Preview

How to Identify Threats and Vulnerabilities in an IT Infrastructure

Satisfactory Essays
Open Document
Open Document
465 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
How to Identify Threats and Vulnerabilities in an IT Infrastructure
1. An example of a HIPPA privacy violation would be a breach of information from the Healthcare organizations servers. This particular breach would impact the System/Application Domain. A hacker can penetrate a vulnerable system and retrieve patient information such as SSN, DOB, and even credit card payment information.

2. Threats and vulnerabilities:
a. User Domain – Unauthorized access to organization owned workstations
b. Workstation Domain - User downloads an unknown e-mail attachments
c. LAN Domain - WLAN access points are needed for LAN connectivity within a warehouse
d. LAN-to-WAN Domain - Unauthorized access from public Internet
e. WAN Domain - Service provider has a major network outage
f. Remote Access Domain - Remote Communication from home office
g. System/Application Domain - Fire destroys primary data center

3. The primary domain identified as having the greatest number of risks, threats, and vulnerabilities was the System/Application Domain.

4. The risk impact or threat to the healthcare HIPPA compliance impacted by the LAN-to-WAN Domain would be the breach of the healthcare browser and ultimately server containing patient private information.

5. Of the treats identified that would impact the System/Application Domain the one that would require disaster recovery plan or business continuity plan would be a fire destroys the primary data center. 6. The domain the represents the greatest risk and uncertainty to an organization would be the System/Application Domain. This is where the servers and monetary data are located.

7. The Remote Access Domain requires stringent access controls and encryption for connectivity to corporate resources from home.

8. The domain that requires annual security awareness training and employee background checks would be the User Domain.

9. The domains that require software vulnerability assessments to mitigate risk from software vulnerabilities would be the following:
a. Workstation Domain
b.

You May Also Find These Documents Helpful

  • Good Essays

    The three broad objectives HIPAA privacy standards were designed to accomplish are; define and limit the circumstances in which individuals use and disclose patient health information, establish individual rights regarding patient health information, and require protected individuals to adopt administrative safeguards to protect the confidentiality and privacy of patient healthcare information (Cleverley, pg.95). The HIPAA Privacy Standards prohibit covered entities from using or disclosing individually identifiable health information that is or has been transmitted or maintained electronically. This requirement isn’t limited to the record in which the information appears but applies to the actual information itself. Any information that has been transmitted by email, fax, telephone, or any other…

    • 995 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate risk and minimize exposure.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    What HIPPA issues could arise? The main issue when dealing with medical records being online would be their patient’s information staying safe. In these days too many people are able to access sites and databases that should be secure. With people being able to hack and steal identities, this is a major problem when it comes to HIPPA issues. Another issue that could arise would be a patient not signing the forms to allow information to be posted. If a patient does not sign their name, their information should not be put online or given to any other individual.…

    • 361 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The HIPAA Privacy Rule gives the patient’s rights to all information documented concerning them. Whether on paper or electronic, the patient have the rights to their medical records, get correction made if any mistakes are found, informed if the doctor use or give his/her information to anyone, to see where they contact you, and to complain if needed to OCR website www.hhs.gov/ocr.…

    • 391 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Health Care Industry

    • 614 Words
    • 3 Pages

    HIPAA is the acronym for the Health Insurance Portability and Accountability Act that was passed by Congress in 1996. The HIPAA Privacy regulations require health care providers and organizations, as well as their business associates, develop and follow procedures that ensure the confidentiality and security of protected health information (PHI) when it is transferred, received, handled, or shared. This applies to all forms of PHI, including paper, oral, and electronic, etc. Furthermore, only the minimum health information necessary to conduct business is to be used or shared.…

    • 614 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Hsm310 Hipaa Assignment

    • 893 Words
    • 4 Pages

    | HIPAA Rules(1)Privacy Rules: According to the U.S Department of Health and Human Services (HHS), the HIPAA Privacy Rule establishes national standards to protect individuals’ medical records and other personal health information and applies to health plans, health care clearinghouses, and those health care providers that conduct certain health care transactions electronically. It’s important because the Rule requires appropriate safeguards to protect the privacy of personal health information, and sets limits and conditions on the uses and disclosures that may be made of such information without patient authorization. This rule impacts the staff by: Not sharing the information with others who have no need to know, including co-workers, family members or friends, minimizing opportunities for patient information to be overheard by others, never sharing passwords, disposing of information containing PHI properly such as shredding paper files(2)Security Rules: The HIPAA Security Rule establishes national standards to protect individuals’ electronic personal health information that is created, received, used, or maintained by a covered entity. The Security Rule is important because it requires appropriate administrative, physical and technical safeguards to ensure the confidentiality, integrity, and security of electronic protected health information. It impacts the organization by forcing the healthcare industry to adopt uniform electronic transaction standards for…

    • 893 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Is 305 Week 4 Quiz

    • 415 Words
    • 2 Pages

    Describe and list four elements of a BCP. Identify critical equipment necessary for the business mission. Identifying critical personnel necessary for the business to return to normal operations of the business. Conduct a BIA, determine the impact on the business if systems were unavailable. Maintenance and updating of the BCP as changes are made to the network.…

    • 415 Words
    • 2 Pages
    Good Essays
  • Better Essays

    NT2580 Graded Assignments

    • 5288 Words
    • 22 Pages

    You will learn how to match common risks or threats within the seven domains of a typical IT infrastructure with solutions and preventative actions.…

    • 5288 Words
    • 22 Pages
    Better Essays
  • Good Essays

    The workstation domain is where a user can connect to the business network through the local area network. This can be done by laptops, phones, tablets, and desktops. Each workstation requires a user ID and password. To prevent unauthorized access pass word protection should be enabled. A strong password should consist of uppercase, lowercase letters and special characters. If a workstation is idle for a certain amount of time there should be automatic screen lock, which requires the user to reenter their password for access. Certain user should only have the ability to make changes like downloading and installing something to internet access. This along with an anti-virus program will reduce threats like viruses and malware. So if a virus was present on a workstation it will be removed before it spreads throughout the network.…

    • 347 Words
    • 2 Pages
    Good Essays
  • Good Essays

    is3110 lab 1

    • 626 Words
    • 3 Pages

    Hacker penetrates your IT infrastructure and gains access to your internal network. If a hacker gains access to your network, they will potentially have access to patient files or other sensitive information that is under the HIPPA guidelines.…

    • 626 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    I have identified at least three IT infrastructure domains affected by the “Internal Use Only” data classification standard.…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    1. What are some common risks, and vulnerabilities commonly found in the System/Application Domain that must be mitigated with proper security countermeasures?…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    concern of this domain. This domain needs to be protected by securing the physical access to computer rooms and a disaster recovery plan (DRP) should be created including the backup of data. Plan, configure, maintain, and improve all network servers and implements all standards including the Acceptable Use Policy…

    • 1234 Words
    • 5 Pages
    Better Essays