Security Audits Task 3 - Programming
Task3 rubric is attached.It wouldnt let me copy and paste this time so I attached all the requirements
task_3_healthy_body_wellness_center_risk_assessment.pdf
task_3_question_sets.docx
task3.docx
Unformatted Attachment Preview
HEALTHY BODY W ELLNESS CENTER, OFFICE OF GRANTS GIVEAWAY
HEALTHY BODY WELLNESS CENTER
OFFICE OF GRANTS GIVEAWAY
SMALL HOSPITAL GRANTS TRACKING SYSTEM
INITIAL RISK ASSESSMENT
PREPARED BY:
WE TEST EVERYTHING LLC
Jerry L. Davis, CISSP, Sr. Analyst
EXECUTIVE SUMMARY .......................................................................................................... 4
1. INTRODUCTION..................................................................................................................... 7
Background................................................................................................................. ..............................................7
Purpose ............................................................................................................................. ........................................7
Scope ............................................................................................................................. ...........................................7
Report Organization..................................................................................................................................................8
2. RISK ASSESSMENT APPROACH........................................................................................ 9
2.1
Step 1: Define System Boundary ................................................................................................................... .9
2.2
Step 2: Gather Information ............................................................................................................................. .9
2.2.1
Interviews.......................................................................................................... ...................................10
2.2.2
Site Visit ............................................................................................................................. ..................10
2.2.3
Documentation.....................................................................................................................................10
2.2.4
Network Scanning ................................................................................................................................10
2.3
Step 3: Conduct Risk Assessment ................................................................................................................ .11
2.3.1
Impact ............................................................................................................................. .....................11
2.3.2
Likelihood ............................................................................................................................. ...............12
2.3.3
Risk ......................................................................................................................................................12
3. SYSTEM CHARACTERIZATION ...................................................................................... 14
System Overview ............................................................................................................................. .......................14
System Interfaces ............................................................................................................................. .......................14
Data ............................................................................................................................. ..........................................14
System and Data Criticality and Sensitivity ...........................................................................................................15
3.4.1
Criticality ............................................................................................................................. ................15
3.4.2
Sensitivity ............................................................................................................................. ................15
3.4.2.1 Confidentiality .....................................................................................................................................15
3.4.2.2 Integrity ............................................................................................................................. ..................15
3.4.2.3 Availability...........................................................................................................................................15
Users ............................................................................................................................. ..........................................16
4. THREAT STATEMENT ....................................................................................................... 17
Threat Sources ............................................................................................................................. ...........................17
Threat Actions ............................................................................................................................. ...........................17
5. FINDINGS ............................................................................................................................... 19
Management Security ............................................................................................................................. ................19
Operational Security .............................................................................................................................................. .20
2
Technical Security ............................................................................................................................. .....................22
APPENDIX A.
RISK ASSESSMENT MATRIX................................................................ 25
APPENDIX B.
ACRONYMS ............................................................................................... 28
APPENDIX C.
SAMPLE BASELINE SECURITY REQUIREMENTS ......................... 29
3
Executive Summary
The mission of the Healthy Body Wellness Center’s (HBWC) Office of Grants Giveaway (OGG)
is to promote improvements in the quality and usefulness of medical grants through federally
supported research, evaluation, and sharing of information. The OGG distributes a variety of
medical grants, but the majority of grants are disbursed to small hospitals. As a result, the OGG
contracted We Automate Anything (WAA) to design and implement the Small Hospital Grant
Tracking System (SHGTS).
The SHGTS is used to assist in the assignment and tracking of small hospital grants. The OGG
assigns a particular grant to one hospital for one month and then the unused grant funds are
rotated to another hospital for another month. The database tracks the initial delivery of the grant
funds and its pertinent information, and then follows the grant through five hospital facilities.
Only executive office staff can assign grant funds, but all grant users must complete their grant
evaluations in the database. A weekly grant status report is prepared for the executive officer.
Each month, the grant assignor is briefed on the grant status with reports generated from the
database.
