Question

Describe five vulnerabilities associated with the IT system as described and before security controls are implemented....

Describe five vulnerabilities associated with the IT system as described and before security controls are implemented.

(a) Based on possible Threat Actors, briefly describe a risk associated with each of these vulnerabilities; using a scale of 1 - 5, assign a Probability of Occurrence and Consequence of Occurrence to each risk.

(b) For each of these risks, identify a feasible risk treatment (risk reduction, transference, avoidance, or acceptance) with a short rationale for each.


(c) Assume a risk has been identified resulting from a vulnerability in the system that manages the Patient Information Database. The estimated cost to restore the database if it is entirely lost or corrupted is assessed as $1M, and the economic damage due to patients and doctors moving to other hospitals is estimated to be an additional $1M. Based on published information on cyber attacks in the health care industry, the estimated number of successful attacks based on exploitation of the vulnerability is four (4) per year, and each successful attack is estimated to cost the hospital 5% of the estimated total potential loss. Further assume that a commercial product has been identified that will reduce the loss from a breach by a factor of ten (10) to 0.5% of the total. What is the maximum annual total cost for this product to achieve a positive return on the investment to procure it (i.e., a positive Control Value)?


Homework Answers

Answer #1

Part a).

Vulnerabilities before security controls were executed:

·       Hazard or danger of vindictive assaults on the system:

·       No security for information/data from burglary

·       Danger of being hacked

·      Unapproved access to the system

Part b).

Vulnerability:

·      Hazard or danger of vindictive assaults on the system

Risk associated: 4 out of 5.

Probability of Occurrence: LOW

Consequence: Loss of data, system failure, etc.

·      No security for information/data from burglary.

Risk associated: 5 out of 5.

Probability of Occurrence: High

Consequence: Data leaked, information loss, etc.

·      Danger of being hacked.

Risk associated: 4 out of 5.

Probability of Occurrence: Very high

Consequence: Information loss, financial loss, etc

·      Unapproved access to the system.

Risk associated: 2 out of 5.

Probability of Occurrence: Medium

Consequence: Privacy compromised.

·      No security from the programs that could be tainted

Risk associated: 3 out of 5.

Probability of Occurrence: Low

Consequence: Bugs, slow network, or system.

Part c).

Hazard or danger of vindictive assaults on the system.

·      Risk reduction: Using a security system such as firewall (It will provide the layer of protection), defragmentation (Keeping information in fragments make it hard to) etc.

·      Transference & Avoidance: Proper security measure is the only solution, such as malware, spyware etc.

·      Acceptance: It can't be accept as it is a serious threat

No security for information/data from burglary.

·      Risk reduction: Using a security system such as firewall (It will provide the layer of protection), defragmentation (Keeping information in fragments make it hard to steal) etc.

·      Transference & Avoidance: Proper security measure is the only solution

·       Acceptance: It can't be accept as it is a serious threat.

Danger of being hacked.

·      Risk reduction: Using a security system such as firewall (It will provide the layer of protection, and make hard to hack a system), defragmentation (Keeping information in fragments make it hard to) etc.

·      Transference & Avoidance: Using proper security measure is a good solution.

·      Acceptance: It can not be accept, it need to reduce or eliminate completely

Unapproved access to the system.

·      Risk reduction: Using proper security measure is a good solution.

·      Transference & Avoidance: Firewall, proper security system can be used.

·       Acceptance: It is not that dangers, but it cant be accepted as it can compromise the privacy.

No security from the programs that could be tainted

·      Risk reduction: Time to time scan, preventive measure is fine solution.

·      Transference & Avoidance: Time to time scan can reduce this risk

·       Acceptance: It cannot be accept, it need to reduce or eliminate completely, as it could freeze the system.

Part d).

Maximum annual cost can't be determined as it depend upon the hospital total budget, size of the hospital, and size of network hospital is using and security the have implement to deal with it, albeit no matter the cost, it will always going to be less than the loss occur in case of cyberattack, so it a necessary investment need to make, just like a insurance.

Explanation:

Part a).

Vulnerabilities before security controls were executed:

·       Hazard or danger of vindictive assaults on the system: This can lead to loss of data, and system failure.

·       No security for information/data from burglary: this can leads to Data leaked which might affect the companies growth

·       Danger of being hacked: It a serous threat can cause big information loss, financial loss etc.

·       Unapproved access to the system: A user privacy can get compromise.

No security from the programs that could be tainted: It could stop the system from functioning.

Part b).

Part c).

Part d).

Greatest yearly expense can't be resolved as it rely on the emergency clinic all out financial plan, size of the medical clinic, and size of system emergency clinic is utilizing and security the have actualize to manage it, but regardless of the cost, it will continually going to be not exactly the misfortune happen if there should arise an occurrence of cyberattack, so it a vital speculation need to make, much the same as a protection.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
The estimated cost to restore the database if it is entirely lost or corrupted is assessed...
The estimated cost to restore the database if it is entirely lost or corrupted is assessed as $1M, and the economic damage due to patients and doctors moving to other hospitals is estimated to be an additional $1M. Based on published information on cyberattacks in the health care industry, the estimated number of successful attacks based on exploitation of the vulnerability is four (4) per year, and each successful attack is estimated to cost the hospital 5% of the estimated...
The estimated cost to restore the database if it is entirely lost or corrupted is assessed...
The estimated cost to restore the database if it is entirely lost or corrupted is assessed as $1M, and the economic damage due to patients and doctors moving to other hospitals is estimated to be an additional $1M. Based on published information on cyberattacks in the health care industry, the estimated number of successful attacks based on exploitation of the vulnerability is four (4) per year, and each successful attack is estimated to cost the hospital 5% of the estimated...
Delta airlines case study Global strategy. Describe the current global strategy and provide evidence about how...
Delta airlines case study Global strategy. Describe the current global strategy and provide evidence about how the firms resources incompetencies support the given pressures regarding costs and local responsiveness. Describe entry modes have they usually used, and whether they are appropriate for the given strategy. Any key issues in their global strategy? casestudy: Atlanta, June 17, 2014. Sea of Delta employees and their families swarmed between food trucks, amusement park booths, and entertainment venues that were scattered throughout what would...
In February 2012, the Pepsi Next product was launched into the US market. This case study...
In February 2012, the Pepsi Next product was launched into the US market. This case study provides students with an interesting insight into PepsiCo’s new product process and some of the challenging decisions that they faced along the way. Pepsi Next Case Study Introduction Pepsi Next was launched by PepsiCo into the US market in February 2012, and has since been rolled out to various international markets (for instance, it was launched in Australia in September 2012). The new product...
Please read the article and answear about questions. Determining the Value of the Business After you...
Please read the article and answear about questions. Determining the Value of the Business After you have completed a thorough and exacting investigation, you need to analyze all the infor- mation you have gathered. This is the time to consult with your business, financial, and legal advis- ers to arrive at an estimate of the value of the business. Outside advisers are impartial and are more likely to see the bad things about the business than are you. You should...
Discuss ethical issues that can be identified in this case and the mode of managing ethics...
Discuss ethical issues that can be identified in this case and the mode of managing ethics Enron finds itself in this case. How would you describe the ethical culture and levels of trust at Enron? Provide reasons for your assessment. THE FALL OF ENRON: A STAKEHOLDER FAILURE Once upon a time, there was a gleaming headquarters office tower in Houston, with a giant tilted "£"' in front, slowly revolving in the Texas sun. The Enron Corporation, which once ranked among...