Categories
Other / Cybersecurity

INTRODUCTION Many organizations have legacy systems that are no longer meeting t

INTRODUCTION
Many organizations have legacy systems that are no longer meeting the organization’s requirements with regards to business processes and security. Laws such as the Health Insurance Portability and Accountability Act (HIPAA) require higher security standards since these laws were implemented, and new technology is now available that was not an option previously. A LAN administration and security manager may need to design a new system that will increase security and automate business processes more efficiently than the current legacy system.
Using the attached “Business Systems Design Report Template,” you will design and document a multilevel target security architecture to address cybersecurity threats to the Healthy Body Wellness Center (HBWC). You will also use the “Business Systems Design Report Template” to conduct, record, and audit your design, and provide justification to defend each aspect of your multilevel network architecture. You will then complete the attached “DREAD Workbook” and submit it as a separate attachment.
The “Healthy Body Wellness Center Case Study” and “Healthy Body Wellness Center Security Assessment Report” are attached for your reference; you may also refer to the “Business Requirements Document Template” you created in Task 1 to assist in the completion of this task.
SCENARIO
As the newly promoted LAN administration and security manager for Healthy Body Wellness Center’s (HBWC) IT Department, you are tasked with designing a multilevel target security architecture using the “Business Requirements Document Template” you created in Task 1. Then you will need to conduct a DREAD analysis on your multilevel architecture design.
The technical requirements and specifications for the multilevel target security architecture should be based on the business, functional, and security requirements you documented in the “Business Requirements Document Template.” The target multilevel architecture should include the Small Hospital Grants Tracking System (SGHTS), payroll system, and research data that meet the standards and regulations of the National Institute of Health (NIH) and the federal government, including HIPAA and industry best practices.
REQUIREMENTS
You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
A. Current Systems: Summarize the systems currently being used at the Healthy Body Wellness Center using details from attached case study and assessment report. (HBWC) You may use the information you provided in the BRD template from your Task 1 submission. Record your summary in the “Current Systems” section of the attached “Business Systems Design Report Document.”
B. Goals, Objectives, and Rationale for New System: Outline the purpose, goals, objectives, and rationale for the proposed system, including a clear statement of the problem using the information provided from the “Healthy Body Wellness Center Case Study” and the “Healthy Body Wellness Center Security Assessment Report” to justify your claims. Record your responses in each subsection of the “Goals, Objectives, and Rationale for New or Significantly Modified System” section of the attached “Business Systems Design Report Document.”
C. Factors Influencing Technical Design: Explain the relevant standards, assumptions, dependencies, constraints, and design goals that influence the technical design of the proposed new system. Record your responses in the “Factors Influencing Technical Design” section of the attached “Business Systems Design Report Template.”
D. Proposed System: Determine the necessary requirements to achieve the proposed system and its associated technical design, including the multilevel architecture specifications and design. Include all required tables and diagrams as part of your submission. Record your responses in all subsections of the “Proposed System” section of the attached “Business Systems Design Report Document.”
E. DREAD Analysis: Conduct an analysis of your multilevel architecture using the attached “DREAD Workbook.” Record your results in the “DREAD Workbook” and include the workbook as an attachment. Your workbook should include a minimum of ten threats.
F. Analysis of Proposed System: Summarize your findings from the DREAD analysis by prioritizing and describing the top five risks identified in the “Listing of Threats” worksheet, including mitigation, risk acceptance, and justification for your decisions. Record your responses in the “Analysis of the Proposed System” section of the attached “Business Systems Design Report Document.”
G. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
H. Demonstrate professional communication

Categories
Other / Cybersecurity

As technology companies continue to move business services to the cloud, many co

As technology companies continue to move business services to the cloud, many companies are finding a need to upgrade the technological infrastructure. When implementing new architecture, IT companies will consult with IT security firms to identify current vulnerabilities in the system and plan how to avoid those vulnerabilities in the new information system.
For this task, you will use the attached “Healthy Body Wellness Center Case Study,” “Healthy Body Wellness Center Security Assessment Report,” and the “Business Requirements Document Template” to analyze, assess, and prioritize existing threats to the current architecture and design technical specifications to address identified threats.
SCENARIO
You are the newly hired LAN administration and security manager at Healthy Body Wellness Center (HBWC). The HBWC includes the Office of Grants Giveaway (OGG), a growing department responsible for distributing hospital research grants.
The HBWC currently relies on a local area network (LAN), but plans to expand their services and hire more employees this year. It is evident the current cybersecurity architecture is limited and unable to meet current needs. In addition, HBWC’s cybersecurity architecture will need to transition to a wide area network (WAN).
Using the attached “Healthy Body Wellness Center Case Study” and “Healthy Body Wellness Center Security Assessment Report,” conduct a security analysis of HBWC’s current technologies and applications and identify threats to the company’s existing architecture. You will use the findings from your analysis to complete the attached “Business Requirements Document Template.”
REQUIREMENTS
Analyze HBWC’s existing architecture using the attached “Healthy Body Wellness Center Case Study” and “Healthy Body Wellness Center Security Assessment Report.” Consider common security needs and functionalities necessary to meet the needs of the target network as part of your analysis. Record all responses in the appropriate section of the attached “Business Requirements Document Template.”
A. Introduction – Summarize each aspect of the project summary, project scope, and system perspective based on the attached “Healthy Body Wellness Center Case Study” and “Healthy Body Wellness Company Security Assessment Report.” Use the “Introduction” of the attached “Business Requirements Document Template” to record your responses.
B. Business Process Overview – Describe the current business processes at HBWC and the proposed processes, including the interactions between systems and various business units. Include visual process flow diagrams to further illustrate the processes the new product will replace or enhance. Use the “Business Process Overview” section of the attached “Business Requirements Document Template” to record your responses for each aspect.
C. Business Requirements – Record the business requirements for the project, categorized by both priority and area of functionality addressing the needs from the “Healthy Body Wellness Center Case Study” and “Healthy Body Wellness Center Security Assessment Report.” Provide functional and nonfunctional requirements that can be followed throughout the project for the recorded business requirements. Use the Business Requirements Document (BRD) template to record your responses for each aspect of the document in the “Business Requirements” section.
D. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased or summarized.
E. Demonstrate professional communication in the content and presentation of your submission.