subject

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this weekâs readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are: User authentication and credentials with third-party applications 3 common security risks with ratings: low, medium or high Justification of your threat model (why it was chosen over the other two: compare and contrast) You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them. Required:
a. Explain why the other threat models are not ideal (compare and contrast)
b. Provide one recommendation with summary and UML diagram

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 16:40
Match each feature of e-publishing as an advantage, a disadvantage, a threat, or an opportunity. (choices) increased collaboration digitalized out-of-print versions monopoly over digital formats requirement for a specialized digital device pairs advantage of e-publishing disadvantage of e- opportunity for e- threat to e-
Answers: 1
question
Computers and Technology, 21.06.2019 17:20
Q-1 which of the following can exist as cloud-based it resources? a. physical serverb. virtual serverc. software programd. network device
Answers: 3
question
Computers and Technology, 22.06.2019 04:30
What kind of software users of all skill levels create web pages that include graphics, video, audio, animation, and other special effects? website authoring website software website publishing website editing
Answers: 1
question
Computers and Technology, 22.06.2019 20:00
What is the worst-case complexity of the maxrepeats function? assume that the longest string in the names array is at most 25 characters wide (i.e., string comparison can be treated as o( class namecounter { private: int* counts; int nc; string* names; int nn; public: namecounter (int ncounts, int nnames); int maxrepeats() const; }; int namecounter: : maxrepeats () { int maxcount = 0; for (int i = 0; i < nc; ++i) { int count = 1; for (int j = i+1; j < nc; ++j) { if (names[i] == names[j]) ++count; } maxcount = max(count, maxcount); } return maxcount; }
Answers: 3
You know the right answer?
A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewha...
Questions
question
Mathematics, 02.06.2022 02:40
question
Mathematics, 02.06.2022 04:30
question
Mathematics, 02.06.2022 06:50
question
Mathematics, 02.06.2022 07:10
question
Mathematics, 02.06.2022 08:20
Questions on the website: 13722363