[Instant Help From 10$/Pg] Application Domainremote Access Domainreferencesyour
Instructions The purpose of this assignment is to allow you to examine the risks within the seven information technology (IT) domains and what law would be applicable for the scenario. This also reinforces the CIA triad of protecting information data for personnel and the organization.You are a security consultant hired by the CSU Medical Hospital to provide a security assessment report on the hospital’s seven IT domains. Your report should include the following.
- Provide a description of which regulatory law must be followed to remain compliant.
- Explain how the CIA triad affects the patient’s personal information and the hospital access of information.
- Describe the risks and mitigations that could be encountered with each of the seven IT domains.
Use the following format for your report:
Save your time - order a paper!
Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlinesOrder Paper Now
- Title page
- Regulatory Law Description
- Effects of CIA Triad
- Patient Information
- Hospital Information Access
- Risks from the Seven IT Domains
- User Domain
- Workstation Domain
- LAN Domain
- LAN-to-WAN Domain
- WAN Domain
- System/Application Domain
- Remote Access Domain
Your assignment must be at least two pages in length. You must use at least three sources for your assignment, two of which must be found in the CSU Online Library. Your assignment, including in-text citations and references, must be in APA style.
Question 2. Identify at least two vulnerabilities on your home computer and share them with your peers. Explain how you have/will mitigate those vulnerabilities.
Question 3. You are a risk management coordinator hired to help the company maintain compliance with laws and regulations. As the coordinator, you are tasked to ensure that the five fundamental components of the IT risk management plan are documented in the plan. Which of the five fundamental components do you think would be the most difficult to document? Why? Defend your answer.