SlideShare a Scribd company logo
1 of 4
Part 1
In a 2 page paper, deliver an analysis of the threats,
consequences and likelihoods you must consider to assess risks
in your network, to your asset and/or links. Be concise, yet
comprehensive.
The following elements should be included in your paper:
Consider and describe the threats that might impact each node
or type of node.
Links may be critical too, but absorb these in considering
threats to your nodes. For example, if a road links 2 power
production facilities, and its impassibility in the winter means
employees do not make it to work, you should simply cast this
threat in terms of how it impacts the node. In other words, there
is a threat of employees not reporting to work because of the
remoteness of facility and routinely impassable roads.
Every node should have multiple potential threats, and these
should be realistic and fully described.
Do not choose obscure or extremely unlikely threats, or you will
find that infinite possibilities exist.
You must use professional and governmental sources to help
identify realistic threats.
Consider and list the potential consequences each of these
threats might produce.
Part 2
Write a 1 page paper on how you would allocate a year’s budget
to the assets in your network. Include at least three assets,
determine a budget that is realistic for your network, and be
specific about how much of it you would allocate to each asset
and how it would be used. Also explain what strategy or
methodology you used for determining your allocation.
this will help
Part 1
With the technological advancement, the healthcare center is
now using electronic medical records (EMR) to store the
patient's record. This approach has helped to save the time
wasted working on manual file to track information. This allows
the nurses and health staff to share information easily and
facilitate the treatment of the patients , and this makes the
network a cascading network . When some images are taking
from the patient by radiologist they are transferred by picture
archiving and communication systems (PACS) to display, they
are used to store the images as well as transfer them. Some
health center has adopted the use of software that facilitates the
access of patients from remote areas. However, despite the
positive impact of the EMR, they have not been fully adopted in
the health care and physician ( Boonstra & Broekhuis , 2010 )
The system is sophisticated that it allows the clinician to access
the information right from their tablets by accessing the CPOE.
This technology enables them to share information with the
department and is given instruction on how to tackle the issue
they re dealing with.
More so, the physician can access the information from
anywhere and store them for further analysis not necessarily at
the health center but anywhere even at home. Although the
network is easy to use, it can only be used by the medical staff,
the IT department, on the other hand, is responsible for the
implementation as well as providing security need to the EMR
in the network.
When the information is accessed from the CPOES and EMR the
operation becomes easier to handle. Under the supervision of
the engineers who help to troubleshoot the technical issues as
well as monitor the performance of the network.
Part 2
Among the possible vulnerabilities that can be associated with
the issue revolving around the collapse of the bridge are the
following: environmental condition, the intervention of the
terrorist attack or even the bridge had not constructed properly.
Although many suspicions have been brought up trying to find
out the core reason why the bridge collapsed, it has been highly
connected with terrorism whose aim was to cause death and
injure people. The attack caused some people to die, some cars
that were driving on the bridge drowned, the injured people
were rushed to the hospitals. This could be due to the security
agents had lost their focus or they should ensure similar
incidences do not happen again.
The other reason could have been the environmental conditions,
the winter season could have caused huge ice to form on top of
the bridge and hence add weight on the bridge. More so, the
heavy rain season that can cause flood would have washed the
bridge and cause it to collapse. Heavy rains have a huge force
that they can exert on the bridge and hence cause it to collapse.
The loss of life would not have been any different if it happened
in winter.
The poor construction of the bridge is another possible cause of
the collapse. During the initial construction, some errors could
have been left behind which then grew bigger as the bridge
continued to be used. When the bridge could no longer stand the
pressure from the load then it collapsed. The cost that is related
to the collapse is loss of lives, injured victims, destructio n of
cars. The most likely reason for the collapse could have been
the poor construction of the bridge, because if the bridge fell in
summer where there was no ice that could have added weight on
the bridge. The security was tight and therefore the collapse of
the bridge cannot be linked to a terrorist.
References
Boonstra , A., & Broekhuis , M. (2010). Barriers to the
acceptance of electronic medical records by physicians from
systematic review to taxonomy and interventions. BMC health
services research , 10 (1), 231.

More Related Content

More from twilacrt6k5

Which of the following must be capitalized by a business[removed].docx
Which of the following must be capitalized by a business[removed].docxWhich of the following must be capitalized by a business[removed].docx
Which of the following must be capitalized by a business[removed].docx
twilacrt6k5
 
Which of the following is the BEST test for the theory of natural .docx
Which of the following is the BEST test for the theory of natural .docxWhich of the following is the BEST test for the theory of natural .docx
Which of the following is the BEST test for the theory of natural .docx
twilacrt6k5
 
Which of the following is the STRONGEST example of a salient stimu.docx
Which of the following is the STRONGEST example of a salient stimu.docxWhich of the following is the STRONGEST example of a salient stimu.docx
Which of the following is the STRONGEST example of a salient stimu.docx
twilacrt6k5
 
