Home » Downloads » User authentication and credentials with third-party applications 3 common security risks with ratings

User authentication and credentials with third-party applications 3 common security risks with ratings

User authentication and credentials with third-party applications 3 common security risks with ratings

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models (STRIDE, DREAD, PASTA)but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

User authentication and credentials with third-party applications 3 common security risks with ratings: low, medium or high Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

-Follow APA 7 guidelines. (Remember, APA is double spaced). Your paper should include an introduction, a body with fully developed content,  and a conclusion.

—References—
Cagnazzo, M., Hertlein, M., Holz, T., & Pohlmann, N. (2018). Threat Modeling for Mobile Health Systesm. ResearchGate.  https://doi.org/10.1109/WCNCW.2018.8369033

Amini, A. N. Jamil, A. R. Ahmad, & M.R. Z`aba, (2015). “Threat Modeling Approaches for Securing Cloud
Computing,” Journal of Applied Sciences, 15: 953-967, 2015. https://doi.org/10.3923/jas.2015.953.967

Answer preview to user authentication and credentials with third-party applications 3 common security risks with ratings

User authentication and credentials with third-party applications 3 common security risks with ratings

APA

1306 words

Get instant access to the full solution from yourhomeworksolutions by clicking the purchase button below

Accounting

Applied Sciences

Article Writing

Astronomy

Biology

Business

Calculus

Chemistry

Communications

Computer Science

Counselling

Criminology

Economics

Education

Engineering

English

Environmental

Ethics

Film

Food and Nutrition

Geography

Healthcare

History and Government

Human Resource Managment

Information Systems

Law

Literature

Management

Marketing

Mathematics

Nursing

Philospphy

Physics

Political Science

Psychology

Religion

Sociology

Statistics

Writing

Terms of service

Contact