Create a summary report that includes the draft policy

Assignment Help Computer Engineering
Reference no: EM133640989

Assignment: Incident Response Policy

You are a security professional for a large, private health care organization. Users have access to file and application servers, as well as data storage facilities that contain customer health information and personally identifiable information (PII).

Sean, your manager, has been asked to provide the latest version of the organization's incident response policy. To his knowledge, no policy exists. He has asked you to research and create an incident response policy.

Task:

A. Look for at least two incident response policies for organizations of a similar type to your organization.

B. Download NIST "Computer Security Incident Handling Guide" SP 800-61 Rev 2 located.

C. Based on your research, create an initial draft of a high-level incident response policy for your organization. Consider Health Insurance Portability and Accountability Act (HIPAA) and other health care-related compliance requirements.

D. Create a summary report that includes the draft policy and justifies the content you included in the draft policy.

E. Provide citations for your sources.

Reference no: EM133640989

Questions Cloud

Define the cervical changes that occur during labor : Define the cervical changes that occur during labor. Describe ways that the patient can cope with the discomforts of the first stage of labor.
Value stream mapping for client with any hypothetical : Prepare a detailed value stream mapping for a client with any hypothetical scenario from beginning to end. Identify areas for improvement.
What you think quantum cryptography is : You going to synthesize what you think Quantum cryptography is and explain its applicability is next generation cryptographic algorithm and information privacy.
Write me a book analysis on the biography of bill gate : Write me a book analysis on the biography of bill gate relating it to the 7 habits - views or opinions regarding the book you selected
Create a summary report that includes the draft policy : Create a summary report that includes the draft policy and justifies the content you included in the draft policy.
Impact of nursing theory on your approach to patient care : Explain the impact of the nursing theory on your approach to patient care. Cite at least one source to support your response.
Prioritization and communicate their impact to stakeholders : Analyze risks using quantitative methods for the purpose of risk exposure and prioritization and communicate their impact to the stakeholders.
What are the most important contributions : What will you work on in the second part of the course to become an effective participant in college-level reading discussions
Describe the emergency preparedness cop : In addition to the two CoPs that you have chosen, describe the Emergency Preparedness CoP and how your healthcare facility will implement this standard.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Discuss about the operating system platforms

MOBILE COMPUTING AND APPLICATIONS-Level 3-National Council for Higher Education- BACHELOR OF SCIENCE IN SOFTWARE ENGINEERING.The fundamental of mobile computing

  You work in the computer science lab at your school and

you work in the computer science lab at your school and have been helping a student working in the lab. in your

  Write down a 200- to 300-word short-answer response for the

write a 200- to 300-word short-answer response for the followingin what business database environments is

  What are the possibilities you can do with azure

What are the possibilities you can do with Azure ? What is a storage blob?

  Develop a strategy for backing up the company

What do you need to consider while deciding the best specifications for processor, memory, and disk space

  Implement rock paper scissors game

CS 100 University of the Fraser Valley implement Rock Paper Scissors game. The code should use function to implement different parts of game.

  Find examples of each of these kinds of data and identify

Find examples of each of these kinds of data and identify the methods and techniques most appropriate for evaluating the data. Try to find examples

  What is network neutrality

Respond to the discussion 1 with 150 words What is network neutrality? Why has the Internet operated under net neutralityup to this point in time.

  Demonstrate a connection to your desired work environment

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied.

  Explain the differences between attacks

Indicate who they were directed to, who might be behind these attacks and why. Also address any similarities/differences between similar previous attacks.

  Discuss what is different about the three plans

This week we discuss Information Risk Analysis, Incident Response and Contingency Planning. We have three plans we create in this arena for our principals.

  How will astronomy archives survive the data tsunami

Case Study: How Will Astronomy Archives Survive the Data Tsunami? Astronomers collect and generate petabytes of data

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd