Question: 1. Assets: a. Patient records b. Database systems c. Website d. Email Communication e. Booking Portal f. Electronic Health Equipment g. Network Infrastructure 2.

1. Assets:

 

a. Patient records
b. Database systems
c. Website
d. Email Communication
e. Booking Portal
f. Electronic Health Equipment
g. Network Infrastructure


2. Threats to the above assets are:


a. Patient records 

  • Hacking of data from an unauthorized user (hacker)
  • Data Theft demanding the healthcare organization for money


b. Database systems 

  • Unauthorized Access to the database
  • Malware Infiltration causing the system to be more vunerable

 

c. Website 

  • Unauthorized Access to the website
  • Denial of Service Attack  leading the website to be unaviable by overloading the site with unwanted traffic


d. Email Communication 

  • Phishing Attacks luring workers into responding to the email and revealing confidential information (Scholl, 2022).
  • Spam Emails leading sending of unwelcome mass commercial emails.

 

 

 

e. Booking Portal 

  • Malware Infiltration leading the system to various malware attacks
  • Unauthorized Access  allowing unauthorized external users to access the system(Staff, 2020).

 


f. Electronic Health Equipment :

  • Physical Damage  to the equipments
  • Software Malfunction   leading to the malfunction of the health equipments


g. Network Infrastructure :

  • DDoS Attacks leading the network to jam and shut with unwanted traffic of packets.
  • Human error and unauthorized attacks

 

 


3. Vulnerabilities: 


a. Patient records:

 

  • Insecure Storage of Data causing the data to be easily theft.
  • Lack of encryption and authentication protocols allowing unauthorized user to get access.


b. Database systems : 

 

  • Lack of Security Patches and Updates opening a pathway for malicious activity in the database.
  • Poor Firewall Configuration helping the entry of malware and unauthourized users.

 
c. Website :

 

  • Weak or No SSL Implementation
  • Inadequate Input Validation


d. Email Communication :

 

  • Unencrypted Messages
  • Low Level Authentication Protocols leading the pathway for spam and phishing

 

 
e. Booking Portal :

 

  • Lack of Multi-factor Authentication
  • Poor User Access Control Protocols

 


f. Electronic Health Equipment :

 

  • Lack of Security Updates
  • Poor Physical Security Measures


g. Network Infrastructure:

 

  • Weak or No Encryption Protocols,
  • Poor Firewall Configuration


4. Countermeasures: 


a. Patient records :

 

  • Implement Encryption and Authentication Protocols
  • Train Employees on Data Protection Policies

 
b. Database systems 

 

  • Implement Regular Security Patches and Updates,
  • Strengthen Firewall Configuration


c. Website 

 

  • Use SSL Certificates
  • Enhance Input Validation

 

d. Email Communication 

 

  • Use Encrypted Messages
  • Enhance Authentication Protocols

   
e. Booking Portal :

 

  • Implement Multi-factor Authentication
  • Strengthen User Access Control Protocols


f. Electronic Health Equipment :

 

  • Install Security Updates Regularly
  • Improve Physical Security Measures


g. Network Infrastructure:

 

  • Employ Strong Encryption Protocols
  • Configure Robust Firewall Protection

 

 

Can you please help me to develope a tva worksheet for the above assets, threats and vunerabilities. Also, calculate the risk rating of each of the five triplets out of 25.

 

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!