During the inception of the SHGTS, the Technical Review Board (TRB) and Configuration
Control Review Board (CCRB) did not review the SHGTS because these boards did not yet
exist. The SHGTS has never had a risk assessment or an OMB Circular No. A-130 review. As a
result, the OGG contracted We Test Everything (WTE) to perform a risk assessment of the
SHGTS.
To identify the potential threats and vulnerabilities associated with the SHGTS, WTE gathered
information through the following techniques:
Document review
Onsite visits to the SHGTS computer room
Interviews with designated OGG management and technical personnel
Network scanning using an automated tool
This report documents risk assessment activities in the following security domain areas:
Management Security
Operational Security
Technical Security
A total of eight observations were made in the areas of management, operational, and technical
security. Table ES-1 presents these observations, providing observation numbers and
descriptions, as well as associated risk levels. The risk associated with each observation is
described as high, medium, or low, as defined below. The risk level represents the degree or
level of risk to which the OGG assets and resources may be exposed.
High Risk: A threat is at least moderately likely to exploit the identified vulnerability,
and such exploitation is likely to severely and adversely affect SHGTS tangible and
4
intangible resources. This level of risk indicates a strong need for corrective measures
and actions, and a plan must be developed to incorporate these actions within a
reasonable period of time.
Medium Risk: The exploitation of the identified vulnerability by a threat is possible, and
such exploitation is likely to affect the OGG significantly. This exploitation would
include the loss of some tangible assets or resources, which could impede the SHGTS
mission, reputation, or interest. This level of risk indicates corrective actions are needed
and a plan must be developed to incorporate these actions within a reasonable period of
time.
Low Risk: The identified weaknesses may be subject to exploitation by a threat, but the
probability of exploitation is low, and the impact on the OGG would be minor. This level
of risk indicates that OGG management should be cautioned and corrective measures
applied where required.
The findings section of this report analyzes each observation in detail. Appendix A summarizes
the observations and presents the observation number and description as well as the potential
threats, potential impacts, associated level, and countermeasures for each observation.
Table ES-1
OBSERVATION
NUMBER
OBSERVATION DESCRIPTION
RISK
LEVEL
Management Security
M1
The accounts of SHGTS users who no longer require access
may not be deleted immediately from the system.
Operational Security
Medium
O1
A system security plan (SSP) has not been developed for the
SHGTS.
A disaster recovery plan (DRP) has not been developed for
the SHGTS.
There are no sign-in logs for visitors accessing the computer
room.
Technical Security
Medium
Passwords on the grants server are not required to be
changed at least every ninety days.
There is no limit to the number of invalid access attempts
that may occur for a given user.
Null session login may be possible.
Medium
O2
O3
T1
T2
T3
5
Medium
Low
Medium
Low
OBSERVATION
NUMBER
T4
OBSERVATION DESCRIPTION
Remote registry access is not restricted to administrators.
6
RISK
LEVEL
High
1. INTRODUCTION
Background
The mission of the Healthy Body Wellness Center’s (HBWC) Office of Grants Giveaway (OGG)
is to promote improvements in the quality and usefulness of hospital grants through federally
supported research, evaluation, and sharing of information. The OGG distributes a variety of
medical grants, but the majority of grants are disbursed to small hospitals. As a result, the OGG
contracted We Automate Anything (WAA) to design and implement the Small Hospital Grant
Tracking System (SHGTS).
The SHGTS is used to assist in the assignment and tracking of small hospital grants. The OGG
assigns a particular grant to one hospital for one month and then the unused grant funds are
rotated to another hospital for another month. The database tracks the initial delivery of the grant
funds and its pertinent information, and then follows the grant through five hospital facilities.
Only executive office staff can assign grant funds, but all grant users must complete their grant
evaluations in the database. A weekly grant status report is prepared for the executive officer.
Each month, the grant assignor is briefed on the grant status with reports generated from the
database.
