Develop your action plan to evaluate this data incident

Assignment Help Management Information Sys
Reference no: EM132271998

Operations Security

Deliverable

Prepare a report to address all aspects of the case study/assignment. This report should be no less than 10 pages of content. You need to include outside sources and properly cite and reference your sources. You must have at least 10 references, 7 of which must be scholarly peer-reviewed articles. In addition to the 10 pages of content, you will want a title page and a reference sheet. This report needs to be in proper APA format.

Be prepared to present a 15-minute presentation on this assignment.

Assignment

Smith Hospital is a leading health care provider within Kentucky (having five locations throughout the entire state). The system they use is a popular Electronic Health Record system called EPIC. To learn more about this EHR system. On September 15, Daniel Brown (CIO of Smith Hospital) was notified that about two major incidents.

The first incident occurred at the northeast office in which the IT server room was burglarized during normal business hours. It was determined that iPhones, laptops, flash drives and one server was stolen. Local police were notified, and the incident was reported on that date.

The second incident occurred at the southwest campus in which the entire IT system was hacked. Local information security staff determined that 80% of patient's PII to include social security, insurance provider, mailing address and phone number were obtained.

You are Daniel Brown and need to respond to these incidents by taking action immediately.

You will need to complete the following:

Develop an Incident Response Policy for Smith Hospital that will be used to help with Scenario #1 and #2 (create two separate response policies) (this is an attachment that should be included in your paper and referenced in your presentation).

Upon developing the Incident Response Policies, evaluate the incidents described above:

Summarize the data incident and potential level of risk, include why?

Upon identifying the types of data that could potentially be impacted and what laws/regulations could be in violation of non-compliance if this data was breached

Develop your action plan to evaluate this data incident (include your rationale for why the steps were necessary)

Describe how the Incident Response Policy supported your actions

Identify any issues that made the evaluation more difficult

Identify areas of future risk mitigation actions should a similar incident occur (look at the gaps or issues with this scenario)

Close the incident (NOTE: The outcome of the incident did not surface any major risks or data breach to the company, but it took the evaluation to get to this conclusion)

Reference no: EM132271998

Questions Cloud

Describe advantages of using custom threat mitigation : Describe advantages and disadvantages of using custom threat mitigation approaches.
Consider two mutually exclusive machines : Consider two mutually exclusive machines: A and B. Acquisition cost of A is $1,000 and of that of B is $1,800. Assume that both machines produce identical
Elaborate on a scenario when it would be acceptable to use : Elaborate on a scenario when it would be acceptable to use the "wait and see" approach to manage risk.
Calculate the rate of return on firm assets : At the output level of 5,000 units, calculate the rate of return on firm's assets, the degree of its operating leverage, earnings per share, the rate of return
Develop your action plan to evaluate this data incident : ISOL631 - Develop your action plan to evaluate this data incident. Describe how the Incident Response Policy supported your actions.
Adjusted discount rate of scale changing : Assuming that the capital asset pricing is valid, find the risk adjusted discount rate of scale changing capital projects of the corporation.
Annual inflation rates of the united states and japan : What would you estimate is the difference between the annual inflation rates of the United States and Japan
What is state flag unlevered beta : State Flag Co.has a beta of 1.40. The tax rate is 40%, and State Flag is financed with 40% Debt. What is State Flag's unlevered beta?
Which remote authentication offers the best protection : Which remote authentication offers the best protection? and why?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Write a brief synthesis and summary of the two articles

Research at least two articles on the topic of the strategic importance of cloud computing in business organizations.

  Describe the wireless components needed for added business

Describe the wireless components needed for added business value in the healthcare environment.

  What is data mining

What are the business costs or risks of poof data quality? Support your discussion with at least 3 references.What is data mining?

  Describe the security issues found on a network

Describe the security issues found on a network, and arrange them from highest to lowest, mapping out security loopholes to justify your answer.

  Discuss how a joint application design can be used

Discuss how a joint application design (JAD) can be used to help determine system requirements? Is using JAD for this process beneficial?

  How will your security team use your proposed technology

How will your security team use your proposed mobile technology to communicate between teams, access inspection reports, and improve collaboration

  Describe why it is important to use a tool like ms project

Describe why it is important to use a tool like MS Project instead of using other tools (e.g., MS Word, MS Excel) to manage and track your schedule.

  Does locking mobile device operating systems make secure

Does locking down mobile device operating systems make those devices more secure than older, more traditional operating systems of the past?

  Analyze the new system

Describe how you would correct the design issues with the system to make the restaurant managers happy.

  Research on why your company or organization needs more user

How does a resource starved business unit build a plan to test the level of information security?

  Information system managementerror solutionscan you please

information system managementerror solutionscan you please help with the following study question.as maintenance

  Examples of other major federal policy

Cite two or three examples of other major federal policy initiatives or laws that affect health care information technology and evaluate the impacts of each on quality of care.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd