Preview

Final: Security and Network

Powerful Essays
Open Document
Open Document
3275 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Final: Security and Network
Table of Contents

Instructions 3
Honor Pledge 3
ABC Background 4
Question One Answer 5
Question Two Answer 8
Question Three Answer 10
Question Four Answer 11
Question Five Answer 12
Reference Page 14

CSEC 630 Final Exam - 100 points

Exam is due by 11:59 PM EDT [Sunday December 02, 2012].

This examination is worth 20 percent of your total grade. There are five questions, and the maximum point values are included with each question.

Maximum length answer for each question should be limited to approximately 800 words (2 pages) excluding diagrams, illustrations or other addendum. You are not required to use APA formatting. I expect the response to immediately follow the question as follows:

1. Describe… Response

2. Discuss…

Response

And so forth…
----------------------------------------------------------------------------------------------------------

ABC HEALTHCARE CASE BACKGROUND

Healthcare companies, like ABC Healthcare, that operate as for-profit entities, are facing a multitude of challenges. The regulatory environment is becoming more restrictive, viruses and worms are growing more pervasive and damaging, and ABC Heathcare’s stakeholders are demanding more flexible access to their systems.

The healthcare industry is experiencing significant regulatory pressures that mandate prudent information security and systems management practices.
Furthermore, the continued pressure to reduce cost requires that management focus on streamlining operations, reducing management overhead and minimizing human intervention. The regulatory focus at ABC Healthcare is on the Health Insurance Portability and Accountability Act (HIPAA) and Sarbanes-Oxley (SOX). Both pieces of legislation highlight the need for good systems administration and controls, but focus



References: Aubert, M. and McCann, B. (2006). MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Eckert, Jason W. and M. John Schitka. (2006). Linux+ guide to linux certification (second edition) Goodrich, M.T. & Tamassia, R. (2011). Introduction to Computer Security. Boston, MA: Pearson Education INC. Microsoft TechNet. (2003). Windows Server TechCenter. Retrieved Nov. 29, 2012. from: http://technet.microsoft.com/en-us/library/cc779838(WS.10).aspx Stallings, W. and Brown, L. (2008). Computer Security: Principles and Practices. Upper Saddle River, NJ: Pearson Educations, Inc Schwalbe, K., (2010). Information Technology Project Management (sixth edition). Boston, MA: Course Technology.

You May Also Find These Documents Helpful

  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Whitman, M. E., & Mattord, H. (2004). Principles of Information Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 15, 2009, from University of Phoenix, CMGT440.…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Sunica Music

    • 697 Words
    • 3 Pages

    As relates to your selected scenario, give a brief 100- to 200-word overview of the company.…

    • 697 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Answer the following questions in complete sentences, giving detailed explanations and support for each of your answers.…

    • 782 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Hash ____ are mathematical functions that create a hash value, also known as a message digest, by converting variable-length messages into a single fixed-length value.…

    • 1195 Words
    • 17 Pages
    Good Essays
  • Powerful Essays

    This case study protected sensitive patient information was comprised during the e-mail security breach. The Kaiser Permanente leadership reacted quickly to mitigate the damage of the breach because the company was non-compliant with good information security practice and regulations such as the Health Insurance Portability and Accountability Act of 1996 (HIPAA) which established standards for the…

    • 1186 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Hsm310 Hipaa Assignment

    • 893 Words
    • 4 Pages

    | HIPAA Rules(1)Privacy Rules: According to the U.S Department of Health and Human Services (HHS), the HIPAA Privacy Rule establishes national standards to protect individuals’ medical records and other personal health information and applies to health plans, health care clearinghouses, and those health care providers that conduct certain health care transactions electronically. It’s important because the Rule requires appropriate safeguards to protect the privacy of personal health information, and sets limits and conditions on the uses and disclosures that may be made of such information without patient authorization. This rule impacts the staff by: Not sharing the information with others who have no need to know, including co-workers, family members or friends, minimizing opportunities for patient information to be overheard by others, never sharing passwords, disposing of information containing PHI properly such as shredding paper files(2)Security Rules: The HIPAA Security Rule establishes national standards to protect individuals’ electronic personal health information that is created, received, used, or maintained by a covered entity. The Security Rule is important because it requires appropriate administrative, physical and technical safeguards to ensure the confidentiality, integrity, and security of electronic protected health information. It impacts the organization by forcing the healthcare industry to adopt uniform electronic transaction standards for…

    • 893 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Please respond to each question in two to four sentences. Use brief quotes and/or page citations to support each answer.…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    References: Conklin, W. A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of computer security: CompTIA Security+™ and beyond (3rd ed.). New York, NY: McGraw Hill.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Hsm 542 Course Project

    • 6712 Words
    • 27 Pages

    The ethical issues addressed in this paper are the various reasons healthcare industry administrators and other entities choose to delay updating and enhancing outdated Hospital Information Technology (HIT). Even though their responsibility to provide the best care and information/ education to the patients and staff is very important, it does not seem like a priority just until the recent years. Also discussed are the resources and benefits they will inevitably gain by implementing the recommended solutions provided. I have chosen this topic because I myself have always had an interest in many types of technology, especially if I can use it to improve my performance. I have been working in healthcare for almost 7 years now and realize that this is important because we are now in an era of technology being implemented in every part of our lives and how more efficient we can be with information technology. This just doesn’t apply to the healthcare industry, but this essay is in regards to why most of the healthcare industry as a whole has been slow to adapt to modern information technology in their daily business operations and health records keeping. The subjects that will be discussed are the criteria for a…

    • 6712 Words
    • 27 Pages
    Powerful Essays
  • Better Essays

    Stallings, W., & Brown, L. (2012) Computer security: Principles and practice (2nd ed.). Boston, MA: Pearson.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Hippa Tutorials

    • 262 Words
    • 2 Pages

    To maintain the confidentiality of e-PHIs, HIPAA created privacy rule, security rule, and HITECH. These rules help to safeguard patient’s privacy, prevent, detect, and correct security violation. Furthermore, viruses, which are introduced by hackers, can attack the computer systems. Another way to protect patients’ information is to protect buildings, equipment, and software. This is done in order to steal information, either for profit, to make a political point, or for entertainment. Using programs like firewalls, Virtual Private Networks, intrusion detection system, virus detection, cryptography, and content filtering can help to guard against information hackers. As a result, the organization will conserve resources and revenue that would have been lost through this process.…

    • 262 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Better Essays

    In the world of technology today, consumers often purchase items through the internet using their personal information such as name, date of birth and credit card numbers. This information can easily be stolen from someone who seeks to exploit weakness in a computer network. According, to (Gagne, 2012), “data breaches often occur through technical vulnerabilities, malware, compromised user credentials or opportunist attackers”. Healthcare organizations maintain patient medical and personal information through an electronic source called the electronic health record. Healthcare quality and safety requires that the right information be available at the right time to support patient care and health system management decisions. Data breaches in healthcare have become common within the last few years which is a violation of the Health Insurance Portability Accountability Act of 1996 and patient privacy. Data security is a major concern pertaining to consumers choosing a health care organization to fit their needs. Care providers and insurance companies face the increased enforcement of regulatory requirements to ensure patients of their personal information secure. The key steps to achieving data security in healthcare organizations is to following policies and procedure, conduct audit trails, data classification, data protection, encryption and disaster recovery/business continuity.…

    • 1491 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Tkt Module 3 Test Sample

    • 2615 Words
    • 11 Pages

    INSTRUCTIONS TO CANDIDATES Do not open this booklet until you are told to do so. Write your name, Centre number and candidate number on the answer sheet if they are not already printed. There are eighty questions in this paper. Answer all questions. Mark your answers on the separate answer sheet. Use a pencil. You may write on the question paper, but you must mark your answers in pencil on the answer sheet. You will have no extra time for this, so you must finish in one hour and twenty minutes. At the end of the test, hand in both the question paper and the answer sheet. INFORMATION FOR CANDIDATES Each question in this paper carries one mark.…

    • 2615 Words
    • 11 Pages
    Powerful Essays