HGC Case Study

Improved Essays
A1: Business Objective:
Healthy Body Wellness Center (HBWC) Office of Grants Giveaway (OGG) business objective is to offer a proficient methodology that promotes improvement in the quality and usefulness of medical grants. HBWC disburses several medical grants through federally supported health research, and implemented the Small Hospital Grant Tracking System (SHGTS) to automate assignment and tracking of the grant disbursement, streamline review of completed evaluation submitted by grant seekers and promote sharing of health information among healthcare professionals.
A2: Security Principle
The guiding security principle that HBWC should use to meet Federal Information Processing Standards (FIPS) is an ISO 27002 security framework, accompanied
…show more content…
The security systems will be focused on management security, operational security and technical security controls.
Management Security: These are management controls that will focus on the management of the IT security system and the management of risk for interconnected systems in HBWC environment, and includes techniques and concerns usually addressed by IT management.
Operational Security: The operational controls address security methods focusing on mechanisms primarily implemented and executed by people (as opposed to systems). These controls are put in place to improve the security of a particular system (or group of systems). Often, they require technical or specialized expertise and rely upon management activities as well as technical controls.
Technical Security: Technical controls focus on security controls that the computer system executes. The controls can provide automated protection for unauthorized access or misuse, facilitate detection of security violations, and support security requirements for applications and
…show more content…
These information systems are:
• LAN – Switches, routers and firewall
• Servers -- SHGTS Microsoft Access 97 database, Remote access server (RAS)
• Workstations
• Communication network – Phone and IP phones
• Agency data processing center including its operating systems and utilities
• Tactical radio network
• Shared information processing service facilities (Bowen, Hash, & Swanson, 2006).

A5: IT infrastructure that includes a description of information flow
JINX application server is housed in room 1234, located at the HBWC’s executive office facility. This is a Microsoft Windows NT application server that is customized to run several applications including Microsoft Access 97 database that is used specifically for SHGTS. The database tracks all data and activities related to the grant distribution, grant users access the database to complete their grant

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Upon determining what should be in the intranet, what risk is the organization willing to tolerate should be tackled. An assessment of the privacy controls and security controls can be determined by using NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations, Building Effective Assessment Plans as a guide along with NIST Special Publication 800-30, Rev-1, Guide for Conducting Risk Assessments (NIST SP 30-1, 800-53A). To truly understand this publication is prohibitive to fully explain; however, this step is critical and will impact your intranet dramatically. To simplify: you cannot always have the risk metric you desired because by doing so would make your system so slow and unusable you could not accomplish much.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Hagm Case Study

    • 1057 Words
    • 5 Pages

    On 05/29/2016, I Deputy R. Dean Hildebrand received a call from dispatch requesting I talk to William Hagman about a problem he was having with Anthony Romo. I spoke to Hagman and he explained he believed Romo had broken into his house at 303 West Basin Street, Basin Montana, about October 2014. Hagman continued to state he had problems with Romo stealing this from his home and out buildings. He believes Romo had entered his house through a back window and rummage through the house. Hagman stated he had been informed of the break-in by his neighbor Vanessa Martin.…

    • 1057 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    To combat these concerns, the team focused on four different controls. Insider Attack: The setting on the firewalls was set to maximum. The setting allowed the network reject, block, or deny potentially malicious payloads that would allow access. Authentication, RBAC, IDPS, and firewalls were used in conjunction to reduce insider threat opportunities. Additionally, these systems notified network administrators of any foreign presence within the boundary.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Havvard Case Study

    • 696 Words
    • 3 Pages

    In 1998, Havvard was taken into police custody once again from his grandmother’s house. At the time, it had been suspected that he had been residing with the woman for a while and that was the reason why the officers went there to locate him. They knocked on the door and requested that Havvard reveal himself to them, but he refused to do so. When he didn’t appear as soon as they asked him to, the police officers began to search the home in the hope that they could still find him there.…

    • 696 Words
    • 3 Pages
    Superior Essays
  • Decent Essays

    Hbr Case Study

    • 144 Words
    • 1 Pages

    My understanding is a conference call was held today with our adjuster Rob Saunders, HBL’s service manager, Dave Sullivan and yourself, in addition at this time they cannot relate the mechanical breakdown to your loss and you have authorized the diagnostic, teardown and replacement of the condenser. Both Rob Saunders and myself reached out to Mr. Sullivan and upon removal of the condenser the findings would be communicated to Allstate as well as to yourself. At this time he is unable to relate the mechanical breakdown to this loss and will be following up with both yourself and Allstate upon completion of the diagnostic and removal of the condenser. At this time Allstate will not be paying for the replacement of your vehicles AC system and…

    • 144 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Every program or every collection of programs implementing a single business function must have unique database credentials. Sharing of credentials between programs is not allowed. Database passwords used by programs are system-level passwords as defined by the Password Policy. Developer groups must have a process in place to ensure that database passwords are controlled and changed in accordance with the Password Policy.…

    • 816 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    All these controls were not very expensive to use and implement and which reduces the attacks and loss.  Keeping in consideration that No-Internal-Controls, LLC has many PCs configured for employee training. Administrative…

    • 396 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    IT General Controls are put into place to address potential or real risks within an IT System and…

    • 751 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 4 Assignment

    • 293 Words
    • 2 Pages

    1. Collect data – internal and external: are made up of secondary sources of data. Internal data: is a data which is already in operation and it is stored within the organisation. For example: profit and loss statement, balance sheet, sales figures and inventory records. While External of data: is the data which does not exist inside the company, but was brought by individuals from outside the organisation, for example: government sources, corporate filings and media, including broadcast, print and internet (Grimsley, Sources of Secondary Data, 2003-2015).…

    • 293 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Corporate Social Responsibility: As a leader in the toy industry, Mattel failed to fulfill its corporate social responsibility and meet the legitimate concerns of society. In the business world, corporations should be responsible for all of stakeholders, including the shareholders, customers, and the society. Thus, the best social responsibility is to create shared value for society and the business (Hitt, Black, and Porter 51).…

    • 818 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    A Risk Assessment Plan plays a big role in any company, whether it is big or small company. The risk assessment will help identify the vulnerabilities and threats to the Wells Fargo IT resources. Which will help determine the impact of those vulnerabilities, threats, and unauthorized access. Having some knowledge of what type of risks expect will help mitigate them faster. There are a several steps needed for a good risk assessment plan, which will essentially help the company be in compliance with FISMA and other federal laws.…

    • 720 Words
    • 3 Pages
    Decent Essays
  • Superior Essays

    Controlling is a process of establishing performance standards based on the organization objectives, evaluating and reporting actual performance, comparing the two, and taking corrective or preventive action as necessary. This function makes sure that goals are met. All the successful organizations, not important the size or how big they are pay close attention to the controlling function. In these moments we are learning of our errors and modifying part of the system of medical transportation and patient’s identification where some errors reduced the effectiveness of the organization.…

    • 1616 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    More and more organizations utilize a management control system (MCS). A MCS can assist an organization with evaluating the organization, as well as implementing corporate strategies that will enable the organization to roll out corporate-wide systems. Typically a MCS covers the administrative and financial areas of an organization.…

    • 1406 Words
    • 6 Pages
    Improved Essays