Description
Threat Modeling
A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:
- User authentication and credentials with third-party applications
- 3 common security risks with ratings: low, medium or high
- Justification of your threat model (why it was chosen over the other two: compare and contrast)
You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Explanation & Answer

Please view explanation and answer below.Thank you for trusting me with your work. I can do more than that if you trust me with more. kindly review the work and give me a positive review and a tip if possible. thank you in advance.
1
Threat Modeling
Students Name
Institutional Affiliation
Course
Instructor
Due date
2
Threat Modeling
Introduction
Threat modeling is a strategy used to control and evaluate risks. It identifies potential
threats and develops procedures or tests to detect and respond to those threats. The process
involves understanding how threats impact systems and applying appropriate measures to
counter them. Threat modeling helps security teams to prioritize threats and ensure that resources
and attention are effectively distributed; thus, it can be prioritized during the planning and
implementation of security to make sure solutions are effective (Ofori & Islam, 2019). Threat
modeling can help the security team ensure that their protections align with any threat that
evolves. That is possible when threat modeling is done routinely. It is also advantageous when
adopting new software's since it helps the team understand how tools and applications are
exposed to threats compared to the protection offered. Threat modeling helps understand where
security is lacking when adapting tools. Below are common security risks.
We have come across or been told about computer viruses, and I am sure we all fear
them. They are one of the most common threats and are rated high, with approximately 33% of
household computers affected. They are pieces of software designed and spread from one
computer to the other. Mostly they com...

Review
Review




24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!






Similar Content
Related Tags
Big Little Lies
by Liane Moriarty
Othello
by Wiliam Shakespeare
What Happened
by Hillary Clinton
Pride and Prejudice
by Jane Austen
The Chosen
by Chaim Potok
The Underground Railroad
by Colson Whitehead
Cry the Beloved Country
by Alan Paton
Rules Of Civility
by Amor Towles
The Atlantis Gene
by S. A. Beck






