Secure data access and encryption of a patientdatabase

Assignment Help Basic Computer Science
Reference no: EM13701009

OverviewIn this lab, you implemented policies that map to the Sarbanes-Oxley Act (SOX), the PaymentCard Industry Data Security Standard (PCI-DSS), and the Health Insurance Portability andAccountability Act (HIPAA). You ensured secure data access and encryption of a patientdatabase. You backed up and restored patient data. You also ensured access controls on a pointof sale (POS) system by adding distinct user accounts. You configured a host-based firewall toprotect the cardholder information. Finally, you scanned the POS system for vulnerabilities toidentify security risks.

Lab Assessment Questions & Answers

1. With what section of SOX would the IT professional deal the most, and why?

2. Under HIPAA, when is a health care provider required to notify all patients and theDepartment of Health and Human Services when a security breach is discovered?

3. Which database is more secure: the Java-based Apache Derby or MySQL?

4. Which types of businesses or entities are governed by HIPAA?Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.www.jblearning.com Student Lab Manual

5. According to the PCI Quick Reference guide, who must comply with PCI-DSSstandards?

6. What are the 11 titles of mandates and requirements for SOX compliance?

7. What purpose may COBIT serve to help comply with regulations such as SarbanesOxley?

8. What is RDP? What port number does it use?

 

Reference no: EM13701009

Questions Cloud

Absorption isotherm for water in this polymer is linear : A polymeric material is being considered as a coating film to protect an optical storage disk from water vapor damage. Suppose we need to protect a disk surface from an ambient medium that will be at 45% relative humidity at 25° C. How thick must the..
Prepare the report requested by mrs. daycon : Daycon' president felt that with an aggressive marketing campaign, relocation of some of the locations and with a new corporate name, BL should be able to rebound and return to a profitable position by the end of the year.
Ap is the amount of autonomous planned : Where Y is real GDP, Ap is the amount of autonomous planned spending that is independent of the interest rate, Ms is the nominal supply, P is the price level, and W is the nominal wage rate. Assume that Ap equals 5,000, Ms equals 2,000, W equal..
Architecture to assist in the decision-making process : Using enterprise architecture to assist in the decision-making process, write a 1500 words paper in which you do the following:Determine activities that you believe would be appropriate for outsourcing.
Secure data access and encryption of a patientdatabase : OverviewIn this lab, you implemented policies that map to the Sarbanes-Oxley Act (SOX), the PaymentCard Industry Data Security Standard (PCI-DSS), and the Health Insurance Portability andAccountability Act (HIPAA). You ensured secure data acce..
Baking in the vertex colors : Render the sphere in Part I by baking in the vertex colors, for every vertex calculate its vertex normal by averaging the face normals. Normalize it and then pass the normalized value as a Hue Saturation and Lightness color value i.e. x -> H y-..
Profession might be held liable for negligence : The paper should be 5 to 7 typed pages. Professional Liability-select an allied health (nonphysician) profession; this can be your own profession or another profession that interests you. Some examples of allied health professions include phys..
An anonymous block to include two sql statements coded : Write a script that uses an anonymous block to include two SQL statements coded as a transaction to delete the row with a customer ID of 8 from the Customers table. To do this, you must first delete all addresses for that order from the Address..
Public key cryptography : Write a paper about "Public Key Cryptography".The paper will be at least 1,250 words in length. APA formatting must be used, along with proper citations in APA format. At least seven (7) reputable sources will be cited, and at least three (3) o..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Use functions to get a list of integers from a user

Use functions to get a list of integers from a user and then find statistics of the given list of integers. You are not allowed to use any built in functions for finding the calculations in this assignment.

  Find some articles or research on project management

Do the same for key points that make project management easier for an Agile project.

  How many rfid tags be produced annually meet that demand

suppose that each of the 300 million people in the united state fully consumes two packages of goods a day bearing RFID tags. how many RFID tags have to be produced annually to meet that demand

  Four techniques for analyzing

Briefly compare and contrast the four techniques for analyzing the costs and benefits of a proposed system. What do you see as particular strengths and weakness of each method?

  Recognize the specific manufacture and model of one 1

identify the specific manufacture and model of one 1 magnetic disk one 1 solid state drive and one 1 optical drive.

  Write program take input and test scores

I need a program that allows me to... 1. Input students test scores(Tests, Quizzes, Classwork, and Homework) stored in dynamically declared arrays and PPS weights given to each score

  For each layer of the fcaps

For each layer of the FCAPS (fault, configuration, accounting, performance, security), discuss the management function in detail and how the separation allows for the identification and allocation of the correct resources

  Simpl program prove by structural induction

Let c be an arbitrary SIMPL program and assume that judgment ßs' holds for some store s'. Prove by structural induction that x Î pre(s'), where pre(s') denotes the preimage of s'.

  Differentiate computer data state of computer-s electrical

Differentiate between computer data represented by the state of a computer's electrical switches and the meaningful information that is displayed to the user.

  Company culture and behavior change

Company culture and behavior change

  Round-robin scheduling is used to execute the processes

a) If round-robin scheduling is used to execute the processes, how many items will each process have produced and consumed at the end of 10 time quanta? Assume that the initial run queue order is P1, P2, P3, C1.

  Write maximum and minimum rotational latency of disk

Write down the maximum and minimum rotational latency of this disk? Determine the average rotational latency of this disk?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd