You are a security consultant for an information systems security firm and have a new health care provider client under Health Insurance Portability and Accountability Act (HIPAA) compliance. Your new client wants to know the requirements and business drivers for securing the Workstation Domain in its health care environment. Your new client requires compliance with HIPAA. Similarly, your firm has a U.S. government DoD client that also wants you to perform a Workstation Domain compliance audit per DoD workstation hardening guidelines and baseline requirements.2. Consider the following scenario: You are a security consultant for an information systems security firm and have a new health care provider client under Health Insurance Portability and Accountability Act (HIPAA) compliance. Your new client wants to know the requirements and business drivers for securing the Workstation Domain in its health care environment. Your new client requires compliance with HIPAA. Similarly, your firm has a U.S. government DoD client that also wants you to perform a Workstation Domain compliance audit per DoD workstation hardening guidelines and baseline requirements. 3. On your local computer, open a new web browser window. 4. if you’re unfamiliar with HIPAA, complete this step. Otherwise, proceed to step 5: 1. Navigate to http://www.hhs.gov/hipaa/index.html 2. Review the website to learn more about HIPAA and health information privacy. 5. In your Lab Report file, discuss how the compliance law requirements and business drivers for the health care provider’s Workstation Domain might differ from the DoD’s Workstation Domain security compliance requirements. 6. In your web browser, navigate to https://www.cio.com/article/2438695/infrastructure/sec uring-the-endpoints--the-10-most-common-internal-securitythreats.html and read the article. 5. 7. In your Lab Report file, identify the risks, threats, and vulnerabilities commonly found in the Workstation Domain. 8. In your web browser, navigate to https://public.cyber.mil/stigs/. Note: Security Technical Implementation Guides (STIGs) contain recommendations for hardening specific hardware systems/software according to government standards. STIGs are available for download in a zipped XML format. As you click each link on this page, you will find a downloadable ZIP archive that contains several files, including a second ZIP archive. The embedded ZIP archive includes the files necessary to properly display the XML version of the guidance. To view the XML documents, you will need to extract the embedded ZIP archive and then double-click the extracted XML file to open it in the browser. To better aid you in your work, extract each ZIP archive to a separate directory. 9. From the navigation bar on the left, click the Document Library link.