Business Case: Local Hospital’s data center

 

Companies spend billions on security each year, yet why is this still an issue? It’s almost 2019 and still, most applications are horribly insecure and security best practices are not followed. Applications are designed for functionality, not security because security is seen as difficult and time-consuming, often blamed for adding delays to product launches and revenue-generating activities. Assume; you are an IT manager at the regional Hospital and answer the following questions.

Where the Local Hospital’s parameters are: 600 patients a day, and 250 full-time employees. The hospital has a data cent with all IT assets (Databases, Servers, Data storage, Network devices) to support the Hospital’s Business operations.

Source: https://xypro.com/enterprise-identity-access-management/risk-management-in-the-real-world-today-tomorrow-and-beyond/Links to an external site.Links to an external site.

QUESTION 1: There is a need for a new posture for cybersecurity in a networked world where your hospital is part of it. What are principles used by some of the world’s leading cybersecurity teams at global companies to archive this goal?

How can you adapt the principles for your hospital case?

Resource: https://www.mckinsey.com/~/media/McKinsey/McKinsey%20Solutions/Cyber%20Solutions/Perspectives%20on%20transforming%20cybersecurity/Transforming%20cybersecurity_March2019.ashxLinks to an external site.Links to an external site.

QUESTION 2: Companies should assess threats and develop controls for the most critical assets.

If the threats against tour Hospital IT System are

Manipulation of software

Unauthorized installation of software

Misuse of information systems

Denial of service

What would be controls that you should apply to mitigate above listed risks?

Resurce : https://www.mckinsey.com/~/media/McKinsey/McKinsey%20Solutions/Cyber%20Solutions/Perspectives%20on%20transforming%20cybersecurity/Transforming%20cybersecurity_March2019.ashxLinks to an external site.Links to an external site.

QUESTION 3: As an IT manager, you were tasked to develop an information security and risk management (ISRM) strategy which requires a multiphase approach. What are the phases that would should follow to provide recognizable results and value to the Hospital?

Resources: https://www.isaca.org/resources/isaca-journal/past-issues/2010/developing-an-information-security-and-risk-management-strategy

 

Sample Solution

Homegrown regulations can be characterized as a set or arrangement of rules in which a nation perceives as it an administrative capability toward individuals from its general public which might be upheld using punishments. With the sole special cases of the Unified Realm, Israel and New Zealand, most different nations base their homegrown regulations on a solitary, classified report ensuring the chose freedoms of its residents and expressing the rules that everyone must follow. An illustration of a classified constitution is that of the US of America. The Joins States constitution is maybe the most renowned illustration of a classified constitution because of its unbending nature, particularly so despite large number of passings because of shootings the nation over, and the legislatures steady reluctance in canceling or correcting the Subsequent Revision Right To Remain battle ready. Indeed, even with basically overall judgment of their reluctance to cancel or change the subsequent revision, it is as yet holding areas of strength for up. The global local area has nothing to do with the homegrown laws of an administration as that would be considered as subverting the sway of a country.

The Unified Realm then again, don’t have a solitary systematized record. All things being equal, their “constitution” depends on various significant records that have been composed from the beginning of time. These records incorporate the Magna Carta of 1215, the Bill of Freedoms in 1689, the Common liberties Demonstration of 1998 and the Crown Demonstration of 2013 just to give some examples. Homegrown regulation is established by the 3 principal parts of government, to be specific the administrative, the legal executive as well as the chief. In the US, it is broadly acknowledged that established matchless quality is the best approach, while in the Assembled Realm, parliament rules. The Common freedoms Demonstration of 1998 is a significant type of global regulation that plainly characterizes the privileges of every individual resident in the Unified Realm, and is maybe the main cross-over of homegrown and worldwide regulation. Basically, this actually intends that on the off chance that someone in the UK feels as though their privileges have been disregarded, they can rather go to the European courts to pursue their case.

Worldwide regulation is characterized as a bunch of rules commonly viewed as restricting with regards to the connections between countries. The fundamental distinction between worldwide regulation and homegrown regulation is the way that global regulation isn’t generally so worried about individual freedoms, yet rather the connection between countries. Where homegrown regulations oversee the way of behaving of people inside the states, global regulation administers the way of behaving of the actual states. Worldwide regulation is shaped through the purposes of deals, shows, accords and arrangements instead of depending on a solitary authoritative body. Today nonetheless, there have been a development in global regulation to incorporate standards that oversee the freedoms of people too. This is known as Global Confidential Regulation. Worldwide confidential regulation as a rule manages individual contentions, for example, marriage and agreements questions, where theres either a decision or struggle of purview. The standards overseeing the direct of states falls under the domain of Public Worldwide Regulation. Supranational regulations are territorial worldwide regulations, an

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, Welcome to Compliant Papers.