logo

Security and Risk Management

   

Added on  2022-12-22

13 Pages2895 Words1 Views
 | 
 | 
 | 
Is Security and Risk Management 1
IS SECURITY AND RISK MANAGEMENT
by ( Student Name)
(Course Name)
(Professor’s Name)
(University’s Name)
(City)
(Date)
Security and Risk Management_1

Is Security and Risk Management 2
Table of Contents
Executive summary.........................................................................................................................3
Introduction......................................................................................................................................3
Part one: Royal Melbourne Hospital...............................................................................................4
Network devices vulnerable.........................................................................................................4
Routers/Switch threats and vulnerabilities...............................................................................5
Types of network security devices which can be used to control security..................................6
How to ensure availability of web service using the Windows Server 2016...............................7
Impact of employee on information security...............................................................................8
Windows server 2016 auditing tools............................................................................................9
Part 2: Encryption............................................................................................................................9
Summary........................................................................................................................................12
Works Cited...................................................................................................................................13
Security and Risk Management_2

Is Security and Risk Management 3
Executive summary
The Royal Melbourne Hospital is a very large hospital which is located Australia. It is
recognized as one of the world leading patient care organization. The hospital is located in
Victoria and provides a comprehensive medical research program across its two city campus.
One of the vision of the hospital is to build a very strong foundation of the hospital. This report
paper will provide an information systems services to the staff and customers of Royal
Melbourne Hospital.
Introduction
Security in information technology is the defense of IT assets and digital information
against external, accidental, and malicious threats. Information security is very critical for most
organizations and enterprises as weak security to information systems can result to compromised
data or systems either through unintentional internal threat or through malicious threats. By not
meeting security standards which are regulated by HIPAA compliance, can result to financial
penalties to Royal Melbourne Hospital.
This report will have two major sections; the first section contains five parts. First the
paper will discuss the types of threats against switches or routers of Royal Melbourne hospital.
Specifically this part will address how routers and switches are vulnerable to abuse and
destruction. The second will propose the two types of network security devices which can be
used to control security and mitigate threats which are related to email and web servers. Third,
the report will describe how Royal Melbourne hospital can ensure availability of web service
using Windows Server 2016. Also part one will discuss on the impact of employee on
information security. Lastly, this part will illustrate the windows server 2016 auditing tools and
Security and Risk Management_3

Is Security and Risk Management 4
how the hospital can use the auditing tools to analyze and monitor the email and web server
issues. In the second part I will utilize the online encryption tool.
Part one: Royal Melbourne Hospital
Network devices vulnerable
With the advancement in networking and computing, organizations across the world have
become more and more connected. The wide area network connects millions most of
geographies and computers across the world; it consists of billions of users across the
government, public, university, and private networks sharing data and information across the
network. The wide area network uses physical media and the TCP/IP protocol to connect to the
various devices. In addition, the wide area network serves and extensive range which starts from
emails, social networks, and the World Wide Web.
With the many computers, protocols, applications, and networking devices on the
organizational network, it has resulted to a very serious threat to information security, any
network device, application and protocols are vulnerable. This means that when we talk of
information security three terms comes into play which are vulnerability, attacks, and threats. A
vulnerability is an inherent weakness to the organization network. On the other hand a threat is
what that can go wrong because of the exploits of the vulnerabilities. In addition, an attack
unauthorized action with the intent of cause damage to the organizational network.
There are various devices which Royal Melbourne hospital have utilized these are
gateway, firewall, router, switch, and servers. Specifically the hospital has utilized a gateway to
provide compatibility between networks by converting transmission speeds, security measures,
or protocols. A router has been utilized by the organization to forward data packets between
computer networks. In addition, the device is used to perform traffic directing functions on the
Security and Risk Management_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents