Home » Downloads » User authentication and credentials with third-party applications 3 common security risks with ratings

User authentication and credentials with third-party applications 3 common security risks with ratings

User authentication and credentials with third-party applications 3 common security risks with ratings

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models (STRIDE, DREAD, PASTA)but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

User authentication and credentials with third-party applications 3 common security risks with ratings: low, medium or high Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

-Follow APA 7 guidelines. (Remember, APA is double spaced). Your paper should include an introduction, a body with fully developed content,  and a conclusion.

—References—
Cagnazzo, M., Hertlein, M., Holz, T., & Pohlmann, N. (2018). Threat Modeling for Mobile Health Systesm. ResearchGate.  https://doi.org/10.1109/WCNCW.2018.8369033

Amini, A. N. Jamil, A. R. Ahmad, & M.R. Z`aba, (2015). “Threat Modeling Approaches for Securing Cloud
Computing,” Journal of Applied Sciences, 15: 953-967, 2015. https://doi.org/10.3923/jas.2015.953.967

Answer preview to user authentication and credentials with third-party applications 3 common security risks with ratings

User authentication and credentials with third-party applications 3 common security risks with ratings

APA

1306 words

Get instant access to the full solution from yourhomeworksolutions by clicking the purchase button below

Place order

× Lets chat on whatsapp?