Topic Area: Cyber Threats, Vulnerabilities and Attacks
Read the below article and provide an article review using the template at the bottom.
Use the attachment Article Review Template as a guide for the discussion forum:
- You must copy the content directly into the forum – if you do not you will receive a zero grade.
Participants must create a thread in order to view other threads in this forum. Post by the end of Wednesday to allow other students to read your threat and provide comments.
Your main post should be a minimum of 250 words. Make sure your peer discussion address some of the terms and concepts presented in the course with a minimum of 100 words.
Please respond to at least two learners. Your responses should be substantive (minimum of 100 words) and do at least one of the following:
- Ask a probing question.
- Offer a suggestion.
- Elaborate on a particular point.
- Provide an alternative opinion.
Responses to peers such as “I agree with your point”, or responses that are not substantive and at the Graduate level will not receive maximum points.
In your responses, reference the assigned readings and other theoretical, empirical, or professional literature as needed to support your views and writing.
A new medium-sized health care facility just opened, and you are hired as the CIO, the CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation as well to make sound decisions. The concern is user authentication and credentials with third-party applications which is common in the health care industry.
You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your document be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them).
The CEO has provided the attached article as a reference.
- Explain why the other threat models are not ideal (compare and contrast)
- Provide one recommendation with summary and UML diagram
- Must be in full APA
- 3-page minimum not including the title page, abstract and references.