During the inception of the SHGTS, the Technical Review Board (TRB) and Configuration
Control Review Board (CCRB) did not review the SHGTS because the boards did not exist. The
SHGTS has never had a risk assessment or an OMB Circular No. A-130 review. As a result, the
OGG contracted We Test Everything (WTE), under Contract No. ABCD12-34-E00567, Task
Order # TO111111, to perform a risk assessment of the SHGTS.
Purpose
The purpose of this report is to provide the HBWC and OGG management with an assessment of
the adequacy of the management, technical, and operational security controls used to protect the
confidentiality, integrity, availability, and accountability of the SHGTS. This risk assessment
report identifies threats and vulnerabilities applicable to the SHGTS; the impact associated with
these threats and vulnerabilities; the likelihood that a vulnerability will be exploited;
countermeasures in place to mitigate the risk; and the existence of any residual risk.
This report documents the risk assessment activities that WTE performed during a two-and-ahalf week period that will help OGG management understand the security posture of the SHGTS
and its risk exposure. The risk assessment is part of the OGG’s continuing effort to ensure
compliance with federal policies and guidance as well as the HBWC’s IT security policy.
Scope
This risk assessment is limited to the SHGTS (a Microsoft Access), its host general support
system (GSS) (JINX server EOC3FPR02\Groups\SSR), and the remote access server (RAS).
The servers are housed in room 1234 at the HBWC’s executive office facility. OGG staff
7
access the SHGTS from their workstations in room 5678. The risks were evaluated in the
following security domains:
Managerial
Technical
Operational
Site visits at HBWC headquarters were restricted to room 1234, where the JINX server and the
RAS are located, and OGG offices in 5678. To observe remote access capability, the homes of
two users were visited to review the dial-up networking and virtual private networking (VPN)
process.
Report Organization
This document is divided into five sections. Section 1 is the introduction. The remainder of the
document consists of the following sections:
Section 2 provides a description of the risk assessment methodology used by WTE.
Section 3 describes the characteristics of the SHGTS including the hardware, software,
connectivity, data, and system users.
Section 4 contains the threat statement including threat categories, threat agents, and actions.
Section 5 provides an analysis of the findings in the management, technical, and operation
security domains.
Additionally, the document contains three appendixes: Appendix A contains the Risk
Assessment Matrix BLSR checklist, Appendix B lists acronyms and abbreviations listed
throughout the report, and Appendix C provides the sample baseline security requirements
(BLSR).
8
2. RISK ASSESSMENT APPROACH
Risk was evaluated qualitatively, meaning that numerical values were not assigned. Instead a
rating of high, medium, or low was provided. The WTE risk assessment methodology involved
three major steps that are described below.
Step 1 – Determine System Boundary
Step 2 – Gather Information
Step 3 – Conduct Risk Assessment.
The methodology used to perform the risk assessment for the SHGTS was developed by WTE
with reference to the guidelines found in the following publications:
Federal Information Processing Standards (FIPS) Publication (PUB) 65: Guidelines for
Automated Data Processing Risk Analysis
National Institute of Standards and Technology (NIST) Special Publication 800-30: Risk
Management Guide for Information Technology Systems
The level of risk was assessed by evaluating all collected risk-related attributes regarding threats,
vulnerabilities, assets and resources, current controls, and the associated likelihood that a
vulnerability could be exploited by a potential threat as well as the impact (i.e., magnitude of
loss) resulting from such exploitation.
Figure 2-1: Risk Assessment Approach
Determine
System
Boundaries
2.1
Gather
Information
Conduct
Risk
Assessment
1.
2.
3.
4.
5.
Identify Requirements
Identify Threats
Identify Vulnerabilities
Analyze Risk
Recommend
Countermeasures
Step 1: Define System Boundary
The system boundaries, which determine the risk assessment scope, were restricted to the
SHGTS and its Windows Server host JINX server EOC3FPR02\Groups\SSR. Meetings with
the OGG system owner and the HBWCs information system security officer (ISSO) and
chief information officer (CIO) along with reviewing the current system diagrams led to a
determination of the boundaries.
2.2
Step 2: Gather Information
WTE assessed the SHGTS based on the risk assessment team’s understanding of the operational
environment and OGG and HBWC information technology (IT) policies and guidelines.
