Description
Follow the 2 headings in regards to the Optum360 breech.
-Describe how the system architecture fulfills the needs of the health care organization. (Change/shorten heading)
You may supply this information as a diagram with inputs, outputs, and technologies to define workflows and processes for the high-level information systems.
-Describe potential threats to the organization’s critical mission areas
These may include sloppy information security practices, insider threats, or hackers wishing to steal personal data. Relate these threats to the vulnerabilities in the CIA triad.