Identifying the risks associated with the current position

Assignment Help Basic Computer Science
Reference no: EM13215172

Scenario
You work for a large, private health care organization that has server, mainframe, and RSA user access. For the third week in a row, Sean comes into your office at 5:00 p.m. on Friday and needs you to write a report describing some of the risks associated with not having all the security items in place. He needs you to research a generic risk management policy template and use that as a starting point to move forward. He also asked you to search for risk outcome examples from organizations similar to theirs.
The task is due next week.

You realize that your organization does not have much in the way of an information security strategy, and is missing many of what you think are critical components. Your organization is compliant with the Health Insurance Portability and Accountability Act (HIPAA) and follows other external compliance requirements.

Assignment Requirements
Research templates, and look for risk outcome examples from organizations of a similar type as your organization. Write a report identifying the risks associated with the current position your organization is in, and how your organization can mitigate risk by using information security systems policies. Include an introduction explaining the following: Who? What? When? Why? Be sure to add a conclusion with a rationale detailing how risks can be mitigated. Reference your research so that Sean may add or refine this report before submission to senior management.

 

Reference no: EM13215172

Questions Cloud

Find all companies located in every city : Assume the companies may be loacted in several cities. Find all companies located in every city in which small bank corporation is located. Write relational algebra query. Use  in database system concepts sixth edition for schema.
Evaluate the various approaches for setting transfer prices : Describe and evaluate the various approaches for setting transfer prices. How can the use of different approaches between the selling and buying divisions be reconciled?
Explain weighted average cost of debt : Calculate Company A's weighted average cost of debt given the following information: (a) Tax Rate: 20%. (b) Average Price of Outstanding Bonds:
What is the impact on the founders : What is the impact on the founders and round-one investors' final ownership assuming the second round is funded by outsiders and compare these results to your results for Part C
Identifying the risks associated with the current position : Be sure to add a conclusion with a rationale detailing how risks can be mitigated. Reference your research so that Sean may add or refine this report before submission to senior management.
Gathering the information and analyzing the information : The first thing you need to do is probably ask me questions: 1. What questions (and why) might you have before you start your assignment? 2. What would your recommendation be based on?
What is the required yearly savings : How much will the short fall amount to at the beginning of the retirement period and what lump sum will she need at the beginning of the retirement period?
Explain conventional mortgage how big a monthly payment : Woukd it make any differences if they were already making monthly installment loando payments totaling $750 on two car loans?
Explain how will america solve its debt problem : The topic may be anything of specific interest to you that is covered in the weekly reading assignments for this course. The paper must be in APA format and be between 1,500 and 1,750 words with a minimum of 4 external scholarly references

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Positive and negative characteristics of hybrid databases

A idea that several of the main database vendors have come up with is a hybrid database that integrates the concepts of both OO and Relational databases.

  List the sequence in which all constructors

list the sequence in which all constructors and destructors are called. Also, provide the explanation for why they are called in this sequence.

  Ways to avoid communication pitfalls

Based on the section on "Watch out for communication pitfalls" in the Bateman and Snell text, describe some ways that Lei could have avoided this situation.

  Marie program that will input a variable

To develop a MARIE program that will input a variable number of user entered Decimal whole number grades, validating each one (0-100) in a subroutine

  Explain process of extracting contours from edge image

Assume that the edge points in an image are extracted using a robust edge detection. Explain the process of extracting the contours from this edge image.

  Write a method called median

Write a method called median that accepts an array of integers as its argument and returns the median of the numbers in the array. The median is the number that will appear in the middle if you arrange the elements in order

  Create a program called tokens.java

Create a program called Tokens.java that will receive any text file name as a command line argument and display all the unique tokens (separated by space/s) there are in the given text file

  What influence the concept of pervasive computing

What you believe the eventually influence will be of concept of "pervasive computing" or"location based services" will be on society.

  Determine last element of a list using prolog

Using Prolog as programming language for LOGIC, create relevant command to do following tasks:-Determine the last element of a list. Find K'th element of list. (K=5)

  Describe how single-user system scheme works

Give a real-life example of a single-user system scheme, fixed partitions, dynamic partitions, and relocatable dynamic partitions. Describe how process works.

  Compute hash for nifty hash function

Bob allots the numeric value VChar to each letter in alphabet equal to letter's position in alphabet, i.e., VA = 1, VB = 2, ..., VZ = 26. For the message, he computes the hash.

  Explain customer relationship management system

Describe what do you mean by a "customer relationship management system". Write and explain several categories of CRM systems.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd