Preview

Victor Sabani Lab 1 Lab Assessment

Satisfactory Essays
Open Document
Open Document
404 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Victor Sabani Lab 1 Lab Assessment
Victor Sabani Lab 1

Lab Assessment Questions & Answers

The following risks, threats, and vulnerabilities were found in a healthcare IT infrastructure servicing patients with life-threatening situations. Given the list, select which of the seven domains of a typical IT infrastructure is primarily impacted by the risk, threat, or vulnerability.
Risk – Threat – Vulnerability
Primary Domain Impacted
Unauthorized access from public Internet
WAN
User destroys data in application and deletes all files
Workstation
Hacker penetrates your IT infrastructure and gains access to your internal network
LAN
Fire destroys primary data center
System Application
Communication circuit outages
LAN to WAN
Workstation OS has a known software vulnerability
Workstation
Unauthorized access to organization owned Workstations
LAN
Denial of service attack on organization e-mail
Server
System Application
Remote communications from home office
Remote Access
LAN server OS has a known software vulnerability
LAN
User downloads an unknown e –mail attachment LAN
Workstation browser has software vulnerability
User
Service provider has a major network outage
WAN
User inserts CDs and USB hard drives with personal photos, music, and videos on organization owned computers
Workstation
VPN tunneling between remote computer and ingress/egress router
Remote access
WLAN access points are needed for LAN connectivity within a warehouse
LAN to WAN

Given the scenario of a healthcare organization, answer the following assessment questions from a risk management perspective:

1 Of the listed risks, threats, and vulnerabilities identified in the table above, which one requires a disaster recovery plan and business continuity plan to maintain continued operations during a catastrophic outage? The one threat that would require a DRP or a BC would have to be if a fire destroyed the primary data center.

2 Which domain represents the greatest risk and uncertainty to an organization?

The domain with the greatest

You May Also Find These Documents Helpful

  • Best Essays

    Patton-Fuller Rfp Cmgt554

    • 4696 Words
    • 19 Pages

    The following document shall serve as the RFP (Request for Project) for the Patton-Fuller Community Hospital. Team A has researched the hospital’s current IT systems seeking ways to ensure many years of continued success and compliance with the very best practices in the IT community today. Specific areas such as networking architecture design and the future proofing of the design for speed, accuracy, and security of the system shall be discussed as part of this RFP. Special consideration was given to the sensitive nature of the security surrounding patient information while proposing changes.…

    • 4696 Words
    • 19 Pages
    Best Essays
  • Good Essays

    NTC362 Week 2 INDP part 1

    • 719 Words
    • 3 Pages

    Patton Fuller is a community hospital that has been proudly serving the community since 1975. Patience care is number one, and they thrive to ensure each of their patients experience is as pleasant as possible. Hospitals are under enormous pressure to treat patients in the most effective and efficient way. By leveraging the best IT systems, health organizations provide the type of patient care with the speed and efficiency required by the market. By analyzing Patton Fuller’s IT infrastructure, a determination can be made about the network and the devices supported on it as well. The outcome of the analysis will be used to recommend new technologies in data collection, internal communication, and security. If done correctly, this will link productivity with care thereby improving performance and reducing the cost of operations in the hospital.…

    • 719 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Quiz010: Lab Report

    • 929 Words
    • 4 Pages

    | LabRepQuiz010 Question MC #7: Which of the following is the best written sentence that includes the information below taken from an article written by Dr. Costanza, but avoids plagiarism?…

    • 929 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    HCS 451 Week 5 DQs

    • 407 Words
    • 2 Pages

    1. What strategies can the organization take to survive, improve its performance, and compete with other hospitals over the next 5 years?…

    • 407 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Lab 2

    • 385 Words
    • 2 Pages

    2. What is the relationship between risks, threats and vulnerabilities as it pertains to Information Systems Security throughout the seven domains of a typical IT infrastructure?…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab #4

    • 451 Words
    • 2 Pages

    MS08-067: Vulnerability in Server service could allow remote code execution. This can lead to someone gaining administrative rights who could add and delete…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISSC 363 Week 2 Quiz