Information about the SHGTS was gathered through interviews, site visits, documentation
review, and the use of a network-scanning tool.
9
2.2.1 Interviews
To collect relevant information, WTE developed a questionnaire on IT system management and
operations of the SHGTS and support platform. The interviews were conducted on-site, via
telephone, and through e-mail with the following OGG management and technical personnel:
JINX server administrator
OGG ISSO
OGG CIO
SHGTS Users
2.2.2 Site Visit
The WTE team toured the computer room which houses the SHGTS hardware, software, and
data at rooms 1234 and 5678 at executive office complex in the course of a day to observe the
physical and environmental measures provided for the SHGTS. The visit also included a
demonstration of how the system is accessed and administered, including adding and removing
data. WTE also visited the homes of two OGG staff members to observe remote connections via
virtual private network and dial-up networking.
2.2.3 Documentation
The team reviewed all relevant information security (INFOSEC) documents in order to develop a
better understanding of the SHGTS. Listed below are all system and organizational documents
reviewed in support of the assessment:
OGG mission statement OGG
organization chart SHGTS
administrator’s guide SHGTS
user’s guide
SHGTS configuration management plan (CMP)
OGG request for proposal (RFP) for development of tracking database
WAA SHGTS documentation
Standard operating procedures (SOPs).
2.2.4 Network Scanning
The team used a scanning tool to discover additional vulnerabilities, or vulnerabilities missed by
another scanner, and to minimize the impact of false positives. The JINX host was scanned once
on two different days for a total of two scans.
10
2.3
Step 3: Conduct Risk Assessment
The risk assessment encompassed the following subtasks:
Determining the relative value of the SHGTS based on the criticality and sensitivity of the
data the SHGTS processes, stores, and transmits
Compiling the BLSR checklist
Identifying and assessing potential threats
Identifying and assessing potential vulnerabilities
Determining risks
Developing countermeasure recommendations.
The value of the SHGTS is measured in terms of system and data criticality and sensitivity,
which are described in Section 3. The BLSR checklist encompasses the security requirements,
policies, and guidelines applicable to the SHGTS. Appendix C provides a sample BLSR
checklist.
To assess risks to the SHGTS, the WTE risk assessment team identified a list of potential threats
that could exploit identified vulnerabilities of the SHGTS operational environment. Section 4
provides an analysis of the SHGTS threat environment.
Section 5 presents the findings and includes a discussion of the threat and vulnerability pair,
identification of existing mitigating security controls, impact analysis discussion, risk rating, and
recommended countermeasures. A summary of the findings is listed in Appendix B.
In order to determine risk, the team identified the impact an exploited vulnerability would have
on the s ...
Purchase answer to see full
attachment
CATEGORIES
Economics
Nursing
Applied Sciences
Psychology
Science
Management
Computer Science
Human Resource Management
Accounting
Information Systems
English
Anatomy
Operations Management
Sociology
Literature
Education
Business & Finance
Marketing
Engineering
Statistics
Biology
Political Science
Reading
History
Financial markets
Philosophy
Mathematics
Law
Criminal
Architecture and Design
Government
Social Science
World history
Chemistry
Humanities
Business Finance
Writing
Programming
Telecommunications Engineering
Geography
Physics
Spanish
ach
e. Embedded Entrepreneurship
f. Three Social Entrepreneurship Models
g. Social-Founder Identity
h. Micros-enterprise Development
Outcomes
Subset 2. Indigenous Entrepreneurship Approaches (Outside of Canada)
a. Indigenous Australian Entrepreneurs Exami
Calculus
(people influence of
others) processes that you perceived occurs in this specific Institution Select one of the forms of stratification highlighted (focus on inter the intersectionalities
of these three) to reflect and analyze the potential ways these (
American history
Pharmacology
Ancient history
. Also
Numerical analysis
Environmental science
Electrical Engineering
Precalculus
Physiology
Civil Engineering
Electronic Engineering
ness Horizons
Algebra
Geology
Physical chemistry
nt
When considering both O
lassrooms
Civil
Probability
ions
Identify a specific consumer product that you or your family have used for quite some time. This might be a branded smartphone (if you have used several versions over the years)
or the court to consider in its deliberations. Locard’s exchange principle argues that during the commission of a crime
Chemical Engineering
Ecology
aragraphs (meaning 25 sentences or more). Your assignment may be more than 5 paragraphs but not less.
