Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

It’s All About the Process

 

It’s All About the Process

Module 3: It’s All About the Process

For this assignment, you will need to review the Case Study presented and go through the process of completing a risk analysis to identify the security threats, determine the potential impacts of these risks and provide recommended strategies to minimize them.

 Expand AllPanels Collapse AllPanels


Case Study

DeVry Regional Medical Center provides emergency care, generalized surgical services, and has multiple outpatient clinics as part of their healthcare facility. DeVry Regional Medical Center has just completed their implementation of a new integrated health information system (HIS) to improve the coordination of their patient care and for streamlined data management. During the final stages of implementation, it was discovered that there are some security concerns that will need to be resolved.

The Information Systems (IS) Implementation Team identified the following deficiencies during their final evaluation of the overall network as the final phases of implementation were live. They discovered that there were inadequate access controls, potential network security vulnerabilities, along with discovering that DeVry Regional Medical Center does not have any type of comprehensive incident response plan in place. As the IS Implementation Team Lead, you have been asked to collaborate with the head of their IT Department to conduct a full risk analysis to identify and mitigate these security threats that have come to their attention.


Action Plan

As the IS Implementation Team Lead, you are to perform a detailed risk analysis of the overall DeVry Regional Medical Center’s information system and network. You have been asked to identify any specific security threats identified during your risk analysis, evaluating the impact of these risks, and to recommend strategies that can be put into place to reduce them.

Steps you will complete the following as part of your risk analysis report:

1. Review the health information system implementation to report out on all potential security threats you identify.

2. You will analyze the potential impact of each identified threat. Take into consideration the impact to patient care, data integrity, and system availability.

3. Create 3-4 specific recommendations that addresses each threat (i.e., weak access controls, issues with network security, lack of an incident response plan in place).

Your deliverable method can be either in the form of a half-page to full page report or PowerPoint slides that outline each of the risk analysis steps you completed with your recommendations for addressing the threats. For PowerPoint slides, the slides should outline your key points/recommendations and utilize the Notes section under your slides to provide complete sentences for your report as if you were presenting to a board for approval to implement.

Note: If you utilize your textbook or any references to support your recommendations, provide a reference list.

Action

Select the Start Assignment button to begin.

Once you have uploaded your file, select Submit Assignment.

Rubric

M3 It’s All About the Process

M3 It’s All About the Process

Criteria

Ratings

Pts

This criterion is linked to a Learning OutcomeParameters

Parameters
Paper Option
-Uses standard double-spacing without extra spaces between bullets or paragraphs
-Minimum length 1/2 page, maximum length 1 page
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list IF applicable

PowerPoint Option
-No more than 5 bullets per slide
-Keep slides uncluttered so easy to follow
-Notes Section of slides should contain a detailed outline of what slide is presenting (speaker notes)
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list on a reference slide IF applicable

7 pts

Meets or Exceeds

Student submission clearly encompasses all paper or PowerPoint parameters -Free of grammatical & spelling errors -Uses APA in-text citations and reference list IF applicable

5 pts

In Progress

Student submission mostly meets paper or PowerPoint parameters -1-3 grammatical & spelling errors -Uses some APA in-text citations and reference list IF applicable

3 pts

Little Evidence

Student submission does not clearly meet the paper or PowerPoint parameters -Has 4 or more grammatical & spelling errors -does not use APA in-text citations and reference list IF applicable

0 pts

No Evidence

Student submission clearly does not meet the required Parameters

7 pts

This criterion is linked to a Learning OutcomeSecurity Threats

Security Threats
-Risk Analysis includes identification of all potential security threats

9 pts

Meets or Exceeds

Student submission clearly contains list of potential security threats as part of a Risk Analysis

6 pts

In Progress

Student submission mostly identifies the potential security threats as part of a Risk Analysis – may be lacking identification of some of threats

3 pts

Little Evidence

Student submission is off topic or does not clearly identify security threats as part of a Risk Analysis

0 pts

No Evidence

Student submission is off topic or does not clearly identify security threats as part of a Risk Analysis

9 pts

This criterion is linked to a Learning OutcomeThreat Impact Analysis

Threat Impact Analysis
-A clear analysis of the potential impact of each identified threat is provided
-Focuses on impacts to patient care, data integrity, and system availability

9 pts

Meets or Exceeds

Student submission clearly identifies the potential impact of each identified threat

6 pts

In Progress

Student submission mostly contains an analysis of the potential impact of each of the threats – analysis of impacts may be lacking details

3 pts

Little Evidence

Student submission is off topic or does not clearly provide a defined analysis of potential impact of the threats

0 pts

No Evidence

Student submission does not clearly meet expectations for analyzing threat impacts or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeRecommendations

Recommendations
-For each identified threat offers 3-4 specific recommendations to address each threat
-Focuses on weak access controls, issues with network security, lack of an incidence response plan
CO3

10 pts

Meets or Exceeds

Student submission has clear recommendations for each identified threat offers 3-4 specific recommendations to address each threat and focuses on weak access controls, issues with network security, lack of an incidence response plan

7 pts

In Progress

Student submission contains a list of recommendations for identified threat that may not offer 3-4 specific recommendations to clearly address each threat and focuses on weak access controls, issues with network security, lack of an incidence response plan

4 pts

Little Evidence

Student submission is off topic or does not clearly give the 3-4 needed recommendations for identified threats to address each threat and focuses on weak access controls, issues with network security, lack of an incidence response plan

0 pts

No Evidence

Student submission does not clearly meet expectations to provide recommendations for threats or nothing is submitted

10 pts

Total Points: 35

Previous
Next

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

English homework

Chapter 4 Top Religions (online)  Online Individual Activity: Exploring the Top Religions Objective: To facilitate understanding and appreciation of the world’s major religions through independent research and reflective writing, enhancing critical thinking and respectful engagement with diverse perspectives. Top Religions (by estimated followers): 1. Judaic Culture 2. Christianity 3. Byzatine

English Can someone help me with my English compotition homework?

English  ENC 101 ENGLISH COMPOSITION 1 FINAL EXAM ANSWER SHEET Name ____________________________________ Date _________________ Complete all answers on this answer sheet and upload to Blackboard. Verbs (1-10) 1. 6. 2. 7. 3. 8. 4. 9. 5. 10. Punctuation Marks (1-10) 1. 6. 2. 7. 3. 8. 4. 9. 5. 10.

Health

Program: ​ ​ Logic Model (uses text boxes: add/change boxes and arrows as needed) Situation: Inputs Outputs Activities Participation Outcomes Short Medium Long Assumptions External Factors Rev. 7/09

Nexttt

Redo  Required Readings & Resources Kolbert, J., Crothers, L., & Hughes, T. (2022). Introduction to school counseling: Theory, research, and practice (2nd ed.). ● Chapter 1: “History and Trends in the School Counseling Profession” ● Chapter 2: “Professional Identify of School Counselors and the American School Association National Model (2019)”

Asap please.

Thanks  Required Readings & Resources Kolbert, J., Crothers, L., & Hughes, T. (2022). Introduction to school counseling: Theory, research, and practice (2nd ed.). ● Chapter 6: “Individual Counseling” ● Chapter 7: “Group Counseling” Part A-Discussion Topic: Discussion: Counseling Theories in an Academic Setting Discussion: Counseling Theories in an Academic Setting

ASAP 2

Shankss Required Readings & Resources Kolbert, J., Crothers, L., & Hughes, T. (2022). Introduction to school counseling: Theory, research, and practice (2nd ed.). ● Chapter 8: “Consultation and Collaboration” ● Chapter 9: “Academic Development” Part A-Discussion: Engaging with Students Review the Discussion Requirements for this course before responding to the

ar

Use the following questions as a guide as you work to situate this artwork in its geographical context of production. · What kind of features do the figures display?  What are they wearing on their heads?  What kind of beard does the seated figure have? · How are outlines used

I need help d

Answer these using at least 350 words ● What is the policy, program, or policy proposal, and which community/ies is it intended to benefit? ○ This can be a federal or state policy already in place (WIC or TANNF), a community-based or mutual aid program you know of or are

English Homework

Discussion –  You may pick out one topic of the following to discuss: Collaboration  Strategic Sourcing

I need help j4

General Instructions / Formatting Requirements: 1. Respond to only one of the below prompts 2. State the specific prompt you’re responding to at the top of your paper 3. Break up your response into multiple paragraphs 4. Indent each paragraph 5. Double space 6. Proofread for clarity, grammar and spelling

gc

will need speaker notes Create an 8- to 10-slide PowerPoint presentation discussing your cultural background (in addition, you should include a title slide and reference slide in your presentation). When discussing your culture, consider components of yourself such as race, ethnicity, religion, spiritual heritage, gender, sexual orientation, disabilities, socioeconomic status, traditions,

Play

Assignment posted below Scholars, For your last major writing assignment of the semester, you will compose an original scene of a play. In your scene, you must include the following: • Title of your play • clear stage directions • scene descriptions • a list of characters • engaging dialogue

English Homework

Current event Assignment: Chapter 1 – “The Humanities: An introduction “ Objective:   As we delve into the current chapter, this assignment aims to encourage you to make real-world connections to the material we are studying.  Details:   Each student is required to bring in an item that relates to the current

English Homework

Dr. Huston/ENGL 2331-F2-Spring 2024 2 English 2331 Literary Research Project Guidelines Project Slides due date: Sunday, May 5, no later than 11:30 pm Reminder: Late assignments are not accepted. Purpose: This project is intended to provide students with an opportunity to research and independently explore the life and literature of

assitant needed E Kenniqua

please see attachment In-Class Essay – Spring 2024 · Choose one of the following (numbered) prompts to write an essay paragraph. · Make sure your answer has all the features of a strong essay and is written in complete sentences. · Pay special attention to giving support: examples, names, and

How Business Will Harness AI

assignment is attached use the assignment-specific template file in the Assignment Expectations section for all Cases and SLPs in this class. The templates are APA-formatted, may contain links and guidance, and include headings for each required section. The assignment requires research and attribution. It cannot be based on opinion or