Question: You have been hired as a Security Consultant to develop and deliver a 1000 word summary report to the Chief Information Security Officer of a

 You have been hired as a Security Consultant to develop and

You have been hired as a Security Consultant to develop and deliver a 1000 word summary report to the Chief Information Security Officer of a UK Healthcare provider: The Mary Seacole Hospital. You are required to demonstrate your practical understanding of cyber security attacks and potential adversaries through undertaking an investigation to identify vulnerabilities and potential security threats to host computer systems and supporting networks within the organization. Also, to establish different technologies that would constitute security mechanisms at various levels in a digitally networked environment. Your tasks during this assessment are to identify, determine and summarize host computer and network infrastructure (IT assets) and information (data assets) used within the organization. You are to create an Asset Register for these assets and conduct a Risk Assessment using an industry standard approach to identify potential threats to these mission critical assets of the Hospital. These documents should be added appropriately as Appendices to your main report. A fundamental part of this investigation will be to conduct systems penetration testing using Coventry University applications to emulate some of the systems identified within the Hospital*; produce a professional penetration test report using an industry standard penetration testing methodology and report format. The report of test results will be added as an Appendix to your Summary Report as evidence of existing vulnerabilities. The penetration tests will be conducted against a range of the technologies identified within the Mary Seacole Hospital Case Study to demonstrate vulnerabilities and present the findings as examples of why it will be necessary for the Chief Information Security Officer to act expeditiously to secure systems with high levels of risk established in your report. This action must be taken swiftly in order to protect the Hospital from potential Cyber Attacks against their systems. *NB. Under no circumstances should penetration testing be conducted against any real-world organisation during your work. This activity is illegal and will lead to disciplinary action also potentially lead to prosecution

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!