Preview

is3110 lab 1

Good Essays
Open Document
Open Document
626 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
is3110 lab 1
RISK-THREAT-VULNERABILITY PRIMARY DOMAIN IMPACTED
Unauthorized access from public Internet
User destroys data in application and deletes all files
Hacker penetrates your IT infrastructure and gains access to your internal network
Intra-office employee romance gone bad
Fire destroys primary data center
Communication circuit outages
Workstation OS has a known software vulnerability
Unauthorized access to organization owned
Workstations
Loss of product data
Denial of service attack on organization e-mail server
Remote communications from home office
LAN server OS has a known software vulnerability
User downloads an unknown e-mail attachment
Workstation browser has software vulnerability
Service provider has a major network outage
Weak ingress/egress traffic filtering degrades performance
User inserts CD’s and USB hard drives with personal photos, music, and videos on organization owned computers
VPN tunneling between remote computer and ingress/egress router
WLAN access points are needed for LAN connectivity within a warehouse
Need to prevent rogue users from unauthorized WLAN access

1. Healthcare organizations are under strict compliance to HIPPA privacy requirements which require that an organization have proper security controls for handling personal healthcare information (PHI) privacy data. This includes security controls for the IT infrastructure handling PHI privacy data. Which one of the listed risks, threats, or vulnerabilities can violate HIPPA privacy requirements? List one and justify and justify your answer in one or two sentences.

a. Hacker penetrates your IT infrastructure and gains access to your internal network. If a hacker gains access to your network, they will potentially have access to patient files or other sensitive information that is under the HIPPA guidelines.

2. How many threats and vulnerabilities did you find that impacted risk within each of the seven domains of a typical IT

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Unauthorized access to data centers, computer rooms and wiring closets, servers must be shut down occasionally for maintenance causing network downtime, data can be easily lost or corrupt and recovering critical business functions may take too long to be useful.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT220 Lab 7

    • 303 Words
    • 2 Pages

    The benefits of a partial in the cost and a full meh would be required where large sums of money and data are exchanged and can have almost none down time.…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Is3110 Unit 4

    • 406 Words
    • 2 Pages

    If the project is completed on time then there is no risk for completion. All of the regular risks that apply to a project built on time apply to this one regardless of whether you are building a new infrastructure or modifying an older one. If the project is finished one month early, the quantitative risk really does not exist. It is basically comparable to completing the project on time. Since the project is quoted at 3 million dollars it will stay the same regardless of how fast the project is finished. However, you may see differences. When you rush a project this large you could possibly cut corners or receive poor quality results. If the project is finished two months late there are additional risks. If the company expects to make $20 million dollars annually, and assuming that the 4% penalty is levied against this yearly figure and not within smaller period of time, one month late means that US Industries Incorporated loses $800,000 annually. There doesn't appear to be any additional risk, however, further penalties and the possible eventual loss of the contract to a competitor could result in a poor product. There again appears to be no real quantitative risk involved if the project is finished a month early with the security requirements. If the originally quoted $3 million dollars remains the same regardless of how fast the project is finished and not coupled with hourly or daily wages, then there is nothing to lose financially. However the companies go beyond the required 1.5% completion benchmarks that the contract demands. Rushing a project of this scale also comes with rushed results possibly cut corners or poor quality. The credibility of the company is at stake with such a high profile, high income project such as this, and it is important to use all of the time available to ensure the best product is on display for any customer. The finished project should meet both the time and security requirements but not the service agreement. There does not…

    • 406 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    lab8 is3440

    • 129 Words
    • 1 Page

    1 Bascially RPM command is used for installing, uninstalling, upgrading, querying, listing, and checking RPM packages on your Linux system.…

    • 129 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Is3350 Unit 5

    • 880 Words
    • 4 Pages

    Electricity at work Regulations 1989. This legislation places the4 responsibility of electrical item on to the employer.…

