Secure data access and encryption of a patientdatabase

Assignment Help Basic Computer Science
Reference no: EM13701009

OverviewIn this lab, you implemented policies that map to the Sarbanes-Oxley Act (SOX), the PaymentCard Industry Data Security Standard (PCI-DSS), and the Health Insurance Portability andAccountability Act (HIPAA). You ensured secure data access and encryption of a patientdatabase. You backed up and restored patient data. You also ensured access controls on a pointof sale (POS) system by adding distinct user accounts. You configured a host-based firewall toprotect the cardholder information. Finally, you scanned the POS system for vulnerabilities toidentify security risks.

Lab Assessment Questions & Answers

1. With what section of SOX would the IT professional deal the most, and why?

2. Under HIPAA, when is a health care provider required to notify all patients and theDepartment of Health and Human Services when a security breach is discovered?

3. Which database is more secure: the Java-based Apache Derby or MySQL?

4. Which types of businesses or entities are governed by HIPAA?Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.www.jblearning.com Student Lab Manual

5. According to the PCI Quick Reference guide, who must comply with PCI-DSSstandards?

6. What are the 11 titles of mandates and requirements for SOX compliance?

7. What purpose may COBIT serve to help comply with regulations such as SarbanesOxley?

8. What is RDP? What port number does it use?

 

Reference no: EM13701009

Questions Cloud

Absorption isotherm for water in this polymer is linear : A polymeric material is being considered as a coating film to protect an optical storage disk from water vapor damage. Suppose we need to protect a disk surface from an ambient medium that will be at 45% relative humidity at 25° C. How thick must the..
Prepare the report requested by mrs. daycon : Daycon' president felt that with an aggressive marketing campaign, relocation of some of the locations and with a new corporate name, BL should be able to rebound and return to a profitable position by the end of the year.
Ap is the amount of autonomous planned : Where Y is real GDP, Ap is the amount of autonomous planned spending that is independent of the interest rate, Ms is the nominal supply, P is the price level, and W is the nominal wage rate. Assume that Ap equals 5,000, Ms equals 2,000, W equal..
Architecture to assist in the decision-making process : Using enterprise architecture to assist in the decision-making process, write a 1500 words paper in which you do the following:Determine activities that you believe would be appropriate for outsourcing.
Secure data access and encryption of a patientdatabase : OverviewIn this lab, you implemented policies that map to the Sarbanes-Oxley Act (SOX), the PaymentCard Industry Data Security Standard (PCI-DSS), and the Health Insurance Portability andAccountability Act (HIPAA). You ensured secure data acce..
Baking in the vertex colors : Render the sphere in Part I by baking in the vertex colors, for every vertex calculate its vertex normal by averaging the face normals. Normalize it and then pass the normalized value as a Hue Saturation and Lightness color value i.e. x -> H y-..
Profession might be held liable for negligence : The paper should be 5 to 7 typed pages. Professional Liability-select an allied health (nonphysician) profession; this can be your own profession or another profession that interests you. Some examples of allied health professions include phys..
An anonymous block to include two sql statements coded : Write a script that uses an anonymous block to include two SQL statements coded as a transaction to delete the row with a customer ID of 8 from the Customers table. To do this, you must first delete all addresses for that order from the Address..
Public key cryptography : Write a paper about "Public Key Cryptography".The paper will be at least 1,250 words in length. APA formatting must be used, along with proper citations in APA format. At least seven (7) reputable sources will be cited, and at least three (3) o..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What role would the pmt function and the vlookup function

what role would the pmt function and the vlookup function play in what-if analysis? include in your answer an

  Discuss the points and tabulate the strengths and weakness

Please discuss the points and tabulate the strengths and weaknesses

  Determine the number of comparisons

Determine the number of comparisons (as a function of n and m) that are performed in merging two ordered files a and b of sizes n and m, respectively, by the merge method presented in the lecture.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Computing characters are there in encyclopedia

The text of the Encyclopedia Britannica is about 44 million words. For a sample of about 2000 words, the average word length was 6.1 characters per word. Approximately how many characters are there in the encyclopedia?

  What is the difference between println and printf

What is the difference between println and printf? Show an example of the usage of each.

  Tsee economic espionage and the protection of trade secrets

economic espionage and the protection of trade secrets have become increasingly important as domestic and international

  Write an expression that returns a random value

Write an expression that returns a random value between 1 and 100. The values 1 and 100 must be included in the values that can be returned.

  Write an application that accepts a user password

Write an application that accepts a user's password from an input dialogs. When the entered password is less than six characters, more than 10 characters, or does not contain at least one letter and one digit, prompt the user again.

  Write pseudocode for an iterative algorithm

Write pseudocode for an iterative algorithm that determines a DFS spanning tree for an undirected graph. Base your algorithm on the traversal algorithm dfs.

  Examine and analyze the principles of inheritance

Examine and analyze the principles of inheritance. Use the Library to get started on finding resources.

  Risk identification

You have been assigned as the manager on a project to develop a new application system for your business partner. You were given two weeks to develop a project plan and high level cost estimates.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd