Privacy data or confidential data is compromised remotely

Assignment Help Other Subject
Reference no: EM131289248

Remote Access Security Policy

Organization: XYZ Health Care Provider:

XYZ Health Care is a provider of health services to senior citizens. It performs its mission with a virtual force of Registered Nurses and Nurse Practitioners. The nurses visit their elderly patients in their homes and monitor their health. At the end of the day, the nurses are required to connect back to corporate networks and upload all of the patient records for the day. Keep in mind that this organization is subjected to HIPAA rules and its required to make the data available to its patients and authorized patient representatives within 48 hours.
Some of the RISKS:

• Brute force user ID and password attacks
• Users or employees unaware of the risks, threats, and dangers of the Internet and shard WI-FI or broadband Internet Access
• Multiple Access attempts and logon retries
• Unauthorized access to IT Systems, applications, and data
• Privacy data or confidential data is compromised remotely
• Data leakage occurs in violation of data classification standard
• A remote worker's laptop is stolen
• A remote worker requires access to the patient medical records system through the Public Internet

Scope: Control Identification and Creation of a Remote Access Policy

Using or textbooks, internet and other resources, identify the necessary components / sections within a security policy and then craft the actual policy for XYZ Healthcare and address the risks within policy that are prevalent with Remote Access.

Your submission must include the following:

1) Control Matrix: A listing of the risk and 1 or more countermeasure to address the risk.

2) A Section that identifies the necessary components of the policy and why they are important: This does not refer to the controls but more specifically sections within the policy. (You may research the Internet or SANS for sample policies, the sections were also discussed in class).

3) The actual policy, when developing the policy please ensure that it can be used at XYZ Healthcare.

Paper Requirements

1) APA Format (Where applicable)
2) Minimum of 3 - 5 references
3) Safe - Assignment comparison will be done

General Guidelines while creating policy paper:

Overview
Purpose
Policy statement
Complaince
Scope
Guidance / procedure
Why the policy is important?

Risk Control Matrix
Risk Control Matrix template sample:
S.No. Name of the risk what is the policy Counter measures

What is the policy type?
Actual policy in detail
What happens if policy is not followed / failed?

References:- Mainly use SANS, HIPAA other websites as a reference.

Reference no: EM131289248

Questions Cloud

Develop five major goals for information technology plan : Develop at least five major goals for the information technology strategic plan. Speculate on three positive organizational impacts of implementing the strategic plan. Justify your response.
Determine the power dissipated in r1 and the current in r2 : For the circuit shown below, using an appropriate analysis method, determine the power dissipated in R1.- Using a suitable analysis method, determine the current in R2.
How might you work to overcome your weaknesses : How will knowing your own personality traits help you to be a more effective health services manager ?
What is the session key kab : All arithmetic is done in GF(2^5) with P(x) = x^5+x^2+1 as an irreducible field polynomial. The primitive element for the Diffie-Hellman scheme is α = x^2. The private keys are KA = 3 and KB = 12. What is the session key kAB? Show all the step.
Privacy data or confidential data is compromised remotely : Privacy data or confidential data is compromised remotely. A remote worker requires access to the patient medical records system through the Public Internet.
Discuss about the electronic record implementation : Discuss about the Electronic Record Implementation
Comparing and selecting forensic tools : Suppose you were recently hired for a new position as the computer forensics manager at a medium-sized communications company. One of your duties will be to analyze, test, and select forensic tool standards for the company.
Prepare a documentation for the health care : Prepare a documentation for the Health care
Describe your ideal project manager : Part 1: Answer the following 300 or more words - Describe some informal drivers that you have seen or read about.  - Describe your ideal project manager. Part 2: Answer the following in 300 or more words

Reviews

Write a Review

Other Subject Questions & Answers

  What is the difference between a dnp and phd in nursing

what is the difference between a dnp and phd in nursing? which of these would you choose to pursue if you decide to

  What is disorder that affects the peripheral nervous system

What is one disorder that affects the peripheral nervous system? What is one disorder that affects the central nervous system? Compare and contrast one disorder that affects the peripheral nervous system (PNS) and one disorder that affects the centra..

  Provisions and limitations of osha voluntary self-audit

Briefly outline the purpose, scope, provisions and limitations of OSHA's Voluntary Self-Audit Policy. What are the risks to your company of this approach to achieving a safe work environment?

  Major categories of hazards associated with terrorism

Analyze two of the five major categories of hazards associated with terrorism. Be sure to include which type of attack would be most logical to conduct in the United States and why?

  Find the temperature between the metal and the insulator

For a 1m length of pipe; calculate the heat loss and also the temperature at the interface between the metal and the insulator.

  How did you feel and think while experiencing it

Describe a time in which you have experienced burnout, either as a student or employee. What led to the burnout? How did you feel and think while experiencing it? How did you overcome burnout?

  Explain how religion and terrorism are interrelated.

Explain how religion and terrorism are interrelated.Summarize your findings regarding the underlying issues of major contemporary religious conflicts.

  Write a thesis statement for your research paper

Explain why you feel your science topic (or problem) is important to explore. State what (if anything) is controversial about your topic (or problem). Relate the scientific method to the topic (or problem) you have identified.

  The substitution-of-foreign-goods effect

Can the natural level of real output ever change? If so, when? How is the natural level of real output related to the long-run aggregate supply curve?

  Acid number and saponification number

For printing ink, why is it important to know the acid number and saponification number? How are the two related? I need to understand so I can write an introduction to my lab report

  Do the collateral sources have any psychological issues

What do other people have to say about the patients behavior - Are there any commonalities between the collateral sources' reports?

  What does singer say about other philosophers

What does Singer say about other philosophers' attempts to argue that only humans have moral worth

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd