Skip to content
Menu
Timeless College
  • Alex Cavazzoni
  • Art Classes Near Me
  • AWS Training in Virginia
  • Bad Influence On Children
  • BROWZ safety compliance
  • Clarence McClendon
  • Digital Marketing Consultancy Kelowna
  • Freedom of speech on social media
  • Https://timelesscollege.xyz/
  • Https://timelesscollege.xyz/ – Timelesscollege.xyz
  • Https://www.timelesscollege.xyz/
  • Https://www.timelesscollege.xyz/ – Timelesscollege.xyz
  • In Home Tutoring
  • Integrated Atpl
  • Jewish Intimacy
  • Learn to play guitar online
  • Online Baseball Hitting Trainer
  • Prince George School
  • Quickbooks Classes
  • Sample Page
  • Schreibwettbewerb
  • STOCKS CRYPTO FOREX Trading
  • Timeless College
  • Timeless College – Timelesscollege.xyz
  • Timelesscollege.xyz/
  • Timelesscollege.xyz/ – Timelesscollege.xyz
  • Training as a Pilot
  • Website Creation Atlanta
Timeless College
Cyber Security – My Assignment Tutor

Cyber Security – My Assignment Tutor

November 23, 2021 by B3ln4iNmum

Cyber Security Capstone Project Problem Statement Capstone Project: Disaster and Business Continuity Problem Statement: Rockvale Hospital is one of the largest healthcare providers in the United States with more than 100 hospitals across the country. Rockvale is dependent on information technology for patient care and operations that any outage to the IT infrastructure, network, data center or applications like the electronic health record (EHR) is a potential threat to patient care. The hospital’s operations and network can be greatly impacted, or even shut down, due to a natural disaster or the harmful actions of bad actors. Last year, healthcare was the most targeted industry for malware attacks, accounting for 40 percent of all security incidents in the third quarter, and the U.S. experienced 15 natural disasters with losses exceeding $1 billion each. As the senior security expert in the organization, you have been tasked to review the security posture of the organization and provide recommendations. Following tasks should be performed: Task 1: One of the first tasks is to identify the various laws and regulations that govern the healthcare industry in the country.According to the laws of the United States, Protected health information (PHI) is protected under which regulatory act? Task 2: Protected health information (PHI) is any piece of information in an individual’s medical record that was created, used, or disclosed during the course of diagnosis or treatment that can be used to personally identify them.You have to identify the Protected Health Information (PHI) in relation to 18 types of information that must be handled securely to protect against disclosure and misuse. Task 3: Some members of the organization have raised security related concerns and seek your help select security controls to resolve their issues.You may use the following options to select the appropriate control category, control type, and control to remediate the issue stated in each scenario. Task 4: Based on your recommendation the organization is evaluating a next generation security information and event management (SIEM) solution to be able to identify and respond to incidents in an effective manner. The next generation SIEM solution also incorporates features such as Security orchestration, automation, and response (SOAR) and User/entity behaviour analytics (UEBA).You are asked to perform a qualitative and quantitative risk analysis to help senior management weigh the impact of the new SIEM solution.The new SIEM selection should be based on the Return of Security Investment (ROSI) metric, instead of Return of Investment (ROI) metric.The organization has been suffering on average one security incident per month.These incidents seem to cost about $10,000 in data loss, fine, and productivity.The SIEM solution is projected to block about 90% of the attacksThe new SIEM will cost approximately $25,000 for license fees  + $5,000 for training, installation, maintenance etc. Step 1: Write the key metrics. Step 2: Calculate the amount saved per year by implementing the SIEM solution. Step 3: Calculate the Return on Security Investment (ROSI) in percentage based on the formula: Step 4: What is the appropriate risk response based on the ROSI? (Transfer, Accept, Mitigate, Avoid) Step 5: What is your final recommendation to the executive leadership? Conduct penetration testingDo not purchase the next gen SIEM solutionPurchase the next gen SIEM solution with UEBA/SOARPurchase a DLP solution instead Task 5: The hospital IT team provides support to the organization’s internal users via a helpdesk ticketing system. You are reviewing, assessing and diagnosing recent support tickets.  Each ticket provides a description of the issue, and in some cases additional notes from the technical team.Based on the information provided in the tickets, use the following options in each of the service tickets to select the appropriate diagnosis, adversary technique used and adversary tactic used. These are the 3 open tickets: Task 6: The diagnosis of the open tickets reveal several social engineering attacks. What is the BEST prevention against these types of attacks?

  • Assignment status: Already Solved By Our Experts
  • (USA, AUS, UK & CA PhD. Writers)
  • CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS
QUALITY: 100% ORIGINAL PAPER – NO PLAGIARISM – CUSTOM PAPER

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • MN6008GN Business Strategy Strategies and Planning System
  • LEGL5003 Business and Corporation Law for Managers: Regulating Society
  • BM461 Global Business Environment: Structure and Operation
  • MOD003379 Legal Aspects Of Business: Business And Management
  • A Case of Sydney Skydivers

Recent Comments

  • A WordPress Commenter on Hello world!

Archives

  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021

Categories

  • Uncategorized

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
©2022 Timeless College | Powered by WordPress and Superb Themes!