Category: Information Systems

Emerging Threats

 

A new medium-sized health care facility just opened, and you are hired as the CIO, the CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation as well to make sound decisions. The concern is user authentication and credentials with third-party applications which is common in the health care industry. 

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your document be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them).

The CEO has provided the attached article as a reference.

Task:

  • Explain why the other threat models are not ideal (compare and contrast)
  • Provide one recommendation with summary and UML diagram
  • Must be in full APA
  • 3-page minimum not including the title page, abstract and references

Discusion

 How do you feel blockchain will change the global economy or will it?  Explain your answer.

Please make your at least 500 words post substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources. At least 500 words required.

Use The Web To Search For Examples Of Hacks That Made The News And Write An Essay Of 300 Words Write A Brief Description Of The Attack Indicating What Type Of Hack Was Involved. Cite You Sources.

Use the Web to search for examples of hacks that made the news and write an essay of 300 words

Write a brief description of the attack indicating what type of hack was involved. 

Cite you sources.

Essay Of At Least 550 Words Analyzing Explaining How Hackers Benefit From Stealing Medical Records. Use An Example From The News.

Write an essay of at least 550 words analyzing explaining how hackers benefit from stealing medical records. Use an example from the news.

Include at least one quote from each of 3 different articles, place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line.The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

Discussion_BI

 

Read the end-of-chapter application case “Discovery Health Turns Big Data into Better Healthcare” at the end of Chapter 13 in the textbook, and answer the following questions.

  1. How big is big data for Discovery Health?
  2. What big data sources did Discovery Health use for their analytic solutions?
  3. What were the main data/analytics challenges Discovery Health was facing?
  4. What were the main solutions they have produced?
  5. What were the initial results/benefits, and what additional benefits do you think Discovery Health may realize from big data analytics in the future?

Note: Need 400 words. PFA textbook.

Big Data Analytics

BIG DATA ANALYTICS

Read the end-of-chapter application case “Discovery Health Turns Big Data into Better Healthcare” at the end of Chapter 13 in the textbook, and answer the following questions.

  1. How big is big data for Discovery Health?
  2. What big data sources did Discovery Health use for their analytic solutions?
  3. What were the main data/analytics challenges Discovery Health was facing?
  4. What were the main solutions they have produced?
  5. What were the initial results/benefits, and what additional benefits do you think Discovery Health may realize from big data analytics in the future?

 Reply substantively to two other learners.  Discussion forum will not appear until student posts their original post.

Assignment

 

Over the course of this semester, you will be asked to write a research paper about an risk management topic of your choice. The research paper development will consist of: (a) research paper topic (defining the topic of your research/why research is needed on the topic), (b) annotated bibliography (finding literature about the topic), (c) draft research paper (producing a draft paper based on the research topic/lit. review) and (d) final research paper (improving on the draft and writing a final paper). This week you will submit the research paper topic, please use the template provided.

The research topic paper should present a general research topic about IT Risk Management, narrow the topic down to a specific topics (subtopics) and then frame/explore an issue related to the specific topic. You should present and develop an argument concerning the issue. 

Submit a 800 (minimum) word paper (about 3 pages) in which you provide a discussion on a risk management topic of your choice.

Instructions:800 words

APA Format

References

No Plgarism

Turnitin Report

Discussion

  

Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusioninto his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that shes protecting the business and not his belongings.

When or where would you think it would be necessary to implement security measures for both?

Guidelines

250 words minimum 

In line citations

References

Discussion

  

Q1: Chapter starts with the identification and the introduction of the Principles, and the characteristics of a successful program.  Identify these Principles, and provide a brief explanation of their importance?

 Q2: In order to have a successful program, one of the eight (8) Information Risk Planning and Management step is to develop metrics and measure results. Why are metrics required?  Briefly provide your explanation.

Guidelines: 

Minimum 300 words

In-line citations

References

Use the APA format to include your references.

Peer-Reviewed Assignment

 

WK5 Peer-Reviewed Paper Summary – APA 6E Guide. To complete this assignment, follow the following instructions:

The Rubric:

  1. Read the attached peer-reviewed research paper in its entirety
  2. In your own words, using the APA 6E guide, prepare a 150 words to 250 words summary about this research paper
  3. The paper will be prepared in MS Word format ONLY — (typically double spaced, 12-font in Times New Roman)
  4. Write-up MUST be original student thoughts following your read and comprehension of this research work
  5.  DO NOT COPY and PASTE parts/sections of the research paper to complete this assignment