Access over 20 million homework & study documents

Security Assesment Report Sar

Content type
User Generated
Subject
Computer Science
School
University of Maryland Global Campus
Type
Homework
Rating
Showing Page:
1/17
Running head: DFC 610 PROJECT 2 1
Security Assessment Report (SAR)
Student’s Name
Institutional Affiliation

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/17
DFC 610 PROJECT 2 2
Bellevue hospital, NY
Bellevue is a public hospital in New York located at kips bay in the neighborhood of
Manhattan and one of the oldest and the largest hospitals in the United States. It offers inpatient
and outpatient services, specialized care, nursing care, and emergency care services. The hospital
has a total staff of about 7,700 who serves 500,000 new patients annually. There is a great risk of
being exposed to data breaches with so much workforce unless secure data protection protocols
are installed.
Organization structure

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/17

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 17 pages?
Access Now
Unformatted Attachment Preview
Running head: DFC 610 PROJECT 2 1 Security Assessment Report (SAR) Student’s Name Institutional Affiliation DFC 610 PROJECT 2 2 Bellevue hospital, NY Bellevue is a public hospital in New York located at kips bay in the neighborhood of Manhattan and one of the oldest and the largest hospitals in the United States. It offers inpatient and outpatient services, specialized care, nursing care, and emergency care services. The hospital has a total staff of about 7,700 who serves 500,000 new patients annually. There is a great risk of being exposed to data breaches with so much workforce unless secure data protection protocols are installed. Organization structure DFC 610 PROJECT 2 Hospital organizations LAN Hospital organization WAN 3 DFC 610 PROJECT 2 4 Enterprise threats Threat intelligence is the information that is known and can be used by the data security department to mitigate cyber-attacks. Data threat intelligence uses a machine earning technology to automate both data collection and analysis and integrate them with the existing data solutions to determine IoCs and TTPS of threat actors (Koloveas et al., 2021) Internal threats are risks of people from inside a company or an organization who could intentionally or unintentionally exploit the system to damage, expose or steal confidential data. This type of threat comes in three ways which are • Malicious insider threat- The threat is caused by people working inside an organization or a company and take ad ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Just what I was looking for! Super helpful.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4