
Flag question Question 1 Question 1 1ptsWhat two colo.docxFlag question Question 1 Question 1 1ptsWhat two colo.docx
Flag question Question 1 Question 1 1ptsWhat two colo.docx
 
Flag question Question 1 Question 1 1ptsIf the Sun .docx
Flag question Question 1 Question 1 1ptsIf the Sun .docxFlag question Question 1 Question 1 1ptsIf the Sun .docx
Flag question Question 1 Question 1 1ptsIf the Sun .docx
 
fl ast.indd 115723AM 01172014 Page xxffi rs..docx
fl ast.indd 115723AM  01172014 Page xxffi rs..docxfl ast.indd 115723AM  01172014 Page xxffi rs..docx
fl ast.indd 115723AM 01172014 Page xxffi rs..docx
 
FIVEWISHES®12345M Y W I S H F O R .docx
FIVEWISHES®12345M Y  W I S H  F O R .docxFIVEWISHES®12345M Y  W I S H  F O R .docx
FIVEWISHES®12345M Y W I S H F O R .docx
 
Five-year-old Xian Lei enters kindergarten with little under.docx
Five-year-old Xian Lei enters kindergarten with little under.docxFive-year-old Xian Lei enters kindergarten with little under.docx
Five-year-old Xian Lei enters kindergarten with little under.docx
 
FiveRivers Technologies  has been at the cutting edge of techn.docx
FiveRivers Technologies  has been at the cutting edge of techn.docxFiveRivers Technologies  has been at the cutting edge of techn.docx
FiveRivers Technologies  has been at the cutting edge of techn.docx
 
Five Training DesignLearningObjectivesAfterreading.docx
Five Training DesignLearningObjectivesAfterreading.docxFive Training DesignLearningObjectivesAfterreading.docx
Five Training DesignLearningObjectivesAfterreading.docx
 

Recently uploaded

B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
BoudhayanBhattachari
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
ssuser13ffe4
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
Nguyen Thanh Tu Collection
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
melliereed
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDFLifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Vivekanand Anglo Vedic Academy
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 

Recently uploaded (20)

B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
 
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
BÀI TẬP DẠY THÊM TIẾNG ANH LỚP 7 CẢ NĂM FRIENDS PLUS SÁCH CHÂN TRỜI SÁNG TẠO ...
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
Nutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour TrainingNutrition Inc FY 2024, 4 - Hour Training
Nutrition Inc FY 2024, 4 - Hour Training
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDFLifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 

First half page executive summary about company 150 words · You .docx

  • 1. First half page executive summary about company 150 words · You are an Information Technology (IT) intern · Health Network Inc. · Headquartered in Minneapolis, Minnesota · Two other locations · Portland Oregon · Arlington Virginia · Over 600 employees · $500 million USD annual revenue · Each location is near a data center · Managed by a third party vendor · Production centers located at the data centers · Second half page about product of our company 100 words ( change word, give different example in 3 products don’t use similar sentence. Health network’s Three products · HNetExchange · Handles secure electronic medical messages between · Large customers such as hospitals and · Small customers such as clinics · HNetPay · Web Portal to support secure payments · Accepts various payment methods · HNetConnect · Allows customers to find Doctors · Contains profiles of doctors, clinics and patients Second Page risk management plan about 300 words, Current risk management plan outdated, Your assignment is to create a new one, Additional threats may be found during re-evaluation, No budget has been set on the project, google and find recent threat weakness and vulnerabilities. Don’t use below fine new risk and how you can plan new risk assessment .
  • 2. · Loss of company data due to hardware being removed from production systems · Loss of company information on lost or stolen company- owned assets, such as mobile devices and laptops · Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and so on · Internet threats due to company products being accessible on the Internet · Insider threats · Changes in regulatory landscape that may impact operations Compliance Laws and Regulations <List the laws and regulations that affect this industry.> 150 words for above law Third task is table In column change below example and use it in below table with domain name and add risk factors Risks, Threats, and Vulnerabilities Unauthorized access from public Internet Hacker penetrates IT infrastructure Communication circuit outages Workstations Workstation operating system (OS) has a known software vulnerability Denial of service attack on organization’s e-mail Remote communications from home office Workstation browser has software vulnerability Weak ingress/egress traffic-filtering degrades performance Wireless Local Area Network (WLAN) access points are needed for Local Area Network (LAN) connectivity within a warehouse Need to prevent rogue users from unauthorized WLAN access User destroys data in application, deletes all files, and gains access to internal network Fire destroys primary data center Intraoffice employee romance gone bad
  • 3. Loss of production data server Unauthorized access to organization-owned workstations LAN server OS has a known software vulnerability User downloads an unknown e-mail attachment Service provider has a major network outage User inserts CDs and USB hard drives with personal photos, music, and videos on organizationowned computers Virtual Private Network (VPN) tunneling between the remote computer and ingress/egress router R-T-W Domain Impacted Risk Impact / Factor Risk: Threat: Weakness: Risk: Threat: Weakness: Risk: Threat: Weakness: Risk: Threat: Weakness: Risk: Threat: Weakness: