Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. 

Organization leader and decision making – Discussion

Note : Please answer below 3 questions and APA 7 format 

After completing the reading this week, we reflect on a few key concepts this week:

  1. Discuss what ethical leadership is and how it impacts the organizational culture.
  2. What are the various dimensions of ethical leadership?
  3. Note some failures in ethical leadership, please find an example, explain the failure and note possible solutions to fix the issue with leadership.

Please be sure to answer all the questions above in the initial post.Please ensure the initial post and two response posts are substantive.  Substantive posts will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Expand on the topic, by adding additional thoughtful information
  • Answer a question posted by another student in detail
  • Share an applicable personal experience
  • Provide an outside source
  • Make an argument

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread.  Please ensure to use information from your readings and other sources from the UC Library.  Use APA references and in-text citations. 

 Required Reading

Optional Resources:Chapter 5 Journal articles

RM -10

 Read the attached NIST Documents 800-37 and 800-39. Compare and contrast informal vs formal risk management in todays digital infrastructures.  Explain the consequences of not formalizing risk management.  Also, how is information security integrating into system development life cycle?  Why is this important to risk management?  Finally, explain how risk management helps establish, risk capacity, risk tolerance, and risk appetite.  What are the differences between the latter three?  What is accomplished by knowing their metrics?   

Access Control Plan

Access controls provides the ability allow or deny access to critical information and devices on a network. Access controls can be physical, or logical.

In a 500- to 750-word essay, develop a plan for implementing access control models in an enterprise based on the principles of least privilege. Make sure to address the following:

  1. Which of the elements of access control would you use in your plan? Would you use them all? Why?
  2. What are some of the best practices concerning access control? For example, multi-factor authentication or bio-metrics.
  3. Defend the strategy for your plan.

Block Chain Development discussion 7

This week’s reading discussed the current state of blockchain technology and suggested what the technology may look like in the near future. The author provided several suggestions that would increase blockchain’s value to the enterprise. Create a new thread and choose whether you would consider interoperability or scalability to be more important to blockchain’s future. Explain your decision and use examples from Chapter 12. Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read or videos you watched from this week’s assigned activities. You’re not trying to test each other, but you are trying to start a discussion.

You must do the following:

1) Create a new thread. As indicated above, create a new thread, and choose whether you would consider interoperability or scalability to be more important to blockchain’s future. Explain your decision and use examples from Chapter 12. Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from the material you read or videos you watched from this week’s assigned activities. You’re not trying to test each other, but you are trying to start a discussion.

Forum: Week 2 Discussion

Discussion (Chapter 2): Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning.

Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion. Please engage early and often.

Your response should be 100-300 words. Respond to two postings provided by your classmates.

Infer Stats in Decision-Making (DSRT-734)

 

QUALITATIVE Journal Submit Article Reviews Here

You will review both quantitative and qualitative research.  The topic is Cyber Security or any Security IT-related and peer-reviewed, academic research piece.   Four pages requried and the paper should cover the basic guidelines.  Must submit original work and plagiarism should be less than 20%.

Please use APA formatting and include the following information:

  • Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate the article in terms of significance, research methods, readability and the implications of the results.  Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.) 
  • References   

Discussion and Assignment 7

Discussion:

Focus on some additional terms for IT users. Lets discuss what a community of practice is. Why are they important and how can they impact the culture within an organization?

Need 125 words on this topic with references and in a separate document.

Assignment 1 (Information Systems for Business and Beyond):

Q1::

If you were going to start a new technology business, which of the emerging trends do you think would be the biggest opportunity? Do some original research to estimate the market size.

Q2::

What privacy concerns could be raised by collaborative technologies such as Waze?

Q3::

Write up an example of how the Internet of Things might provide a business with a competitive advantage.

The above assignments should be submitted in a separate document with references.

Assignment 2:

Chapter 11 – Review the employment challenge in the digital era (as well as the entire chapter). Reflect on the various challenges are present in the digital era. Will things get better or more complicated as times goes on? Explain. What are some methods to assimilate new generations into the workforce to think about competitive advantage? (Information Technology and Organizational Learning)

The above submission should be one page in length and adhere to APA formatting standards with references included.

Both textbooks are included in the attachments.