Levels Tought:
Elementary,Middle School,High School,College,University,PHD
Teaching Since: | Apr 2017 |
Last Sign in: | 9 Weeks Ago, 3 Days Ago |
Questions Answered: | 4870 |
Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
Please help with the paper and required presentation, I have attached the requirements for your reference.
Â
Select a hospital or healthcare organization to research. You may choose anorganization you are familiar with or can readily obtain information about. To maintainconFdentiality, you do not need to mention the name of the organization. You may alsochoose a hypothetical/Fctitious healthcare organization.Daily life requires us to have access to a lot of information, and information systemshelp us access that information. Desktop computers, laptops, and mobile devices keepus connected to the information we need through processes that work via hardware andsoftware components. Information systems infrastructure makes this possible. However,our easy access to communication and information also creates security and privacyrisks. Laws, regulations, policies, and guidelines exist to protect information andinformation owners. Cybersecurity ensures the conFdentiality, integrity, and availabilityof the information. Identity management is a fundamental practice. Part of identitymanagement is the governance of access, authorization, and authentication of users toinformation systems, Identity management is one part of a layered security defensestrategy within the information systems infrastructure. Your work in this project willenable you to produce a technical report and nontechnical presentation that addressesthese requirements.There are six steps that will help you create your Fnal deliverables. The deliverables forthis project are as follows:1.Nontechnical presentation: This is an 8-10 slide PowerPoint presentation forbusiness executives and board members.2.Technical report: Your report should be a 6-7 page double-spaced Word documentwith citations in APA format. The page count does not include Fgures, diagrams,tables or citations.3.Executive summary: This should be a 2-3 page double-spaced Word document.4.In a Word document, share your lab experience and provide screen prints todemonstrate that you performed the lab.The technical report and the nontechnical presentation will identify compromises andvulnerabilities in the information systems infrastructure of the healthcare organization,and identify risks to the organization's data. You will propose a way to prioritize theserisks and include possible remediation actions.The technical report:Provide recommendations for access control and authenticationmechanisms to increase the security within the identity management system. After youhave deFned the roles within the organization, recommend the accesses, restrictions,and conditions for each role. Present these in a tabular format, as part of your list ofrecommendations.Provide a comparison of risk scenarios to include the following:1.What will happen if the CIO and the leadership do nothing, and decide to acceptthe risks?
Attachments:-----------