    • 320 Words
    • 2 Pages

    In which of the IT domains is a hub considered a major component of risk?…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ping sweeps and port scans are two techniques that a malicious computer user such as a hacker can utilize to compromise an Enterprise networks security and gain access to their proprietary data. For example, private email messages can be forwarded to a rogue destination email address: Done by installing a virus program into a user’s email client through a discovered active computers open TCP/IP IMAP port (port number 143) that is not being currently used by that user (Clarke, 2008). The virus then could take advantage of security vulnerabilities in that users email client program and forward emails from that users inbox over to another destination email address without them knowing about it. Therefore, in light of such exploits as just described it is vitally important to address and mitigate the security problem to an Enterprise network from ping sweeps and port scans that can be incurred from outside sources by the use of strong Firewall protections.…

    • 631 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    7. List at least 3 risks your company will face, and explain how you will manage those risks.…

    • 309 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    The purpose of risk management in health care organizations is to reduce risk by reducing errors, reducing accidents and injuries, and reduce financial loss if any accident or injury does occur. Risk management covers a very broad range of issues, interacts with and is effected by every activity of a health care organization. Traditionally, risk management has been focus primarily on minimizing the financial loss of a health care organization. A broadened approach is being realized in current health care organizations of prevention and quality service and increased involvement from the hospital staff.…

    • 2186 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    I have been asked to implement a system design for Acme Manufacturing, linking all their computers to each other with a (WAN). The WAN network has all the features that all are used to in the current LAN. With the WAN network, employees are able to connect to another network remotely. As a system designer, it is my privilege to implement such a design. This document will show the design system in detail, with a follow-up section for someone that may have a system design question. I hope everyone will find this document informative as well as instructive.…

    • 1101 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Perform a risk assessment. Perform a risk assessment. Fill out the control table for Classic Catalog Company…

    • 262 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Risk Scenario

    • 4258 Words
    • 18 Pages

    The issue of risk scenario carries immense importance for most of the hospitals that are part of the healthcare setting. However, there is not only one scenario that can affect the hospitals but there are several scenarios that can create an impact on the functions of the hospital. There are three scenarios that would be highlighted in the current topic. These three scenarios have a tendency to put a hospital at risk for financial stability. The first scenario that can produce a negative impact on the hospital risk is related to patient care and safety. The second scenario is related to the physical plant. The third and last scenario is related to staffing. The role of HIM practitioner in this regard would be very important. They would serve as a clinical quality assessment resource and as a team member to perform their tasks related to healthcare work. Therefore, all the issues related to three scenarios will be discussed in detail.…

    • 4258 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    Risk Management Success

    • 1462 Words
    • 5 Pages

    The paper is intended to inform the reader of the steps that a risk management program should take in order to ensure that safety and security are upheld. The security and protection of information is more difficult than ever before due to the expanse of technology that is used in the world. Information can be hacked in to and utilized for fraudulent purposes. Personal information of random populations is sought by convicted felons and illegal organizations for the purpose of identity theft and financial gain. The recent inception of identity theft pays tribute to the realization that modern technology truly presents higher risk in terms of security breaches. Alongside the need for security of information is the protection of safety of both staff and patients alike. This aspect of risk management holds a great amount of weight in terms of evaluating the success of a program, as adverse events can cost an organization their accreditation and often times their funding and viability can be negatively affected. The overall goal for this piece is to discuss risk managements involvement in the handling of infectious waste and the protection of private health information by assessing the role of a risk manager, the objectives set forth for a risk management team, and by reviewing the training provided to employees.…

    • 1462 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    This is my report on why I believe that it is important to protect our Windows and Unix/Linux servers from known vulnerabilities. As I am sure you know, there are many different types of attacks on servers/network systems today. Throughout this report, I will illustrate a few of the more recently known/discovered vulnerabilities on both the Windows and Unix/Linus servers.…

    • 571 Words
    • 3 Pages
    Good Essays