What will happen if the cio and the leaders do nothing


Problem

Florida Orthopedic Institute:

Next you will provide a mitigation strategy that will include a description of an identity management system, which will include authentication, authorization, and access control. Remember that you are already expecting that your organization will need to update its identity management processes and policies, and you are laying the groundwork for the investment this will require. As an example, think about the requirements for doctors' use of laptop devices when they visit their patients at a hospital and their need to connect to the hospital PHI data.

Review the following resources:

a) Authorization
b) Access control
c) Passwords
d) Authentication
e) Multifactor authentication

Now, explain how your organization should restrict access to protect billing and PHI. Explain the organization's processes and workflows to safeguard PHI, including the use of passwords, password management, and password protection. Define types of authorization and authentication and the use of passwords, password management, and password protection in an identity management system. Describe common factor authentication mechanisms to include multifactor authentication.

Finally, review the mission and organization structure of your organization as well as roles within it, and recommend accesses, restrictions, and conditions for each role. What will happen if the CIO and the leaders do nothing and decide to accept the risks? Could the CIO transfer, mitigate, or eliminate the risks? What are the projected costs to address the risks?

You may not know exactly what your organization's current strategy is, but you can project a plausible scenario based on the CIO's acceptance or rejection of your proposal for an access control system.

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: What will happen if the cio and the leaders do nothing
Reference No:- TGS03284433

Expected delivery within 24 Hours