INSTRUCTIONS:
To access the FNU Online Library for journals and articles you can go the FNU library link here:
https://www.fnu.edu/library/
In order to
n that draws upon the theoretical reading to explain and contextualize the design choices. Be sure to directly quote or paraphrase the reading
ce to the vaccine. Your campaign must educate and inform the audience on the benefits but also create for safe and open dialogue. A key metric of your campaign will be the direct increase in numbers.
Key outcomes: The approach that you take must be clear
Mechanical Engineering
Organic chemistry
Geometry
nment
Topic
You will need to pick one topic for your project (5 pts)
Literature search
You will need to perform a literature search for your topic
Geophysics
you been involved with a company doing a redesign of business processes
Communication on Customer Relations. Discuss how two-way communication on social media channels impacts businesses both positively and negatively. Provide any personal examples from your experience
od pressure and hypertension via a community-wide intervention that targets the problem across the lifespan (i.e. includes all ages).
Develop a community-wide intervention to reduce elevated blood pressure and hypertension in the State of Alabama that in
in body of the report
Conclusions
References (8 References Minimum)
*** Words count = 2000 words.
*** In-Text Citations and References using Harvard style.
*** In Task section I’ve chose (Economic issues in overseas contracting)"
Electromagnetism
w or quality improvement; it was just all part of good nursing care. The goal for quality improvement is to monitor patient outcomes using statistics for comparison to standards of care for different diseases
e a 1 to 2 slide Microsoft PowerPoint presentation on the different models of case management. Include speaker notes... .....Describe three different models of case management.
visual representations of information. They can include numbers
SSAY
ame workbook for all 3 milestones. You do not need to download a new copy for Milestones 2 or 3. When you submit Milestone 3
pages):
Provide a description of an existing intervention in Canada
making the appropriate buying decisions in an ethical and professional manner.
Topic: Purchasing and Technology
You read about blockchain ledger technology. Now do some additional research out on the Internet and share your URL with the rest of the class
be aware of which features their competitors are opting to include so the product development teams can design similar or enhanced features to attract more of the market. The more unique
low (The Top Health Industry Trends to Watch in 2015) to assist you with this discussion.
https://youtu.be/fRym_jyuBc0
Next year the $2.8 trillion U.S. healthcare industry will finally begin to look and feel more like the rest of the business wo
evidence-based primary care curriculum. Throughout your nurse practitioner program
Vignette
Understanding Gender Fluidity
Providing Inclusive Quality Care
Affirming Clinical Encounters
Conclusion
References
Nurse Practitioner Knowledge
Mechanics
and word limit is unit as a guide only.
