Security and privacy plan-revised hit architecture diagram

Assignment Help Basic Computer Science
Reference no: EM132608527

You continue your work on the HCC HIT system upgrade project by drafting several components of your project team's security plan to prevent and manage breaches to data, confidentiality and privacy.

You will also update your Healthy Care Community recommended network architecture design from the Week One Healthy Care Community HIT Design Proposal individual assignment.

Part 1 - Security and Privacy Plan

Use your proposed design from the Week One Healthy Care Community HIT Design Proposal individual assignment complete this assignment.

Develop the following components of a Security and Privacy Plan for the planned HCC HIT design:

A description of five security requirements that must be addressed to implement a cloud-based solution (e.g., protecting data in transit and ensuring only authorized patients have access to their information) into your recommended HIT network design and how these requirements differ from those needed for the current local solutions

The identification of three viable threats to confidentiality and privacy of HCC patient data and to your recommended HCC HIT system

An appropriate mix of compliance and security countermeasure recommendations for each identified security requirement and viable threat, including:

Hardware control recommendations (technical controls)

Software configuration recommendations (technical controls)

IT administrative policy and practice recommendations (administrative controls)

User best practice recommendations (operational controls)

Part 2 - Revised HIT Architecture Diagram

Revise your proposed Healthy Care Community HIT Architecture Diagram from your Week One Healthy Care Community HIT Design Proposal individual assignment by completing the following:

Incorporate key learnings and takeaways

Identify the location and types of your security control recommendations from Part 1 of this assignment.

Reference no: EM132608527

Questions Cloud

Change management and configuration management plan : You are an IT manager for an organization and you are advocating for an update of the organization's configuration management and change management practices.
What are the pros and cons of cloud computing : What are the pros and cons of cloud computing? Where could cloud computing fit in the organizational structure and operations?
What is the journal entry needed to adjust the allowance : Siew Lan uses the allowance method to record bad debts expense. What is the journal entry needed to adjust the allowance for doubtful debts at end of December
Analyze pros and cons of a single-step income statement : Question - Analyze the major pros and cons of a single-step income statement and a multistep income statement
Security and privacy plan-revised hit architecture diagram : You continue your work on the HCC HIT system upgrade project by drafting several components of your project team's security plan to prevent
Record the gain or loss : The company uses straight-line depreciation. Record the gain or loss if the equipment was sold on December 31, 2023, for $9,000
Compute the average accumulated expenditures : Kendall borrowed $776,000 on a construction loan at 7% interest on January 1, 2021. Compute the average accumulated expenditures for 2021
What is the direct labor efficiency variance : The job consisted of 6,400 units and was completed in 24,600 hours at a total labor cost of $312,900. What is the direct labor efficiency variance
Rearrange the steps in the accounting cycle : Question - Steps in the accounting cycle. Rearrange the following steps in the accounting cycle in proper sequence

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Provide perfectly proportioned graphs

When forming a graph or model it is not necessary to provide perfectly proportioned graphs, just draw it on the paper and take the photo by smart device. It is necessary to accurately present all relevant labels and to include all available or cal..

  Describe the pros and cons of online shopping

Describe the pros and cons of online shopping. Include examples of online shopping sites, both businesses and private consumer to consumer sites

  Auditing and monitoring be utilized in SOX compliance

How do logging and separation of duties help comply with SOX? How might database auditing and monitoring be utilized in SOX compliance?

  Construct a program flowchart and corresponding pseudocode

Construct a program flowchart and corresponding pseudocode to develop a solution algorithm for a program that will compute and output the sum

  Core items that cryptography and encryption

There are three core items that Cryptography and encryption attempt to protect and preserve and is often referred to as the CIA Triad.

  Determine access time when there is cache miss

Determine the access time when there is cache miss? Suppose that cache waits until line has been fetched from main memory and then re-executes for hit.

  Did the attendance for 1998 follow your model

In 1998, Mark McGwire and Sammy Sosa raced to break the homerun record. That year the attendance reached 70.6 million. Did the attendance for 1998 follow your model? Do you think the race to break the homerun record affected attendance? Why or why..

  State of these authentication methods

What options are available to us beyond the use of passwords or PINs and describe the state of these authentication methods.

  Components of the risk management system at bob

1. What are the key components of the risk management system at BoB?

  Deny all http services using tcp on any network

1. Go to the CertExams Web site to download the free network simulator (Please review the privacy policy of the CertExam Website) 2. Install the network simulator

  Write the output file to that directory

Assume that the input file is in the current working directory and write the output file to that directory.

  Positive integer number from user and outputs

Write a program that takes a positive integer number from user and outputs the number in the range from 1 to whatever user has entered with maximum sum of its divisors. The maximum sum of divisors should be outputted as well.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd