logo

CYB-535 Policy Management For Security Solutions

   

Added on  2021-12-21

8 Pages1326 Words80 Views
Running head: CYBER SECURITY IN MEDIUM ENTERPRISE ORGANIZATIONS
CYBER SECURITY IN MEDIUM ENTERPRISE ORGANIZATIONS
Name of the student:
Name of the university:
Author note:

CYBER SECURITY IN MEDIUM ENTERPRISE ORGANIZATIONS
1
Table of Contents
Overview of the report:....................................................................................................................2
Description of the system:...............................................................................................................2
Framework governing the enterprise:..............................................................................................3
Major gaps in the system:................................................................................................................4
Recommendations:..........................................................................................................................5
- Auditing and mapping can be performed:............................................................................5
- Mac address filtering can be done in the network:...............................................................5
- Using 802.1X for the purpose of authentication:..................................................................5
High Level Diagram representing the current state of the system...................................................5
Equal Diagram representing the Proper End State..........................................................................6
References:......................................................................................................................................7

CYBER SECURITY IN MEDIUM ENTERPRISE ORGANIZATIONS
2
Overview of the report:
This report gives a clear overview about the organizational security standards and
strategies. The security of the organizational networks is of utmost priority in order to eliminate
the risks of data breach as well as misuse of data by the hackers. This report shows the network
security procedures for medium scale enterprise organizations using the HIPAA compliance
standards. No security standards can give assurance of complete data protection for the
organizations. However if the HIPAA compliances are properly implemented in the healthcare
industries the security of the organizational data stored in the networks can be optimized. This
report highlights the description of such a security system for the organizations including the risk
assessment and mitigation techniques and recommendations for data security. The report also
clearly gives recommendations for a proper disaster recovery mechanism within the companies
including the action plans and milestones that the company aims to achieve in terms of data
security. This report explains the components of a security standard for the healthcare industry.
The different kinds of electronic transactions within the healthcare organizations such as cancer
institute’s and hospitals should be well protected. This will not only help the medical
practitioners, nurses, doctors and other medical experts in securing the patient medical data,
prescriptions and health insurance data but also ensure to secure such sensitive data from the
hackers and the outside world. These aspects have been clearly explained in the report.
Description of the system:
The present network solutions makes use of the different network servers and workstation
which are commonly connected in the same network. The internal hosts such as the systems can
communicate with the external servers through a firewall in order to prevent any kind of eternal

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security in Medium Enterprise Organizations
|8
|1375
|165

Cyber Security: Quantify the System
|4
|700
|376

Network Security in Healthcare Networks: Potential Issues and Solutions
|10
|2391
|212

Network Security: Protecting the Integrity and Usability of Networking Services and Data
|25
|1420
|50

Cyber Security and IT Infrastructure: Challenges and Solutions
|4
|723
|396

Overview of Network Security in Healthcare Sector
|9
|2490
|305