    • 880 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IS3230 Lab 7 Multi-Factor Authentication Process Chris Wiginton ITT Technical Institute, Tampa FL Instructor: David Marquez 1 May 2014 Multi-Factor Authentication Process Area Authentication Process(es) Authentication Factors Authentication and Authorization LDAP /Kerberos Authentication, Token , Session Timeline Username , Password Token, Pin, Biometric Device Support Device should not be end of life and under support contract Vendor Supported Firewalls using Approved Product List (APL) Interoperability ISO and IEEE Standards for Encryption Multi-Vendor Interoperability based on AES, 3DES Standards, and SSL Encryption methods. Multiprotocol Support TCP, UDP, ESP, SSL ACL only allows trusted endpoints based on Port and Protocol Packet Encryption IKE - Internet Key Exchange VPN 2 Phase Negotiation based on Pre-Share Key, VPN Certificate Authentication.…

    • 155 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3110 U5D1

    • 712 Words
    • 3 Pages

    This is a lot like hardening the OS in respect that you are making sure that software stays up to date to ensure that known exploits are being addresses. Any unnecessary applications, services, or scripts that are installed should be removed immediately once the installation process is complete. Below are some things that you can do to harden software.…

    • 712 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS3230 Lab 4

    • 528 Words
    • 2 Pages

    1. By opening ports in your firewall it is allowing people access to your network and if anybody tries to get in figures out the port, they can potentially gain access to your system.…

    • 528 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Lab 4 Is4680

    • 465 Words
    • 2 Pages

    1. What is a PHP Remote File Include (RFI) attack, and why are these prevalent in Today’s Internet world? RFI stands for Remote File Inclusion that allows the attacker to upload a custom Coded/malicious file on a website or server using a script. This vulnerability Exploits the poor validation checks in websites and can eventually lead to code Execution on server or code execution on website (XSS attack using JavaScript). RFI is a common vulnerability and all website hacking is not entirely focused on SQL injection. Using RFI you can deface the websites, get access to the server and do almost anything. What makes it more dangerous is that you only need to have your common sense and basic knowledge of PHP to execute this one; some BASH might come handy as most of servers today are hosted on Linux.…

    • 465 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Describe the HIPPA security requirement that could have prevented each security issue identified if it had been…

    • 1284 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    IS3120 Unit 3

    • 650 Words
    • 2 Pages

    speeds of at least 100 megabits per second and actual upload speeds of at least 50…

    • 650 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3445 Lab 7

    • 371 Words
    • 2 Pages

    Yes, although such tools like these would automatically find security flaws with high degree of confidence that what it found was a flaw.…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    What HIPPA issues could arise? The main issue when dealing with medical records being online would be their patient’s information staying safe. In these days too many people are able to access sites and databases that should be secure. With people being able to hack and steal identities, this is a major problem when it comes to HIPPA issues. Another issue that could arise would be a patient not signing the forms to allow information to be posted. If a patient does not sign their name, their information should not be put online or given to any other individual.…

    • 361 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The Health Insurance Portability and Accountability act of 1996 or HIPAA, was put in place as an attempt to reform health care during the Clinton administration by making it possible for workers, of any profession, to change jobs regardless if the worker, or any member of their family, have a pre-existing medical condition, decreasing paperwork which is associated with the processing of health claims, and by reducing health care abuse and fraud, and by assuring the privacy and security of health information. HIPAA’s standards for privacy of individually identifiable health information or privacy rule includes restrictions which protect the confidentiality and security of health information, and determines a criterion to protect the confidentiality of individually identifiable health information that is maintained or transmitted through electronic means in association with certain administrative and financial transactions such as electronic transfer of health insurance claims. The covered entity, in most cases, is required to obtain an individual’s authorization prior to disclosing any health information. And in most circumstances the patient or a legal representative of the patient controls the disclosure of PHI to any third party.…

    • 1028 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    The two major issues identified in this situation is the violation against HIPPA regulations which is a US law designed to provide privacy standards to protect patients ' medical records and other health information provided to health plans, doctors, hospitals and other health care providers. This was an act developed by the Department of Health and Human Services, in which new standards provide patients with access to their medical records and more control over how their personal health information is used and disclosed. The HIPAA Privacy Rule provides federal protections for personal health information held by covered entities and gives patients an array of rights with respect to that information. At the same time, the Privacy Rule is balanced so that it permits the disclosure of personal health information needed for patient care and other important purposes (HHS.gov 2011).…

    • 586 Words
    • 2 Pages
    Satisfactory Essays