User authentication and credentials with third-party applications 3 common security risks with ratings
A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models (STRIDE, DREAD, PASTA)but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:
User authentication and credentials with third-party applications 3 common security risks with ratings: low, medium or high Justification of your threat model (why it was chosen over the other two: compare and contrast)
You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.
Your paper should meet the following requirements:
-Follow APA 7 guidelines. (Remember, APA is double spaced). Your paper should include an introduction, a body with fully developed content, and a conclusion.
—References—
Cagnazzo, M., Hertlein, M., Holz, T., & Pohlmann, N. (2018). Threat Modeling for Mobile Health Systesm. ResearchGate. https://doi.org/10.1109/WCNCW.2018.8369033
Amini, A. N. Jamil, A. R. Ahmad, & M.R. Z`aba, (2015). “Threat Modeling Approaches for Securing Cloud
Computing,” Journal of Applied Sciences, 15: 953-967, 2015. https://doi.org/10.3923/jas.2015.953.967
Answer preview to user authentication and credentials with third-party applications 3 common security risks with ratings
APA
1306 words