Threat Modeling ( minimum 4 pages without title and references)

 Threat Modeling
A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this weeks readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In  research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them. paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques

Cloud Infrastructure

 

The leadership team of the IT Guru corporation would like to see some of their employees get published in trade journals to help promote the credibility and professionalism of the organization. As the senior network administrator you have been asked to submit an article to the “Cloud Brokers” trade journal and discuss your thoughts and research on the following 4 questions:

  1. What should someone consider when defining their strategies for their specific cloud configuration?
  2. What are the components of cloud architecture today and how might this change in the future?
  3. Are there any specific network configuration management practices you would recommend for a cloud computing environment?
  4. What advice would you offer to someone considering offering a database storage solution via a cloud platform?
  5. What are the ethical, legal, and professional responsibilities association with cloud-based systems? Consider societal and global impacts in your paper.