Top-Rated Free Essay
Preview

Risk Management Lab 1

Satisfactory Essays
562 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Risk Management Lab 1
1. Healthcare is under a strict HIPPA privacy requirements which require that an organization have proper security controls for handling personal healthcare information (PHI) privacy data. This includes security controls for the IT infrastructure handling PHI privacy data. Which one of the listed risks, threats, or vulnerabilities can violate HIPPA privacy requirements? List one and justify your answer in one or two sentences.

Hacker penetrates your IT infrastructure and gains access to your internal network – If a hacker is able to penetrate your internal network he has the potential to gain access to patient files or other private data that is covered under HIPPA guidelines.

2. How many threats and vulnerabilities did you find that impacted risk within each of the seven domains of a typical IT infrastructure?

a. User Domain: 2

b. Workstation Domain: 5

c. LAN Domain: 7

d. LAN-to-WAN Domain: 2

e. WAN Domain: 2

f. Remote Access Domain: 2

g. System/Application Domain: 1

3. Which domain(s) had the greatest number of risks, threats, and vulnerabilities?

LAN Domain

4. What is the risk impact or risk factor (critical, major, minor) that you would qualitatively assign to the risks, threats, and vulnerabilities you identified for the LAN-to-WAN Domain for the healthcare and HIPPA compliance scenario?

I would consider the both minor for the most part. Unless performance becomes a work stoppage, both would be considered minor in relation to HIPPA.

5. Of the three Systems/Application Domain risks, threats, and vulnerabilities identified, which one requires a disaster recovery plan and a business continuity plan to maintain continued operations during a catastrophic outage?

Loss of production data

6. Which domain represents the greatest risk and uncertainty to an organization?

User Domain

7. Which domain requires stringent access controls and encryption for connectivity to corporate resources from home?

Remote Access Domain

8. Which domain requires annual security awareness training and employee background checks for sensitive positions to help mitigate risk from employee sabotage?

User Domain

9. Which domains need software vulnerability assessments to mitigate risk from software vulnerabilities?

Workstation Domain

10. Which domain requires AUPS to minimize unnecessary User initiated Internet traffic and can be monitored and controlled by web content filters?

User Domain

11. In which domain do you implement web content filters?

LAN-to-WAN Domain

12. If you implement a wireless LAN (WLAN) to support connectivity for laptops in the Workstation Domain, which domain does WLAN fall within?

LAN Domain

13. A bank under Gramm-Leach-Bliley-Act (GLBA) for protecting customer privacy has just implemented their online banking solution allowing customers to access their accounts and perform transactions via their computer or PDA device. Online banking servers and their public Internet hosting would fall within which domains of security responsibility?

a. LAN-to-WAN Domain

14. Customers that conduct online banking using their laptop or personal computer must use HTTPS:, the secure and encrypted version of HTTP: browser communications. HTTPS:// encrypts webpage data inputs and data through the public Internet and decrypts that webpage and data once displayed on your browser. True or False.

a. TRUE

15. Explain how a layered security strategy throughout the 7-domains of a typical IT infrastructure can help mitigate risk exposure for loss of privacy data or confidential data from the Systems/Application Domain.

Well as you travel through the layers, each layer should add a little more security features to help protect you IT assets. When you come to your Systems/Application Domain, the applications should work with your network based on how you set up the other layers.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Hcs 483 Wk1Dq1 2

    • 457 Words
    • 2 Pages

    Prior to the enactment of the Health Insurance Portability and Accountability Act (HIPPA) health information was able to be shared without the knowledge or permission of the patient. This information was available to just about anyone including insurance agencies, places of employment and even loan lenders. People would potentially use individuals’ health information to deny them work or a loan for their home and even impacting higher insurance rates or denial of coverage. According to U.S. Department of Health and Human Services (n.d.), “The Privacy Rule establishes a Federal floor of safeguards to protect the confidentiality of medical information. State laws which provide stronger privacy protections will continue to apply over and above the new Federal privacy standards.” (para. 1). Also, as medical records continue to move entirely to the new standard of electronic records it is important to have one standard across the country to protect everyone’s information. Electronic health records (EHR) make it easier than ever to accidentally share medical information, to include having it stolen. Medical providers are just as likely to face consequence if their facility is broken in to and the hard drive with patients information is stolen as they would be if they gave the information away themselves. In general HIPPA protects patients’ information as well as their right to be treated equally.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    iii.Install water saving devices such as native plants, tank, dual flush toilet systems, 5-6 star (WELS) dishwasher.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    This domain is the fastest way for the system to be compromised. I would implement an AUP (acceptable use policy) that will be understood and signed by all employees with access to the network. The employees will also have to go through initial information security training before gaining access to the network. This training will also be required annually in order to maintain their access to the network. The AUP will dictate the requirements for passwords. The requirements will include an eight character alphanumeric password, two uppercase letters, two lowercase letters, two special characters, and two numbers. This will make it more difficult for the password to be breached. The AUP will also state that the company systems will only be used for work related purposes. All social networking sites and many other miscellaneous sites will be blocked. The user will also have to consent to monitoring when signing the…

    • 1234 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    2. Why is it difficult to conduct a qualitative risk assessment for an IT infrastructure?…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3110 Week3 Quiz

    • 347 Words
    • 2 Pages

    3. Using the workstation domain, define risks associated within that domain and explain what can be done to reduce risks in that domain.…

    • 347 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    ISSC 363 Week 2 Quiz

    • 320 Words
    • 2 Pages

    In which of the IT domains is a hub considered a major component of risk?…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Is 305 Week 3 Quiz

    • 577 Words
    • 3 Pages

    Using the workstation domain, define risks associated within that domain and explain what can be done to reduce risks in that domain.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Analyze the security issues and the HIPAA security requirements and describe the safeguards that the organization needs to implement in order to mitigate the security risks. Ensure that you describe the safeguards in terms of administrative, technical, and physical safeguards.…

    • 1284 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Unit 7 Lab

    • 293 Words
    • 2 Pages

    3. How does risk management and risk assessment relate to a business impact analysis for an IT infrastructure?…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hippa Regulations

    • 339 Words
    • 2 Pages

    2. Discuss the role of HIPAA regulations in data and network security, patient consent and authorization.…

    • 339 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Hipaa

    • 384 Words
    • 2 Pages

    | Write a paragraph on each of the 3 critical areas of HIPAA for a training session of your staff. Explain what they are, why they are important and how they impact staff duties and the organization.…

    • 384 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Why Is Hippa Important

    • 649 Words
    • 3 Pages

    Guidelines to measure and sustain adequate protection under the PHI seems to be dangling in areas of intent. Intending . Breaching the HIPPA laws should enforce more strict penalties for exposed reports. Penalties have been set forth to punish those who have breached the HIPPA laws. As society continues to grow in technology it becomes more of a risk for personal data to be subject to anyone's leisure. Look at the easy access to online medical reports and personal information. Most doctor offices and hospitals have created online patient portals to give patients immediate access to their medical records. Much of personal data and your medical information is placed in these websites. This gives opportunities for identity theft as well as your financial information is available.This information is suppose to be confidential but someone has to add the data to the system and access is available among staff, insurance companies , medical personnel and others databases.…

    • 649 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Question 1: Does HIPPA affect the patient’s access to his or her medical records? If so, describe the effect and the procedure for obtaining access.…

    • 598 Words
    • 3 Pages
    Good Essays