Identify the necessary components within a policy

Assignment Help Management Information Sys
Reference no: EM131735623

Remote Access Security Policy

Organization: XYZ Health Care Provider:

XYZ Health Care is a provider of health services to senior citizens. It performs its mission with a virtual force of Registered Nurses and Nurse Practitioners.

The nurses visit their elderly patients in their homes and monitor their health.

At the end of the day, the nurses are required to connect back to corporate networks and upload all of the patient records for the day.

Keep in mind that this organization is subjected to HIPAA rules and its required to make the data available to its patients and authorized patient representatives within 48 hours.

Some of the RISKS:

Brute force user ID and password attacks

Users or employees unaware of the risks, threats, and dangers of the Internet and shard WI-FI or broadband Internet Access

Multiple Access attempts and logon retries

Unauthorized access to IT Systems, applications, and data

Privacy data or confidential data is compromised remotely

Data leakage occurs in violation of data classification standard

A remote worker's laptop is stolen

A remote worker requires access to the patient medical records system through the Public Internet

Scope: Control Identification and Creation of a Remote Access Policy

Using or textbooks, internet and other resources, identify the necessary components / sections within a security policy and then craft the actual policy for XYZ Healthcare and address the risks within policy that are prevalent with Remote Access.

Your submission must include the following:

1) Control Matrix: A listing of the risk and 1 or more countermeasure to address the risk.

2) A Section that identifies the necessary components of the policy and why they are important: This does not refer to the controls but more specifically sections within the policy. (You may research the Internet or SANS for sample policies, the sections were also discussed in class).

3) The actual policy, when developing the policy please ensure that it can be used at XYZ Healthcare.

Paper Requirements

1) APA Format (Where applicable)

2) Minimum of 3 - 5 references

3) Safe - Assignment comparison will be done

Reference no: EM131735623

Questions Cloud

Discuss the ethical issues of social networks : Discuss the ethical issues of social networks and anytime, anywhere accessibility.
Venture business plans-business plans of established firms : What are some important differences between new venture business plans and business plans of established firms?
Discuss multiple competing forms of christianity emerged : multiple competing forms of Christianity emerged, each presenting their own reformed interpretation
What is the difference between perception and sensation : What is the difference between Perception and Sensation? Well Perception refers to the occurrence when the brain performs organization of information.
Identify the necessary components within a policy : Identify the necessary components / sections within a security policy and then craft the actual policy for XYZ Healthcare.
Discuss about the narrow stock market application : The CAPM was originally (and is still primarily only) applied within the stock market. Nevertheless, describe the two types of corrections or customizations.
Exponential smoothing have over moving averages : What advantages as a forecasting tool does exponential smoothing have over moving averages?
Discuss a proposal to top management : A proposal to top management, suggesting that the sour sales regions in the United States be combined into just two regions
Think they align with your conflict style assessment : Think about the emotions you feel in conflict and discuss whether and how you think they align with your conflict style assessment?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd