Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

It’s All About the Process

 

It’s All About the Process

Module 3: It’s All About the Process

For this assignment, you will need to review the Case Study presented and go through the process of completing a risk analysis to identify the security threats, determine the potential impacts of these risks and provide recommended strategies to minimize them.

 Expand AllPanels Collapse AllPanels


Case Study

DeVry Regional Medical Center provides emergency care, generalized surgical services, and has multiple outpatient clinics as part of their healthcare facility. DeVry Regional Medical Center has just completed their implementation of a new integrated health information system (HIS) to improve the coordination of their patient care and for streamlined data management. During the final stages of implementation, it was discovered that there are some security concerns that will need to be resolved.

The Information Systems (IS) Implementation Team identified the following deficiencies during their final evaluation of the overall network as the final phases of implementation were live. They discovered that there were inadequate access controls, potential network security vulnerabilities, along with discovering that DeVry Regional Medical Center does not have any type of comprehensive incident response plan in place. As the IS Implementation Team Lead, you have been asked to collaborate with the head of their IT Department to conduct a full risk analysis to identify and mitigate these security threats that have come to their attention.


Action Plan

As the IS Implementation Team Lead, you are to perform a detailed risk analysis of the overall DeVry Regional Medical Center’s information system and network. You have been asked to identify any specific security threats identified during your risk analysis, evaluating the impact of these risks, and to recommend strategies that can be put into place to reduce them.

Steps you will complete the following as part of your risk analysis report:

1. Review the health information system implementation to report out on all potential security threats you identify.

2. You will analyze the potential impact of each identified threat. Take into consideration the impact to patient care, data integrity, and system availability.

3. Create 3-4 specific recommendations that addresses each threat (i.e., weak access controls, issues with network security, lack of an incident response plan in place).

Your deliverable method can be either in the form of a half-page to full page report or PowerPoint slides that outline each of the risk analysis steps you completed with your recommendations for addressing the threats. For PowerPoint slides, the slides should outline your key points/recommendations and utilize the Notes section under your slides to provide complete sentences for your report as if you were presenting to a board for approval to implement.

Note: If you utilize your textbook or any references to support your recommendations, provide a reference list.

Action

Select the Start Assignment button to begin.

Once you have uploaded your file, select Submit Assignment.

Rubric

M3 It’s All About the Process

M3 It’s All About the Process

Criteria

Ratings

Pts

This criterion is linked to a Learning OutcomeParameters

Parameters
Paper Option
-Uses standard double-spacing without extra spaces between bullets or paragraphs
-Minimum length 1/2 page, maximum length 1 page
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list IF applicable

PowerPoint Option
-No more than 5 bullets per slide
-Keep slides uncluttered so easy to follow
-Notes Section of slides should contain a detailed outline of what slide is presenting (speaker notes)
-Free of grammatical & spelling errors
-Uses APA in-text citations and reference list on a reference slide IF applicable

7 pts

Meets or Exceeds

Student submission clearly encompasses all paper or PowerPoint parameters -Free of grammatical & spelling errors -Uses APA in-text citations and reference list IF applicable

5 pts

In Progress

Student submission mostly meets paper or PowerPoint parameters -1-3 grammatical & spelling errors -Uses some APA in-text citations and reference list IF applicable

3 pts

Little Evidence

Student submission does not clearly meet the paper or PowerPoint parameters -Has 4 or more grammatical & spelling errors -does not use APA in-text citations and reference list IF applicable

0 pts

No Evidence

Student submission clearly does not meet the required Parameters

7 pts

This criterion is linked to a Learning OutcomeSecurity Threats

Security Threats
-Risk Analysis includes identification of all potential security threats

9 pts

Meets or Exceeds

Student submission clearly contains list of potential security threats as part of a Risk Analysis

6 pts

In Progress

Student submission mostly identifies the potential security threats as part of a Risk Analysis – may be lacking identification of some of threats

3 pts

Little Evidence

Student submission is off topic or does not clearly identify security threats as part of a Risk Analysis

0 pts

No Evidence

Student submission is off topic or does not clearly identify security threats as part of a Risk Analysis

9 pts

This criterion is linked to a Learning OutcomeThreat Impact Analysis

Threat Impact Analysis
-A clear analysis of the potential impact of each identified threat is provided
-Focuses on impacts to patient care, data integrity, and system availability

9 pts

Meets or Exceeds

Student submission clearly identifies the potential impact of each identified threat

6 pts

In Progress

Student submission mostly contains an analysis of the potential impact of each of the threats – analysis of impacts may be lacking details

3 pts

Little Evidence

Student submission is off topic or does not clearly provide a defined analysis of potential impact of the threats

0 pts

No Evidence

Student submission does not clearly meet expectations for analyzing threat impacts or nothing submitted

9 pts

This criterion is linked to a Learning OutcomeRecommendations

Recommendations
-For each identified threat offers 3-4 specific recommendations to address each threat
-Focuses on weak access controls, issues with network security, lack of an incidence response plan
CO3

10 pts

Meets or Exceeds

Student submission has clear recommendations for each identified threat offers 3-4 specific recommendations to address each threat and focuses on weak access controls, issues with network security, lack of an incidence response plan

7 pts

In Progress

Student submission contains a list of recommendations for identified threat that may not offer 3-4 specific recommendations to clearly address each threat and focuses on weak access controls, issues with network security, lack of an incidence response plan

4 pts

Little Evidence

Student submission is off topic or does not clearly give the 3-4 needed recommendations for identified threats to address each threat and focuses on weak access controls, issues with network security, lack of an incidence response plan

0 pts

No Evidence

Student submission does not clearly meet expectations to provide recommendations for threats or nothing is submitted

10 pts

Total Points: 35

Previous
Next

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Annotated Bibliography

Write it as a student in college Week 4 Assignment: Annotated Bibliography Due Sunday by 11:59pm Points 50 Submitting a text entry box or a file upload Available Nov 17 at 12am – Nov 26 at 11:59pm For your Signature Assignment for this course, you will submit a written or

help

study hapter 11 Written Assignment Purpose:  The purpose of this assignment is to gain a deeper understanding of the loanable funds market and how businesses invest. Skills: This assignment should help with your organizational, analytical and written communication skills.  Knowledge:  This assignment should help you develop a deeper understanding of derived

engl 111 (P&E)

I have enclosed the text for part b Part A ASSIGNMENT 2.1: 📝Writing Thesis Statements (earl) Assignment Instructions Assignment 2.1 Thesis Statements Choose one of the following activities to complete for this assignment. 2.1a – Thesis Statements Mad Libs Using Mad Libs is an interesting and fun way to learn

Fine Art Analysis – The Starry Night

The Starry Night, an oil painting created by Vincent van Gogh in June 1889, features an impressionistic view out the window of the psychiatric hospital where he voluntarily stayed for nearly a year after suffering a mental breakdown. Vincent van Gogh’s art was not commercially successful in his lifetime, but

English (ear)

2.1 Thesis Statement Part A Developing a Thesis Statement In order to write a focused and organized essay, you need a strong thesis statement to guide your writing. It is a summary of the main points you plan to write about and communicates the significance of your topic. The reason

My bravest Moment

  My bravest moment began in 2016, when I made the hardest decision of my life: leaving Cuba, my medical career, my home, and, most painfully, my two young children. I was a married Cuban woman, a practicing doctor, and the mother of a nine-year-old daughter and a five-year-old son.

DEV

Read and Follow The Instructions Below Carefully: STEP 1: Consider the following questions as you reflect on your developmental experiences. 1. Think back to your elementary and junior high years. How would you describe your social competence and friendships? 2. Body image is an important part of your self-esteem and is especially

engl 045

The Black Cat TOMORROW I DIE. Tomorrow I die1, and today I want to tell the world what happened and thus perhaps free my soul from the horrible* weight which lies upon it. But listen! Listen, and you shall hear how I have been destroyed. When I was a child

Eng (P)

Mandatory final draft of the rhetorical analysis (this was the rough draft). Can you please turn in a new paper that builds on the old one? This teacher is giving me hell with this assignment. Just do the best you can. Instructions Turn in a revised and edited version of

help

hw help ou can complete this Extra Credit Written Assignment for 4 extra credit points. Please answer each question in detail (about a paragraph or more per question) in 250+ words minimum total for the entire assignment.  Be sure to use professional language and grammar.  Include data from the website

English

English assistance   Paper 2 is an argumentative research paper and will focus on two (and only two texts that you find in the Durham Tech Library that address either an important issue in your current career or academic program and/or a social justice issue. You will find two credible and

week 3 ethical decision

 experienced some challenges in the global marketplace  Assignment Directions This assignment assesses  CO-3, CO-4 [content page] This week, you will select a company from the following list. This list reflects organizations that experienced some challenges in the global marketplace. · Adidas Amazon · Apple · ASDA · Coca-Cola · Facebook

WEEK 4 ENGL

Week 4 Assignment: Oedipus/Marc Antony Dialogue For this week’s discussion, respond to one of the following: · Like Oedipus, Caesar receives a dire prophecy that proves tragic. Explain how Shakespeare’s view of fate seems similar to and different than that of Sophocles in Oedipus the King. · At the end

english

  Before starting your formal Résumé Project, you’ll begin by completing this forum discussion. This activity will help you reflect on your current résumé or CV, explore current job opportunities in your field, and start thinking about how to tailor your application materials for a career opportunity.  Step 1 ???? Create

anxious generation

Explain one of Haidt’s sub-claims in the book (e.g., social media harms teen and pre-teen girls development, leading to higher levels of depression and anxiety). How does Haidt frame the claim rhetorically? What research does he provide to support the claim? What research contradicts his claim? Overall, does Haidt’s argument

S2 2

 Need help with a topic, will share the instructions with the right person. 

S2 3

 Need help with a topic, will share the instructions with the right person. 

S2 5

 Need help with a topic, will share the instructions with the right person.