Threat modeling research paper

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.Your paper should meet the following requirements:

  • Be approximately four pages in length, not including the required cover page and reference page. 
  • Need a UML diagram (not copied from internet)

Sort and Search Algorithms

 

write a Java program that implements the Sorting algorithm. Your program will ask the user to input 10 numbers. The program will store these 10 numbers into an array and sort them in descending order (largest number to smallest). Then the program will output the numbers in the sorted array. The user must press “E” to exit the program.

Use the following videos as reference to assist you in the programming assignment:

https://www.youtube.com/watch?v=cqh8nQwuKNE

 

Assignment Expectations

  • Use GUI to get user input.
  • Demonstrate the ability to implement a sorting algorithm.
  • Apply repetition statement in the program.

Upload your program and a screenshot of the output to the Case 4 dropbox.  

cybercrimes

 

Provide a response to the following:

What current cyber threats must be considered? How does this impact an organization’s security structure?

Instructions: Fully utilize the materials that have been provided to you in order to support your response. Your initial post should be at least 350 words. APA format. Please be sure to reference the attached sourc and the link provided in addition to other sources.

https://www.cio.com/article/2412056/wikileaks-and-the-authorized-insider-threat.html

security

1) Search your institution’s intranet or Web site for its security policies. Do you find an enterprise security policy? What issue-specific security policies can you locate? Are all of these policies issued or coordinated by the same individual or office, or are they scattered throughout the institution?

2) Using the framework presented in this chapter, draft a sample issue-specific security policy for an organization. At the beginning of your document, describe the organization for which you are creating the policy and then complete the policy using the framework.

3) Assume a smaller organization has a plan to implement a security program with three full-time staff and two or three groups of part-time roles from other parts of the business. What titles and roles do you recommend for the three full-time staff? What groups would commonly supply the part-time staff?

4) Draft a work breakdown structure for the task of implementing and using a PC-based virus detection program (one that is not centrally managed). Don’t forget to include tasks to remove or quarantine any malware it finds 

Module 2

 Moqup.com is the sight I’m using for this assignment.

Password:

!Atun5803

[email protected] -Username

Module 2 instructions:

 

Instructions

Update your mockup to reflect any instructor feedback and any new design principles covered. 

Using HTML apply the basic web design principles learned so far to create the personal website that you proposed in Module 1. At this point, you are just creating the structure of your website. This includes a blank web page, a layout for the opening page, and a navigation (menu bar). It is important that you do not go beyond creating the structure at this point, since in the future assignments you will add additional features and content based on instructor feedback on your website structure.

Write one page outlining the website’s purpose and audience.

Create a zipped folder containing all files and name it under your last name plus Assig2. Example Kalantari-Assig2. Submit your zipped folder to Module 2 Assignment link.

 

:

;

Servers Remote Management

While working on the homework assignment, the differences between servers and desktops will become more obvious. What tools and technology would you use to remotely manage servers? These may be the same as those used with desktops or completely different. Discuss with the other students how you would manage one remote server, 10 remote servers, and 1,000 remote servers. Make sure to think about out-of-band management along with management through remote protocols such as remote desktop and ssh.

Aligned Objectives

  • Understand the core elements of an IT infrastructure, servers, network devices, and wired and wireless network links
  • Understand through practical examples, how protocols are used to enable communication between computing devices
  • Understand the differences between workstation and server hardware
  • Manage servers both remotely and locally

Response Parameters

  • Each initial post should be 250 to 350 words. Respond to at least one peer’s post by providing potential solutions to their concern