1. Assets: a. Patient records b. Database systems c. Website d. Email Communication e. Booking Portal...
Question:
1. Assets:
a. Patient records
b. Database systems
c. Website
d. Email Communication
e. Booking Portal
f. Electronic Health Equipment
g. Network Infrastructure
2. Threats to the above assets are:
a. Patient records
- Hacking of data from an unauthorized user (hacker)
- Data Theft demanding the healthcare organization for money
b. Database systems
- Unauthorized Access to the database
- Malware Infiltration causing the system to be more vunerable
c. Website
- Unauthorized Access to the website
- Denial of Service Attack leading the website to be unaviable by overloading the site with unwanted traffic
d. Email Communication
- Phishing Attacks luring workers into responding to the email and revealing confidential information (Scholl, 2022).
- Spam Emails leading sending of unwelcome mass commercial emails.
e. Booking Portal
- Malware Infiltration leading the system to various malware attacks
- Unauthorized Access allowing unauthorized external users to access the system(Staff, 2020).
f. Electronic Health Equipment :
- Physical Damage to the equipments
- Software Malfunction leading to the malfunction of the health equipments
g. Network Infrastructure :
- DDoS Attacks leading the network to jam and shut with unwanted traffic of packets.
- Human error and unauthorized attacks
3. Vulnerabilities:
a. Patient records:
- Insecure Storage of Data causing the data to be easily theft.
- Lack of encryption and authentication protocols allowing unauthorized user to get access.
b. Database systems :
- Lack of Security Patches and Updates opening a pathway for malicious activity in the database.
- Poor Firewall Configuration helping the entry of malware and unauthourized users.
c. Website :
- Weak or No SSL Implementation
- Inadequate Input Validation
d. Email Communication :
- Unencrypted Messages
- Low Level Authentication Protocols leading the pathway for spam and phishing
e. Booking Portal :
- Lack of Multi-factor Authentication
- Poor User Access Control Protocols
f. Electronic Health Equipment :
- Lack of Security Updates
- Poor Physical Security Measures
g. Network Infrastructure:
- Weak or No Encryption Protocols,
- Poor Firewall Configuration
4. Countermeasures:
a. Patient records :
- Implement Encryption and Authentication Protocols
- Train Employees on Data Protection Policies
b. Database systems
- Implement Regular Security Patches and Updates,
- Strengthen Firewall Configuration
c. Website
- Use SSL Certificates
- Enhance Input Validation
d. Email Communication
- Use Encrypted Messages
- Enhance Authentication Protocols
e. Booking Portal :
- Implement Multi-factor Authentication
- Strengthen User Access Control Protocols
f. Electronic Health Equipment :
- Install Security Updates Regularly
- Improve Physical Security Measures
g. Network Infrastructure:
- Employ Strong Encryption Protocols
- Configure Robust Firewall Protection
Can you please help me to develope a tva worksheet for the above assets, threats and vunerabilities. Also, calculate the risk rating of each of the five triplets out of 25.
Income Tax Fundamentals 2013
ISBN: 9781285586618
31st Edition
Authors: Gerald E. Whittenburg, Martha Altus Buller, Steven L Gill