HIPAA Security Rule (HRS) Toolkit Worksheet

Question Description

Complete a 3- to 4-page HIPAA Toolkit worksheet using the template provided. For each of the three vulnerabilities do the following:

  • Cross-reference the HSR Toolkit questions to specific security controls within NIST SP 800-53a (for example, for the Training question within the HSR Toolkit, the corresponding security controls within NIST SP 800-53a would be within the Awareness and Training Control Family (AT)).
  • Use NIST SP 800-30 to accurately calculate the risks for each vulnerability.
  • For each vulnerability correctly describe how each selected question from the HSR Toolkit can help reduce the risks associated with the vulnerability.
  • Paste the screenshots into the worksheet.

All references need to adhere to APA guidelines.

I have the Vulnerabilities done and the HRS toolkit Questions done but could use some help with the rest of it.

Strategic Technology Plan

Question Description

Strategic Technology Plan:

  • Choose a business and industry (does not have to be real)
  • Your paper must be APA formatted and at least 10 but not greater than 15 pages in length
  • You will be developing a 5 year strategic technology plan for a company
  • o Develop a 10-15 question survey for your constituents to help you craft your strategic plan

    o Discuss other ways you will get stakeholder input

  • Create your Strategic Plan (a sample has been uploaded)
  • o Draft a Vision, Mission, and Values area

     There are thousands of examples online

    o Draft your guiding principles, goals, and measurement criteria

    o Make sure you cover:

     Your survey questions for the Strategic Technology Plan

     Mission Statement

     Vision Statement

     Guiding Principles

     Goals for those principles

     How those goals will be measured for success

    PPT:

    ​Consider the placement of various layers of cybersecurity within an organization and then answer the following questions.

    Question Description

    Consider the placement of various layers of cybersecurity within an organization and then answer the following questions.

    • What are the advantages of placing various layers of cybersecurity within an organization?
    • What are the disadvantages of placing various layers of cybersecurity within an organization?
    • Where has your organization placed various layers of cybersecurity? Is it working? Why or why not?

    You are required to reply to at least two peer discussion question post answers to this weekly discussion question and/or your instructor’s response to your posting. These post replies need to be substantial and constructive in nature. They should add to the content of the post and evaluate/analyze that post answer. Normal course dialogue doesn’t fulfill these two peer replies but is expected throughout the course. Answering all course questions is also required.

    Block Chain

    Question Description

    BLOCK CHAIN:

    Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment.

    Ponits to consider:

    Provide a 500 word (or 2 pages double spaced) minimum reflection.

    Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

    Share a personal connection that identifies specific knowledge and theories from this course.

    Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. Explain that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

    Color images

    Question Description

    Complete this Code.org lesson:

    https://studio.code.org/s/csp2-2019/stage/4/puzzle/1 (Links to an external site.)

    Put all of the images and the answers to the questions in a Word (or other) document. You should be able to paste the images into your document. Then upload the document to this Canvas assignment. Everyone has to submit their own document. You may work together, but each person needs to make their own images.

    For steps 3, 4, 5, and 9, save the image and copy and paste it into your document.

    For step 7, answer the following questions:

    1. Describe what you see when you change the “bits per pixel” to 24. How is it different from the original image?
    2. Explain why this change occurs.

    For steps 10 and 11, answer the questions in the Word document.

    CS4445 Data Communication & Networkin

    Question Description

    Please draw the diagram on page 105- figure3a-4 also please add a budget of the items in the figure. Cost out and add a wireless router that support the 802.11ac standard and firewall. Also please include the cost of the items on the figure for the Ethernet Switch, DSL Modem/Router, Laster Printer, print server, UTP Patch cords (pre-made UTP cords). You may get your costs online, but be specific about the equipment name, model, and so forth. Also include a one paragraph description of how you will connect the devices, protocols you will use or networking services, also any firewall rules or how you will implement security for your home network.

    Please make sure to be detailed and submit the design in Microsoft Word or Microsoft Visio format.

    Draw the diagram, Microsoft Word or Microsoft Visio format​

    Question Description

    Please draw the diagram on page 105 – figure 3a-4 also please add a budget of the items in the figure. Cost out and add a wireless router that support the 802.11ac standard and firewall. Also please include the cost of the items on the figure for the Ethernet Switch, DSL Modem/Router,Laster Printer, Print server, UTP Patch cords (pre-made UTP cords).You may get your costs online, but be specific about the equipment name, model, and so forth. Also include a one paragraph description of how you will connect the devices, protocols you will use or networking services, also any firewall rules or how you will implement security for your home network.

    Please make sure to be detailed and submit the design in Microsoft Word or Microsoft Visio format

    Source Document

    Question Description

    Read the following case and respond to the question below the case. Type your solution on a Microsoft Word document and attach.

    Terrier News

    Terrier News is a monthly newsletter devoted to various breeds of terriers and topics of interest to terrier owners and breeders. Annie West, the editor and publisher asked you to help her design a system to enter and manage the hundreds of classified ads that Terrier News Publishes. Some ads are for dogs wanted; some are for dogs for sale; and some offer products for services.

    Task

    Design a suitable source document for ads that are telephoned or mailed in.

    Your paper should be between 500 and 750 words and reflect scholarly writing and current APA standards. Please include citations to support your ideas.

    Discussion on situational awareness.

    Question Description

    Chapter 7 discusses situational awareness. Much of the security efforts of the past have been centered around prevention and protection. The increasing sophistication of cyber attacks have shown that no controls are 100% effective, and some compromises do occur. There is a rising realization that in addition to considering prevention and protection, controls that address detection and response are necessary to improve security posture. Please describe how situational awareness is a driver for detection and response controls.

    You must do the following:

    – Create a new posting. As indicated above, describe how situational awareness is a driver for detection and response controls. You must cite information (both references and corresponding in-text citations, in APA format) from the assigned readings. A length guideline is at least 250 words.

    Explain the difference between credit card theft and identity theft. Which do you think is more serious and why?Share any experiences that you or someone you know has had with external security threats, including identity theft.

    Question Description

    A great deal of media attention has been given to the increasingly common occurrence of credit card theft and identity theft.

    • Explain the difference between credit card theft and identity theft.
    • Which do you think is more serious and why?
    • Share any experiences that you or someone you know has had with external security threats, including identity theft.

    You are required to reply to at least two peer discussion question post answers to this weekly discussion question and/or your instructor’s response to your posting. These post replies need to be substantial and constructive in nature. They should add to the content of the post and evaluate/analyze that post answer. Normal course dialogue doesn’t fulfill these two peer replies but is expected throughout the course. Answering all course questions is also required.