Which Dynasty saw the reunification of Egypt and thus brought about .docx
Which Dynasty saw the reunification of Egypt and thus brought about .docxWhich Dynasty saw the reunification of Egypt and thus brought about .docx
Which Dynasty saw the reunification of Egypt and thus brought about .docx
twilacrt6k5
 
Whether a health care policy was formulated at the federal (country).docx
Whether a health care policy was formulated at the federal (country).docxWhether a health care policy was formulated at the federal (country).docx
Whether a health care policy was formulated at the federal (country).docx
twilacrt6k5
 
When you were attending AIU, you thought of yourself being an underc.docx
When you were attending AIU, you thought of yourself being an underc.docxWhen you were attending AIU, you thought of yourself being an underc.docx
When you were attending AIU, you thought of yourself being an underc.docx
twilacrt6k5
 
When new parents are expecting a baby, they rarely consider the poss.docx
When new parents are expecting a baby, they rarely consider the poss.docxWhen new parents are expecting a baby, they rarely consider the poss.docx
When new parents are expecting a baby, they rarely consider the poss.docx
twilacrt6k5
 

More from twilacrt6k5 (20)

Which one of the theories discussed in Chapters 3 and 4 of our cours.docx
Which one of the theories discussed in Chapters 3 and 4 of our cours.docxWhich one of the theories discussed in Chapters 3 and 4 of our cours.docx
Which one of the theories discussed in Chapters 3 and 4 of our cours.docx
 
Which of the following must be capitalized by a business[removed].docx
Which of the following must be capitalized by a business[removed].docxWhich of the following must be capitalized by a business[removed].docx
Which of the following must be capitalized by a business[removed].docx
 
Which of the following leader roles involves offering direction to.docx
Which of the following leader roles involves offering direction to.docxWhich of the following leader roles involves offering direction to.docx
Which of the following leader roles involves offering direction to.docx
 
Which of the following is the BEST test for the theory of natural .docx
Which of the following is the BEST test for the theory of natural .docxWhich of the following is the BEST test for the theory of natural .docx
Which of the following is the BEST test for the theory of natural .docx
 
Which of the following is the STRONGEST example of a salient stimu.docx
Which of the following is the STRONGEST example of a salient stimu.docxWhich of the following is the STRONGEST example of a salient stimu.docx
Which of the following is the STRONGEST example of a salient stimu.docx
 
Which of the following is not listed as a challenge in long dist.docx
Which of the following is not listed as a challenge in long dist.docxWhich of the following is not listed as a challenge in long dist.docx
Which of the following is not listed as a challenge in long dist.docx
 
Which of the assumptions of realism make the most sense to you Do y.docx
Which of the assumptions of realism make the most sense to you Do y.docxWhich of the assumptions of realism make the most sense to you Do y.docx
Which of the assumptions of realism make the most sense to you Do y.docx
 
Which Dynasty saw the reunification of Egypt and thus brought about .docx
Which Dynasty saw the reunification of Egypt and thus brought about .docxWhich Dynasty saw the reunification of Egypt and thus brought about .docx
Which Dynasty saw the reunification of Egypt and thus brought about .docx
 
Which disease can affect the human nervous system resulting in par.docx
Which disease can affect the human nervous system resulting in par.docxWhich disease can affect the human nervous system resulting in par.docx
Which disease can affect the human nervous system resulting in par.docx
 
Which characteristics are typically used to classify racespheno.docx
Which characteristics are typically used to classify racespheno.docxWhich characteristics are typically used to classify racespheno.docx
Which characteristics are typically used to classify racespheno.docx
 
Whether we know it or not, we already have an attitude toward our li.docx
Whether we know it or not, we already have an attitude toward our li.docxWhether we know it or not, we already have an attitude toward our li.docx
Whether we know it or not, we already have an attitude toward our li.docx
 
Whether a health care policy was formulated at the federal (country).docx
Whether a health care policy was formulated at the federal (country).docxWhether a health care policy was formulated at the federal (country).docx
Whether a health care policy was formulated at the federal (country).docx
 
Where did the makers of the Treaty of Versailles which ended W.docx
Where did the makers of the Treaty of Versailles which ended W.docxWhere did the makers of the Treaty of Versailles which ended W.docx
Where did the makers of the Treaty of Versailles which ended W.docx
 
Where Does U.S. Law Come FromYour task in this applicatio.docx
Where Does U.S. Law Come FromYour task in this applicatio.docxWhere Does U.S. Law Come FromYour task in this applicatio.docx
Where Does U.S. Law Come FromYour task in this applicatio.docx
 
When you were attending AIU, you thought of yourself being an underc.docx
When you were attending AIU, you thought of yourself being an underc.docxWhen you were attending AIU, you thought of yourself being an underc.docx
When you were attending AIU, you thought of yourself being an underc.docx
 
When young Mende women become members of Sande they go through three.docx
When young Mende women become members of Sande they go through three.docxWhen young Mende women become members of Sande they go through three.docx
When young Mende women become members of Sande they go through three.docx
 
When you read the Gospel of John you will see that it is quite diffe.docx
When you read the Gospel of John you will see that it is quite diffe.docxWhen you read the Gospel of John you will see that it is quite diffe.docx
When you read the Gospel of John you will see that it is quite diffe.docx
 
When new parents are expecting a baby, they rarely consider the poss.docx
When new parents are expecting a baby, they rarely consider the poss.docxWhen new parents are expecting a baby, they rarely consider the poss.docx
When new parents are expecting a baby, they rarely consider the poss.docx
 
When evaluating art movements, make sure you are selecting one speci.docx
When evaluating art movements, make sure you are selecting one speci.docxWhen evaluating art movements, make sure you are selecting one speci.docx
When evaluating art movements, make sure you are selecting one speci.docx
 
When it comes to religious pluralism, John Hick is one of the most a.docx
When it comes to religious pluralism, John Hick is one of the most a.docxWhen it comes to religious pluralism, John Hick is one of the most a.docx
When it comes to religious pluralism, John Hick is one of the most a.docx
 

Part 1In a 2 page paper, deliver an analysis of the threats, c

  • 1. Part 1 In a 2 page paper, deliver an analysis of the threats, consequences and likelihoods you must consider to assess risks in your network, to your asset and/or links. Be concise, yet comprehensive. The following elements should be included in your paper: Consider and describe the threats that might impact each node or type of node. Links may be critical too, but absorb these in considering threats to your nodes. For example, if a road links 2 power production facilities, and its impassibility in the winter means employees do not make it to work, you should simply cast this threat in terms of how it impacts the node. In other words, there is a threat of employees not reporting to work because of the remoteness of facility and routinely impassable roads. Every node should have multiple potential threats, and these should be realistic and fully described. Do not choose obscure or extremely unlikely threats, or you will find that infinite possibilities exist. You must use professional and governmental sources to help identify realistic threats. Consider and list the potential consequences each of these
  • 2. threats might produce. Part 2 Write a 1 page paper on how you would allocate a year’s budget to the assets in your network. Include at least three assets, determine a budget that is realistic for your network, and be specific about how much of it you would allocate to each asset and how it would be used. Also explain what strategy or methodology you used for determining your allocation. this will help Part 1 With the technological advancement, the healthcare center is now using electronic medical records (EMR) to store the patient's record. This approach has helped to save the time wasted working on manual file to track information. This allows the nurses and health staff to share information easily and facilitate the treatment of the patients , and this makes the network a cascading network . When some images are taking from the patient by radiologist they are transferred by picture archiving and communication systems (PACS) to display, they are used to store the images as well as transfer them. Some health center has adopted the use of software that facilitates the access of patients from remote areas. However, despite the positive impact of the EMR, they have not been fully adopted in the health care and physician ( Boonstra & Broekhuis , 2010 ) The system is sophisticated that it allows the clinician to access the information right from their tablets by accessing the CPOE.
  • 3. This technology enables them to share information with the department and is given instruction on how to tackle the issue they re dealing with. More so, the physician can access the information from anywhere and store them for further analysis not necessarily at the health center but anywhere even at home. Although the network is easy to use, it can only be used by the medical staff, the IT department, on the other hand, is responsible for the implementation as well as providing security need to the EMR in the network. When the information is accessed from the CPOES and EMR the operation becomes easier to handle. Under the supervision of the engineers who help to troubleshoot the technical issues as well as monitor the performance of the network. Part 2 Among the possible vulnerabilities that can be associated with the issue revolving around the collapse of the bridge are the following: environmental condition, the intervention of the terrorist attack or even the bridge had not constructed properly. Although many suspicions have been brought up trying to find out the core reason why the bridge collapsed, it has been highly connected with terrorism whose aim was to cause death and injure people. The attack caused some people to die, some cars that were driving on the bridge drowned, the injured people were rushed to the hospitals. This could be due to the security agents had lost their focus or they should ensure similar incidences do not happen again. The other reason could have been the environmental conditions, the winter season could have caused huge ice to form on top of the bridge and hence add weight on the bridge. More so, the heavy rain season that can cause flood would have washed the
  • 4. bridge and cause it to collapse. Heavy rains have a huge force that they can exert on the bridge and hence cause it to collapse. The loss of life would not have been any different if it happened in winter. The poor construction of the bridge is another possible cause of the collapse. During the initial construction, some errors could have been left behind which then grew bigger as the bridge continued to be used. When the bridge could no longer stand the pressure from the load then it collapsed. The cost that is related to the collapse is loss of lives, injured victims, destructio n of cars. The most likely reason for the collapse could have been the poor construction of the bridge, because if the bridge fell in summer where there was no ice that could have added weight on the bridge. The security was tight and therefore the collapse of the bridge cannot be linked to a terrorist. References Boonstra , A., & Broekhuis , M. (2010). Barriers to the acceptance of electronic medical records by physicians from systematic review to taxonomy and interventions. BMC health services research , 10 (1), 231.