The assessment may be re-attempted on two further occasions (maximum three attempts in total). All assessments must be resubmitted 3 days within receiving your unsatisfactory grade. You must clearly indicate “Re-su
Trigonometry
Article writing
Other
5. June 29
After the components sending to the manufacturing house
1. In 1972 the Furman v. Georgia case resulted in a decision that would put action into motion. Furman was originally sentenced to death because of a murder he committed in Georgia but the court debated whether or not this was a violation of his 8th amend
One of the first conflicts that would need to be investigated would be whether the human service professional followed the responsibility to client ethical standard. While developing a relationship with client it is important to clarify that if danger or
Ethical behavior is a critical topic in the workplace because the impact of it can make or break a business
No matter which type of health care organization
With a direct sale
During the pandemic
Computers are being used to monitor the spread of outbreaks in different areas of the world and with this record
3. Furman v. Georgia is a U.S Supreme Court case that resolves around the Eighth Amendments ban on cruel and unsual punishment in death penalty cases. The Furman v. Georgia case was based on Furman being convicted of murder in Georgia. Furman was caught i
One major ethical conflict that may arise in my investigation is the Responsibility to Client in both Standard 3 and Standard 4 of the Ethical Standards for Human Service Professionals (2015). Making sure we do not disclose information without consent ev
4. Identify two examples of real world problems that you have observed in your personal
Summary & Evaluation: Reference & 188. Academic Search Ultimate
Ethics
We can mention at least one example of how the violation of ethical standards can be prevented. Many organizations promote ethical self-regulation by creating moral codes to help direct their business activities
*DDB is used for the first three years
For example
The inbound logistics for William Instrument refer to purchase components from various electronic firms. During the purchase process William need to consider the quality and price of the components. In this case
4. A U.S. Supreme Court case known as Furman v. Georgia (1972) is a landmark case that involved Eighth Amendment’s ban of unusual and cruel punishment in death penalty cases (Furman v. Georgia (1972)
With covid coming into place
In my opinion
with
Not necessarily all home buyers are the same! When you choose to work with we buy ugly houses Baltimore & nationwide USA
The ability to view ourselves from an unbiased perspective allows us to critically assess our personal strengths and weaknesses. This is an important step in the process of finding the right resources for our personal learning style. Ego and pride can be
· By Day 1 of this week
While you must form your answers to the questions below from our assigned reading material
CliftonLarsonAllen LLP (2013)
5 The family dynamic is awkward at first since the most outgoing and straight forward person in the family in Linda
Urien
The most important benefit of my statistical analysis would be the accuracy with which I interpret the data. The greatest obstacle
From a similar but larger point of view
4 In order to get the entire family to come back for another session I would suggest coming in on a day the restaurant is not open
When seeking to identify a patient’s health condition
After viewing the you tube videos on prayer
Your paper must be at least two pages in length (not counting the title and reference pages)
The word assimilate is negative to me. I believe everyone should learn about a country that they are going to live in. It doesnt mean that they have to believe that everything in America is better than where they came from. It means that they care enough
Data collection
Single Subject Chris is a social worker in a geriatric case management program located in a midsize Northeastern town. She has an MSW and is part of a team of case managers that likes to continuously improve on its practice. The team is currently using an
I would start off with Linda on repeating her options for the child and going over what she is feeling with each option. I would want to find out what she is afraid of. I would avoid asking her any “why” questions because I want her to be in the here an
Summarize the advantages and disadvantages of using an Internet site as means of collecting data for psychological research (Comp 2.1) 25.0\% Summarization of the advantages and disadvantages of using an Internet site as means of collecting data for psych
Identify the type of research used in a chosen study
Compose a 1
Optics
effect relationship becomes more difficult—as the researcher cannot enact total control of another person even in an experimental environment. Social workers serve clients in highly complex real-world environments. Clients often implement recommended inte
I think knowing more about you will allow you to be able to choose the right resources
Be 4 pages in length
soft MB-920 dumps review and documentation and high-quality listing pdf MB-920 braindumps also recommended and approved by Microsoft experts. The practical test
g
One thing you will need to do in college is learn how to find and use references. References support your ideas. College-level work must be supported by research. You are expected to do that for this paper. You will research
Elaborate on any potential confounds or ethical concerns while participating in the psychological study 20.0\% Elaboration on any potential confounds or ethical concerns while participating in the psychological study is missing. Elaboration on any potenti
3 The first thing I would do in the family’s first session is develop a genogram of the family to get an idea of all the individuals who play a major role in Linda’s life. After establishing where each member is in relation to the family
A Health in All Policies approach
Note: The requirements outlined below correspond to the grading criteria in the scoring guide. At a minimum
Chen
Read Connecting Communities and Complexity: A Case Study in Creating the Conditions for Transformational Change
Read Reflections on Cultural Humility
Read A Basic Guide to ABCD Community Organizing
Use the bolded black section and sub-section titles below to organize your paper. For each section
Losinski forwarded the article on a priority basis to Mary Scott
Losinksi wanted details on use of the ED at CGH. He asked the administrative resident