Mobile Application Threat Modeling

Discussions List Tool Navigation Discussions List selected Subscriptions Filter by: Filter Unread Hide All Topics Class Success Resources Topic Threads Posts Last Post Course Orientation Simplified instructions for Projects 1-4 are provided for your convenience in this forum. For Project 5, use the Projects Tab at the top and navigate to Project 5. We have provided a Reading and Resource List for all projects in this forum also for your convenience. You can download the PDF files for the course and refer to it for future courses while you are a student in this program. 0 0 Project 3 and 5 – Excel Template Use this Excel template for Project 3 and Project 5 as part of your Workspace exercises: Project 3 Excel Template for CST620 0 0 Project 1 Simplified Instructions This set of simplified project instructions is available as a PDF document for your convenience: Project 1 – Enterprise Key Management Project 1: Enterprise Key Management Project 1 Start Here Transcript As a security architect and cryptography specialist for Superior Healthcare you’re familiar with the information systems throughout the company and the ranges of sensitivity in the information that is used, stored, and transmitted. You’re also expected to understand healthcare regulations and guidelines because you’re responsible for advising the Chief Information Security Officer, or CSO, on a range of patient services, including the confidentiality and integrity of billing, payments, and insurance claims processing, as well as the security of patient information covered under the Health Insurance Portability and Accountability Act, or HIPAA. You also have a team of Security Engineers, SEs, that help implement new cryptographic plans and policies and collaborate with the IT deployment and operations department during migrations to new technology initiatives. This week, this CSO calls you into his office to let you know about the company’s latest initiative. “We’re implementing eFi, web-based electronic health care, and that means we need to modernize our enterprise key management system during the migration.”, he says. The CSO asks for an enterprise key management plan that identifies the top components, possible solutions, comparisons of each solution, risks and benefits, and proposed risk mitigations. The plan will help create an enterprise key management system. The SEs would be responsible for the implementation, operation, and maintenance of the plan and system. The CSO also wants you to come up with an enterprise key management policy that provides processes, procedures, rules of behavior, and training. The new web -based system needs to be running in a month. So you’ll have a week to put together your enterprise key management plan and the accompanying policy. Transcript End In the previous course, you learned how security professionals employ cryptography, a system of algorithms that hide data. You learned systems can be unlocked with a key provided to those who have a need to know that data. An important part of cryptography is how to manage these keys to the kingdom. This involves learning and understanding enterprise key management systems and concepts. Cryptography is the application of algorithms to ensure the confidentiality, integrity, and availability of data, while it is at rest, in motion, or in use. Cryptography systems can include local encryptions at the file or disk level or databases. Cryptography systems can also extend to an enterprise-wide public key infrastructure for whole agencies or corporations. The following are the deliverables for this project: Deliverables: Enterprise Key Management Plan: An eight to 10 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables or citations. Enterprise Key Management Policy: A two to three page double-spaced Word document. Lab Report: A Word document sharing your lab experience along with screenshots. There are seven steps to complete the project. Most steps of this project should take no more than two hours to complete. The entire project should take no more than one week to complete. Begin with the workplace scenario, then continue to Step 1, “Identify Components of Key Management.” When you submit your project, your work will be evaluated using the competencies at the end. Project 1 Step 1: Identify Components of Key Management Key management will be an important aspect of the new electronic protected health information (e-PHI). Key management is often considered the most difficult part of designing a cryptosystem. Choose a fictitious or an actual organization. The idea is to provide an overview of the current state of enterprise key management for Superior Health Care. Review these authentication resources to learn about authentication and the characteristics of key management.

#Mobile #Application #Threat #Modeling

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Trade in Financial Services – Premium Paper Help

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.

To write a proposal, you need to attention to the

 To write a proposal, you need to attention to the following points: Generally, start with an overview or a background about the problem that you want to solve. But before writing a background, you need to understand the problem then try to find an answer or a solution for that. Background: Security

Describe Bob Fischer’s analysis of the precautionary principle

2. The precautionary principle states that “When human activities may lead to morally unacceptable harm that is scientifically plausible but uncertain, actions shall be taken to avoid or diminish that harm.” Either: Describe Bob Fischer’s analysis of the precautionary principle arguments in favour of veganism, and critically analyse Fischer’s argument;

Review the archived chat session and submit a 200-word summary

Review the archived chat session and submit a 200-word summary of the content. The archive review summary must meet the expectations described below.  Summarize the content of the chat. Some ideas for what to include are a description of what information was covered and how you will apply this information

How can team development techniques be used to advance the

  How can team development techniques be used to advance the  goals and objectives of a company’s organizational development program. What are some of the problems and/or issues that a team may experience, especially when first formed? How do these issues and concerns impede team operations?  *Post must be a minimum

This week, locate two education-related presentations that interest you. In

This week, locate two education-related presentations that interest you. In the presentations you select, you must be able to both hear and see the speaker. You may locate your presentations in the NCU Library or other sources of your choice. After watching the two presentations, respond to the following questions

After critically reading the attached article, you will be required

  After critically reading the attached article, you will be required to answer a series of questions.   What do we mean by “read critically”? Critical reading means taking the time to think carefully about what is being said in a text.  It involves identifying key features in the reading,

analogy paragraph (only deals with similarities) simple definition for analogy

analogy paragraph (only deals with similarities)  simple definition for analogy paragraph- an explanation of something difficult to understand by pointing out it’s similarities to something that’s easy to understand topic: words are like money  thesis statement must be first sentence and no “you” is allowed  10-12 sentences horizontal format-talk about

I will send the picture of the ER diagram for

I will send the picture of the ER diagram for reference, to come up with the queries.! Use MySQL Server and MySQL Workbench to write/run the SQL queries below. For each query, provide the following in Report 2:    In about 2 lines, explain what the query returns.  Queries: 

Task analysis is used mainly to investigate an existing situation.

Task analysis is used mainly to investigate an existing situation. Hierarchical task analysis (HTA) is used to break down a task into subtasks. Consider one of your daily routine tasks, such as filling your car with gas or getting money from the automated teller machine (ATM). Now, break your chosen

People of Chinese Heritage. People of Guatemalan Heritage.

Description Population Presentation(POWER POINT) People of Chinese Heritage. People of Guatemalan Heritage. You need to choose by the end of this week 2 from the list of cultural and sociocultural groups that are going to be discuss during this course and prepare a PowerPoint presentation that is due at the

Positive Leadership can help an organization overcome obstacles such as

Positive Leadership can help an organization overcome obstacles such as a hostile work environment.  Positive Leadership can also foster an effective organizational culture enhanced by diversity and gender differences.    Please refer to Chapters 1-5 in The Power of Positive Leadership. Positive Leadership Concept Questions: Answer the following questions:  How

Bariatric Surgery Discussion Nursing Assignment Help

Follow the conventions of Standard English (correct grammar, punctuation, etc.); be well ordered, logical, and unified, as well as original and insightful; Display superior content, organization, style, and mechanics; and Expert Solution Preview Introduction: As a medical professor responsible for creating college assignments and evaluating student performance, I am tasked