Preview

is3110 lab 1

Good Essays
Open Document
Open Document
626 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
is3110 lab 1
RISK-THREAT-VULNERABILITY PRIMARY DOMAIN IMPACTED
Unauthorized access from public Internet
User destroys data in application and deletes all files
Hacker penetrates your IT infrastructure and gains access to your internal network
Intra-office employee romance gone bad
Fire destroys primary data center
Communication circuit outages
Workstation OS has a known software vulnerability
Unauthorized access to organization owned
Workstations
Loss of product data
Denial of service attack on organization e-mail server
Remote communications from home office
LAN server OS has a known software vulnerability
User downloads an unknown e-mail attachment
Workstation browser has software vulnerability
Service provider has a major network outage
Weak ingress/egress traffic filtering degrades performance
User inserts CD’s and USB hard drives with personal photos, music, and videos on organization owned computers
VPN tunneling between remote computer and ingress/egress router
WLAN access points are needed for LAN connectivity within a warehouse
Need to prevent rogue users from unauthorized WLAN access

1. Healthcare organizations are under strict compliance to HIPPA privacy requirements which require that an organization have proper security controls for handling personal healthcare information (PHI) privacy data. This includes security controls for the IT infrastructure handling PHI privacy data. Which one of the listed risks, threats, or vulnerabilities can violate HIPPA privacy requirements? List one and justify and justify your answer in one or two sentences.

a. Hacker penetrates your IT infrastructure and gains access to your internal network. If a hacker gains access to your network, they will potentially have access to patient files or other sensitive information that is under the HIPPA guidelines.

2. How many threats and vulnerabilities did you find that impacted risk within each of the seven domains of a typical IT

You May Also Find These Documents Helpful

  • Good Essays

    is4680 lab #2

    • 630 Words
    • 2 Pages

    Windows Hardening Defense, starts with the basics, Log in with least amount of privileges. Always use Firewall and AV. Monitor channels for security advisories and alerts. Know your system(s). Patch early and patch often, Unpatched Systems are the lowest of low hanging fruit. Have a patch policy documented and stick with it. Review patches as they are released and determine criticality based on the exploit, threat footprint for your system(s), and whether or not there is a POC or fully weapon exploit in the wild. When possible, test patches before rolling out in production on servers. Most clients should have automatic updates enabled for the OS and any application listening on a socket or used with untrusted data (java, adobe, browsers, etc...) Servers should be updated during maintenance windows if possible and depending on criticality (of threat and server).…

    • 630 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The Health Insurance Portability and Accountability act of 1996 or HIPAA, was put in place as an attempt to reform health care during the Clinton administration by making it possible for workers, of any profession, to change jobs regardless if the worker, or any member of their family, have a pre-existing medical condition, decreasing paperwork which is associated with the processing of health claims, and by reducing health care abuse and fraud, and by assuring the privacy and security of health information. HIPAA’s standards for privacy of individually identifiable health information or privacy rule includes restrictions which protect the confidentiality and security of health information, and determines a criterion to protect the confidentiality of individually identifiable health information that is maintained or transmitted through electronic means in association with certain administrative and financial transactions such as electronic transfer of health insurance claims. The covered entity, in most cases, is required to obtain an individual’s authorization prior to disclosing any health information. And in most circumstances the patient or a legal representative of the patient controls the disclosure of PHI to any third party.…

    • 1028 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    What HIPPA issues could arise? The main issue when dealing with medical records being online would be their patient’s information staying safe. In these days too many people are able to access sites and databases that should be secure. With people being able to hack and steal identities, this is a major problem when it comes to HIPPA issues. Another issue that could arise would be a patient not signing the forms to allow information to be posted. If a patient does not sign their name, their information should not be put online or given to any other individual.…

    • 361 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3120 Unit 3

    • 650 Words
    • 2 Pages

    speeds of at least 100 megabits per second and actual upload speeds of at least 50…

    • 650 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3440 Lab 1

    • 364 Words
    • 2 Pages

    For this kind of scenario, I would have to create a server from scratch so I can be able to identify any types of vulnerabilities on any of these server requirements stated below. Any of these can be at risk at any time, so creating a new server from scratch would be most recommended. Because it is kind of safer than Windows because most viruses and worms are written for Windows but it doesn’t mean Linux can be attacked.…

    • 364 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Is3110 Unit 4

    • 406 Words
    • 2 Pages

    If the project is completed on time then there is no risk for completion. All of the regular risks that apply to a project built on time apply to this one regardless of whether you are building a new infrastructure or modifying an older one. If the project is finished one month early, the quantitative risk really does not exist. It is basically comparable to completing the project on time. Since the project is quoted at 3 million dollars it will stay the same regardless of how fast the project is finished. However, you may see differences. When you rush a project this large you could possibly cut corners or receive poor quality results. If the project is finished two months late there are additional risks. If the company expects to make $20 million dollars annually, and assuming that the 4% penalty is levied against this yearly figure and not within smaller period of time, one month late means that US Industries Incorporated loses $800,000 annually. There doesn't appear to be any additional risk, however, further penalties and the possible eventual loss of the contract to a competitor could result in a poor product. There again appears to be no real quantitative risk involved if the project is finished a month early with the security requirements. If the originally quoted $3 million dollars remains the same regardless of how fast the project is finished and not coupled with hourly or daily wages, then there is nothing to lose financially. However the companies go beyond the required 1.5% completion benchmarks that the contract demands. Rushing a project of this scale also comes with rushed results possibly cut corners or poor quality. The credibility of the company is at stake with such a high profile, high income project such as this, and it is important to use all of the time available to ensure the best product is on display for any customer. The finished project should meet both the time and security requirements but not the service agreement. There does not…

    • 406 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Hcs 320 Hipaa Tutorial

    • 252 Words
    • 2 Pages

    HIPAA is important to understand so that health care employees can help safeguard patient information so it is less accessible by hackers or by people not authorized to view patient information.…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3110 - lab 6

    • 511 Words
    • 3 Pages

    3. Given the scenario for your IT risk mitigation plan, what influence did your scenario have on prioritizing your identified risks, threats, and vulnerabilities?…

    • 511 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Question 1: Does HIPPA affect the patient’s access to his or her medical records? If so, describe the effect and the procedure for obtaining access.…

    • 598 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IS3110 Week5 Lab

    • 503 Words
    • 2 Pages

    1 How do documented back-up and recovery procedures help achieve RTO? By recording and applying backup and recovery procedures that are listed, the recovery process is a lot smoother of a process, helping with the time portion of RTO. By having effective backup and recovery procedures you should have the necessary resources to restore systems from backups and a repeatable process that is known to succeed in achieving RTO.…

    • 503 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Unauthorized access to data centers, computer rooms and wiring closets, servers must be shut down occasionally for maintenance causing network downtime, data can be easily lost or corrupt and recovering critical business functions may take too long to be useful.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Describe the HIPPA security requirement that could have prevented each security issue identified if it had been…

    • 1284 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Ipremier Dos Attack

    • 1479 Words
    • 6 Pages

    On January 12th, 2007 at 4:31am, Bob Turley, CIO of the iPremier Company, received a panicked phone call from his IT operations staff. Their external facing website was “locked up” and could not be accessed by anyone, including their customers. iPremier is a web-based business that generates revenue through solely processing online orders. While the web server was down, the company could not accept any new orders or allow their customers to view their products. An inadequately third-party managed and configured router/firewall allowed hackers to execute a DOS (Denial of Service) attack on iPremier. I recommend purchasing a new firewall solution that will be managed and configured by the Company’s IT staff internally. This level of control will allow the company to tailor the level of security they desire and give them the ability to mitigate threats accordingly.…

    • 1479 Words
    • 6 Pages
    Better Essays
  • Good Essays

    In February of 2007 President OBAMA signed a bill to add changes to HIPAA. The changes will be made over the next few years as technology and medical records practices change. Breach notification was added to notify an individual that access to their records has been breached. This requires the facility to notify the patient of the breach with some details. Restriction on marketing guidelines were set to limit the amount of marketing materials sent and regulates what can and cannot be sent. Individual rights are being changed to match the changes in technology. EHR records are to be provided when a patient requests them, disclosures will be provided notifying the patient of EHR use. Along with the changes to policies within HIPAA comes a long list of fee’s and violation costs. Penalty costs can be fined up to about 1.5 million per incident. The enforcement of HIPAA and regulations that come along with HIPAA are going to be strictly enforced. Agencies have been set up to regulate each state and each entity to ensure HIPPA practices are being utilized.…

    • 989 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Brainia Essay FirstDraft

    • 601 Words
    • 2 Pages

    Interestingly enough, less than half, 40% (Clearswift, 2003) of employers surveyed educate their employees about viruses. Since employees are rarely informed about the risks involved with Internet misuse, the number of e-risk incidences continue to rise. According to Bickford (2006) “many personal computer users feel they must install accessory programs that complicate the normal processes associated with the retrieval of web based information”; thus creating a technical support burden. Furthermore “most employers fail to see attacks as a people problem as well as a technical challenge.” Assurex and Clearswift (2003). With workplace internet use on the rise, many users have found ways to circumvent firewalls leaving employers susceptible to viruses and malware.…

    • 601 Words
    • 2 Pages
    Good Essays