RISK ANALYSIS (RISK MANAGEMENT PLAN)

Require a PPT and APA formatted document. Use the RISK MANAGEMENT PLAN template to create the document and follow the Project template to create PPT

HLD is provided in Project Health Network Visual

Residency Written Assignment Instructions

Overview

As discussed in this course, risk management is an important process for all organizations. This is particularly true in information systems, which provides critical support for organizational missions. The heart of risk management is a formal risk management plan. The project activities described in this document allow you to fulfill the role of an employee participating in the risk management process in a specific business situation.

Submission Requirements 

All project submissions should follow this format: 

· Format: Microsoft Word 

· Cover page with all group members names

· Minimum 8 pages (not including reference page(s), or title page)

· Table of contents page

· Font: Arial, 10-point, double-space 

· APA Citation Style 

Scenario 

You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a co-location data center, where production systems are located and managed by third-party data center hosting vendors.

Company Products 

Health Network has three main products: HNetExchange, HNetPay, and HNetConnect. 

HNetExchange is the primary source of revenue for the company. The service handles secure electronic medical messages that originate from its customers, such as large hospitals, which are then routed to receiving customers such as clinics.

HNetPay is a Web portal used by many of the company’s HNetExchange customers to support the management of secure payments and billing. The HNetPay Web portal, hosted at Health Network production sites, accepts various forms of payments and interacts with credit-card processing organizations much like a Web commerce shopping cart. 

HNetConnect is an online directory that lists doctors, clinics, and other medical facilities to allow Health Network customers to find the right type of care at the right locations. It contains doctors’ personal information, work addresses, medical certifications, and types of services that the doctors and clinics offer. Doctors are given credentials and are able to update the information in their profile. Health Network customers, which are the hospitals and clinics, connect to all three of the company’s products using HTTPS connections. Doctors and potential patients are able to make payments and update their profiles using Internet-accessible HTTPS Web sites.

Information Technology Infrastructure Overview 

Health Network operates in three production data centers that provide high availability across the company’s products. The data centers host about 1,000 production servers, and Health Network maintains 650 corporate laptops and company-issued mobile devices for its employees. 

Additional Information

– Server breakdown

o 100 Windows Server 2008 

o 900 Windows Server 2016

– Laptop breakdown

o 500 Windows 10

o 50 Windows XP

o 100 Linux

Deliverables

Graded Deliverable 1

As a group, develop the following:

1. A risk management plan to include the following sections:

1. Use the template provided

2. Must include all sections identified in the template

3. Must include at least 20 identified risks

4. Must include a list of at least 40 “mitigating” controls in place and identify what asset they apply to

5. Must write mitigation plans for the top 10 risks

Graded Deliverable 2

2. A presentation to include

1. A description of the top 5 risks you identified for Health Network

2. The reason why you ranked these as the top 5 risks

3. An explanation of each risk

4. The controls currently in place to mitigate the risk

5. The proposed mitigation plan to reduce the risk

Final Plan

Create a 9- to 12-page final plan for Great Day Fitness Tracking in Microsoft® Word.

Your final plan should:

Explain the relationship between processes and information systems, including a flowchart and a discussion of security ethical concerns. (Week 1)

Describe the plan to select the appropriate hardware and software and the different approaches for managing data. (Week 2)

Explain the benefits of using transaction processing systems, customer relationship systems, and supply chain management. (Week 2)

Describe the potential benefits of using business intelligence. (Week 3)

Describe the information systems plan and potential methodologies. (Week 4)

Describe the used utility and cloud computing services and how these services might replace or augment the initial system design. (Week 6)

Describe a high-level, 3-year strategic plan for your information solution. (Week 6)

Note: You may include graphs, tables, and diagrams in addition to your summaries for each week’s content.

yahoo cyber attack 2016

 Discuss in your paper the specifics of the attack and how it negatively affected the organization. Make sure you site your source and use in-text citations. 

Topic is Yahoo Cyber attack on 2016.

4 pages must. APA format and No Plagiarism 

Instructions:

 

1. Use other literature reviews and articles as a guide quotation: Quotations should generally not be used

2. Voice: Avoid 1st Person

3. Avoid Slang; Use Professional Language

4. Organize the Paper by Topics not Chronology

5. Be Concise. Delete unnecessary words, phrases, and sentences to drastically improve your writing. Scientific writing is concise and to-the-point!

6. Revise and Rewrite as necessary

7. Citations: It is imperative that you use good citation habits. It is plagiarism to use other writers’ words and ideas. Reword it if used in your research and apply the necessary in-text citation

8. All writing assignments will adhere to the APA writing style. Additional information on APA is available in the University website and in week 8 content folder.

BSWP Week 5

  

Learn About creating good password security.

An IT Security consultant has made three primary recommendations regarding passwords:

1. Prohibit guessable passwords

· such as common names, real words, numbers only

· require special characters and a mix of caps, lower case and numbers in passwords

2. Reauthenticate before changing passwords

· user must enter old pw before creating new one

3. Make authenticators unforgeable 

· do not allow email or user ID as password

Using WORD, write a brief paper of 200-300 words explaining each of these security recommendations. Do you agree or disagree with these recommendations. Would you change, add or delete any of these? Add additional criteria as you see necessary.

Regular Expressions – Basic,UNIX, XML, and SQL

What is the importance of regular expressions in data analytics? Also, discuss the differences between the types of regular expressions.Choose two types of regular expressions and discuss the differences between the two. Please be sure to include two or three differences for each. Include how they help manipulate data. 

CS

Note: Plagiarism check

 In your own words, explain what the following terms mean to you as they apply to information security and safe computing: Confidentiality, Integrity, and Availability. Why are these factors so important to businesses? 

 

  • 2.1 What are the essential ingredients of a symmetric cipher?
  • 2.2 What are the two basic functions used in encryption algorithms?
  • 2.3 How many keys are required for two people to communicate via a symmetric cipher?
  • 2.4 What is the difference between a block cipher and a stream cipher?
  • 2.5 What are the two general approaches to attacking a cipher?
  • 2.6 Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?
  • 2.7 What is triple encryption?
  • 2.8 Why is the middle portion of 3DES a decryption rather than an encryption?

CY10-P

Face recognition biometric techniques and explain the benefits and the  vulnerabilities associated with that method in 3-4 paragraphs.

Flight Sim review

 Topic: SIMLAT review

Type of paper: Flight Sim review

Discipline: Computer science : Technical Writing

Format or citation style: APA