Computer security for a hospital that was hacked and remediation.

Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.

GET A 40% DISCOUNT ON YOU FIRST ORDER

ORDER NOW DISCOUNT CODE >>>> WELCOME40

Need a writer to read the attached technical writing and create an executive summary that correlates with the writing and outlines the following about the writing.
1.
1) Executive summary  should be a 2-3-pages
This is an executive summary that should summarize and persuade executives to take action.
Provide recommendations for access control and authentication mechanisms to increase the security within the identity management system. Review the mission and organization structure of this healthcare organization. Review the roles within the organization, and recommend the accesses, restrictions, and conditions for each role. Present these in a tabular format as part of your list of recommendations.
Provide a comparison of risk scenarios to include the following:
1.    What will happen if the CIO and the leadership do nothing, and decide to accept the risks?
2.    Are there possible ways the CIO can transfer the risks?
3.    Are there possible ways to mitigate the risks?
4.    Are there possible ways to eliminate the risks?
5.    What are the projected costs to address these risks
The nontechnical presentation will identify compromises and vulnerabilities in the information systems infrastructure of the healthcare organization, and identify risks to the organization’s data. You will propose a way to prioritize these risks and include possible remediation actions.
The executive summary: In addition to your technical report, also create a nontechnical report as an executive summary.

  1. Executive summary: This should be a 2-3-page double-spaced Word document.

Provide recommendations for access control and authentication mechanisms to increase the security within the identity management system. Review the mission and organization structure of this healthcare organization. Review the roles within the organization, and recommend the accesses, restrictions, and conditions for each role. Present these in a tabular format as part of your list of recommendations.
Provide a comparison of risk scenarios to include the following:

  1. What will happen if the CIO and the leadership do nothing, and decide to accept the risks?
  2. Are there possible ways the CIO can transfer the risks?
  3. Are there possible ways to mitigate the risks?
  4. Are there possible ways to eliminate the risks?
  5. What are the projected costs to address these risks?

Provide an overall recommendation, with technical details to the director of IT.
 
1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.

  • 2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.
  • 6.2: Creating a roadmap for organizations to use in development of an Identity Access Management program (to address gaps in their current offerings).

 

Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.

GET A 40% DISCOUNT ON YOU FIRST ORDER

ORDER NOW DISCOUNT CODE >>>> WELCOME40

 

 

Posted in Uncategorized