Security and privacy plan-revised hit architecture diagram

Assignment Help Basic Computer Science
Reference no: EM132608527

You continue your work on the HCC HIT system upgrade project by drafting several components of your project team's security plan to prevent and manage breaches to data, confidentiality and privacy.

You will also update your Healthy Care Community recommended network architecture design from the Week One Healthy Care Community HIT Design Proposal individual assignment.

Part 1 - Security and Privacy Plan

Use your proposed design from the Week One Healthy Care Community HIT Design Proposal individual assignment complete this assignment.

Develop the following components of a Security and Privacy Plan for the planned HCC HIT design:

A description of five security requirements that must be addressed to implement a cloud-based solution (e.g., protecting data in transit and ensuring only authorized patients have access to their information) into your recommended HIT network design and how these requirements differ from those needed for the current local solutions

The identification of three viable threats to confidentiality and privacy of HCC patient data and to your recommended HCC HIT system

An appropriate mix of compliance and security countermeasure recommendations for each identified security requirement and viable threat, including:

Hardware control recommendations (technical controls)

Software configuration recommendations (technical controls)

IT administrative policy and practice recommendations (administrative controls)

User best practice recommendations (operational controls)

Part 2 - Revised HIT Architecture Diagram

Revise your proposed Healthy Care Community HIT Architecture Diagram from your Week One Healthy Care Community HIT Design Proposal individual assignment by completing the following:

Incorporate key learnings and takeaways

Identify the location and types of your security control recommendations from Part 1 of this assignment.

Reference no: EM132608527

Questions Cloud

Change management and configuration management plan : You are an IT manager for an organization and you are advocating for an update of the organization's configuration management and change management practices.
What are the pros and cons of cloud computing : What are the pros and cons of cloud computing? Where could cloud computing fit in the organizational structure and operations?
What is the journal entry needed to adjust the allowance : Siew Lan uses the allowance method to record bad debts expense. What is the journal entry needed to adjust the allowance for doubtful debts at end of December
Analyze pros and cons of a single-step income statement : Question - Analyze the major pros and cons of a single-step income statement and a multistep income statement
Security and privacy plan-revised hit architecture diagram : You continue your work on the HCC HIT system upgrade project by drafting several components of your project team's security plan to prevent
Record the gain or loss : The company uses straight-line depreciation. Record the gain or loss if the equipment was sold on December 31, 2023, for $9,000
Compute the average accumulated expenditures : Kendall borrowed $776,000 on a construction loan at 7% interest on January 1, 2021. Compute the average accumulated expenditures for 2021
What is the direct labor efficiency variance : The job consisted of 6,400 units and was completed in 24,600 hours at a total labor cost of $312,900. What is the direct labor efficiency variance
Rearrange the steps in the accounting cycle : Question - Steps in the accounting cycle. Rearrange the following steps in the accounting cycle in proper sequence

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create a warped text box with the band name

Create a Warped text box with the band name, as shown in Figure 7 - 92. Sample the blue in the guitar strap for the color of the text and apply a layer style to emphasize the text.

  Java programming skills

Write a program that will play rock, paper, scissors against them, but since we are annoyed at this challenge, write it in such a way that it can never lose. However, it must be able to tie so that they dont get TOO suspicious. In your main, ask the ..

  Implement the controller as a stale register

Only use data path components from Figure 5.2 1. After deriving the controller's FSM, implement the controller as a stale register and combinational logic.

  Identify the potential user groups and users of wlan

Identify the potential user groups and users of WLAN in a school environment. Assess the WLAN for probable risks in a school environment.

  Describing potential computer security problem

Prepare an attached PowerPoint presentation describing a potential computer security problem related to that system.

  Wireless technology of information communication

Compare pros and cons of 3G and 4G technology to determine best uses of 3G and 4G technology. Evaluate the basic technology of information communication.

  Apple biggest successes and failures

What were some of Apple's biggest successes and failures? Describe why.

  Economic output in rich nations in modern times

What is the phenomenon that is mainly responsible for the increase in wealth and economic output in rich nations in modern times?

  Why is sonet called a synchronous network

How is an STS multiplexer different from an add/drop multiplexer since both can add signals together?

  Support a risk mitigation plan

Senior management at Health Network allocated funds to support a risk mitigation plan, and have requested that the risk manager and team create a plan in response to the deliverables produced within the earlier phases of the project.

  Incorporate in managing small project

What tools, techniques and methods that you would traditionally use in larger project would you still incorporate in managing a small project?

  Non-negative numbers by using repeated additions

Write a MARIE program using a loop that multiplies 2 non-negative numbers by using repeated additions. For example, to multiply 3 x 6, the program would add 3 six times (e.g. 3 + 3 + 3 + 3 + 3 + 3) or add 6 three times (e.g. 6+6+6).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd