100% (1)
Pages:
2 pages/≈550 words
Sources:
2
Style:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.8
Topic:

Telecommunication and Network Security

Essay Instructions:

The following two examples demonstrate how risk assessment can be conducted in certain situations. Read briefly to get some basic ideas.

NIST (2010). Piloting Supply Chain Risk Management Practices for Federal Information Systems.

CDS Case Study. Making Information Risk Mitigation Decisions. Vincent Larcote Case Series. Case #6-0029. Center for Digital Strategies. Tuck School of Business at Dartmouth.

Practicing risk assessment foundamentals, processes and matrixes to one's own experiences offers an opportunity to apply the learning in the real world. Can you choose a particular information system security domain of your organization or industry and apply what you learned from the case readings and SLP examples? You can choose to assess comprehensively, or you can choose not to cover all the aspects of risk assessment but to focus on two or three major perspectives and go much more in depth.

Assignment:

Please write a 2-5 page paper titled:

"Risk Assessment for ______ (your chosen information system security domain in your chosen organization/industry): Challenges and Solutions"

Expectations:

Please address the following issues:

1. Special requirements of risk assessment in your chosen information system security domain in your chosen organization/industry if there are any.

2. Two or three major perspectives of risk assessment that you choose to go in depth to discuss.

3. One or two major lessons learned from the examples that you'd like apply in your own risk assessment issue here.

4. Key challenges and solutions of risk assessment.

Your paper will also be evaluated on the following criteria:

- Precision: You carried out the exercise as assigned, or carefully explained the limitations that might have prevented your completing some parts (running out of time isn't generally considered an adequate limitation).

- Clarity: Your answers are clear and show your good understanding of the topic.

- Breadth and Depth: The scope covered in your paper is directly related to the questions of the assignment and the learning objectives of the module.

- Critical thinking: The paper incorporates YOUR reactions, examples, and applications of the material to business that illustrate your reflective judgment and good understanding of the concepts.

Overall quality: Your paper is well written and the references, where needed, are properly cited and listed.

Essay Sample Content Preview:

Telecommunication and Network Security
Name:
Institution:
At the moment there are 10 domains that have been established, which are the foundation of the security detail within any of the organizations of any field. This is especially if they deal with sensitive information, of either their clients or regarding the organization's operations (Magee, 2011).
Among the ten domains, is the telecommunication and network security, which is a backbone in all organizations. It majorly refers to the network structures, data transportation, communication modes and the various measures that can be taken to secure the data transmission within and without the organization on a specific network.
The special risk assessment requirements of the domain in a hospital are the level of confidence that the domain offers, integrity and availability on the network in place.
One of the main perspectives that are used when assessing the risks posed to the telecommunication systems is on the security of network being used by the hospital (Cisco, 2013). This is a docket that involves policies and provisions the network administrator at the hospital has put in place to make sure that they prevent any form of data access, modification, misuse or otherwise. It is crucial that the network administrator maintains as much control of the network as possible (Magee, 2011). All the hospital personnel have to be assigned IDs, passwords or other authentication details that give them access to the patients’ data on the network. Depending on the level of clearance and the sensitivity of the data that the personnel at the hospital want to access, there are two types of authentication. Where the data is not as sensitive, such as the patient’s medical records, the authentication factor is usually one factor, meaning the personnel only requires the ID and the password to access the data. However, if the information is too sensitive and requires higher level clearance, then a two factor authentication is required, where over and above the ID and password, the personnel will be required to produce a tag number (Cisco, 2013). Highly sensitive data may require the personnel to authenticate the access using the three factor authentication protocol, where they may be required to use the finger print scanner or the retinal scanner. This last level is mostly limited to a few persons in the hospital ranks, especially at the administrative level.
The other perspective of this domain is the internet security (Cisco, 2013). This is common especially if the network the hospital is using is connected to the internet. Bearing in mind that the internet is a global community, it is important that there is restriction as to who can access the data. Some of the most prevalent risks that are associated with the internet security a...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Sign In
Not register? Register Now!