Saturday, January 4, 2020
Threats And Vulnerabilities Of Itrust - 919 Words
When discussing the threats and vulnerabilities of iTrust, it is important to identify the security measures to potentially rectify or prevent additional security issues. The iTrust database application presented quite a few threats and vulnerabilities. One threat discussed is the threat of a facility not having the proper equipment needed to run a secure organization. For proper security, an organization may need to invest in equipment or devices that are more secure out-of-the-box. This means that computers and/or devices that are straight out-of-the-box are deemed to be more secure in comparison to a computer/device that have been used. In many cases, though the computer/device may have been swiped clean, it poses a much greater threat if the system was susceptible to certain vulnerabilities before. In addition, with these secure out-of-the-box systems it is important to verify proper installation. Organizations need to be sure that third-party vendors are completely authorized to assure the information that is being installed and updated is secure in the hands of vendors/suppliers. Another issue that needs addressing when it comes to security is the configuration that is established in iTrust. The iTrust organization has an issue with user access. When discussing user access configuration, an organization may want to analyze possible configuration management. This would entail having a server administrator that would monitor the content in a repository. In thisShow MoreRelatedData Within The Electronic Health Record ( Ehr ) Essay1857 Words à |à 8 PagesiTrust is a patient centric application that is designed to assist patients and health care providers in maintaining individualââ¬â¢s health related data within the electronic health record (EHR). Patientsââ¬â¢ health records are a great target for many attackers because they contain sensitive data. The main goal of iTrust is to create a system that centralizes medical information of a patient from many sources in order to provide a summary of health records in a way that is useful to health care profess ionalsRead MoreCSEC630 Team Assig met iTrust 1337 Words à |à 6 Pagescrucial aspects of developing and designing a medical database that stores, tracks, audits, and maintains patientââ¬â¢s medical data. Weââ¬â¢ll analyze and discuss the security threats and Vulnerabilities of the ITrust database (medical database). The document will identify security measures which address the threats and vulnerabilities found during the analysis phase. A deep dive will be done to the companyââ¬â¢s security policies and suggestions made to strengthen its security. Table discussion The teamRead MoreTeam Assignment Essay5619 Words à |à 23 Pagesen by: à à à à à à à à à à à à à à à à à à à à à à à à à à à Kevin Alton, Nadia Iqbal, and Alex Polevoy à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à à July 2015 Table of Contents Introduction.â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦.3 Section I: iTrust Threats amp; Vulnerabilities and Countermeasures.â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..3 Section II: Recommended Changes to Security Management Policiesâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦...â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦..7 Section III: Adaption of Requirements to Reduce Security Riskâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦.â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦....â⬠¦......11 Conclusion. â⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.