Discuss the classification schemes of information

Assignment Help Management Information Sys
Reference no: EM131694427

COMPREHENSIVE MEDICAL SERVICES "CMS", is a highly advanced teaching and research hospital and medical facility that has gained notoriety around the world for its cutting edge technology and its high success rate in treating critically ill and severely burned patients.

Currently there are three "branches" or "facilities" in the United States, located in Los Angeles, Saint Louis and Boston. Patients come from all around the world to receive treatment at one of the three CMS facilities and hospitals. The existing facilities share information between them.

If for example a patient presents for treatment at the Boston facility on one visit, his medical providers and account representatives will have access to his personally identifiable information, prior medical diagnosis and treatment records, insurance, billing and payment history in real time regardless of which of the other facilities he has treated at previously. CMS is expanding its serves and will open a fourth facility in the southern United States. To that end, CMS as purchased a 10-acre tract of land just outside the city limits of Galveston, Texas.

Other than purchasing the land and retaining an architect, CMS is still in the planning phase. It is CMS's intention to erect what will most likely be a 10 story structure in which CMS expects to house the hospital facility, doctor's offices, outpatient surgery center, administrative offices, management services which will include insurance, accounting (accounts payable and receivable included), loading docks for shipping and receiving, multiple parking facilities, and a data center. Your team has been hired by COMPREHENSIVE MEDICAL SERVICES "CMS" to analyze and design a complete access control model for its new facility located in Galveston, Texas.

The new Galveston facility should share information with the other three facilities, so that the patient information will be available in real time regardless of which facility the patient presents for treatment. Medical teams at all four facilities should be able to review the patients records and collaborate on the best course of treatment for it patients.

The complete access control model that you develop should be written in narrative form using the APA format. Please use ample subsections or subheading as appropriate. Your paper should have a 1-in margin on top, bottom, left and right margins. The paper should be double spaced.

Use a cover page with a title, and the name of each team member who contributed to your project/paper. Each page should have a page number in the bottom right margin. The paper should also include a table of contents, that include subject headings, subheadings or subtopics, references or sources, and illustrations as well as page numbers for each. For each major area or section of your model, which you will explain and justify in your paper, you should identify the options you considered in the form of a null and alternative hypothesis.

Discuss the alternatives you considered, giving pros and cons of each, and prove information from the research you conducted that assisted you in arriving at your conclusion, or in establishing your hypothesis as to why one alternative was selected over another. You MUST cite the sources for your research any time you make reference to your research, whether that be through direct quotations or in summary. Your work should include no fewer than five (5) sources.

In addition to the written research paper that you will use to "sell" CMS on the access control model that you developed, when you present or "pitch" your model to CMS (and the rest of the class) you will use audio visual aids in the form of a Power Point presentation. Also use schematic diagrams, drawings, tables and illustrations where appropriate.

For all diagrams, drawings, illustrations, and tables that you use or reference in your oral presentation and Power Point slides, please also include the same visual aids in the appendix of your written paper. Your access control model should include, but is not limited to a discussion of the following:

1. The different types of computing systems and networks that you anticipate will be necessary and the types of databases stored on each network.

2. The types of users you anticipate for your different systems and networks.

3. Which users, if any, will have remote access to the systems.

4. What nature and extent of security that will be necessary for each of the systems or networks that you identify, including a discussion of things such as necessary firewalls.

5. For each or type of user identified which of the systems, databases, networks, and/or classes or types of information or data they will have access to. Include an explanation of why they do or do not have access to certain systems, networks, databases and types of information.

6. For each type or class of users discuss the type(s) and layer(s) of authentication that will be required, discussing the options available and why you made the authentication decision that you selected. Consider and discuss the logical access controls for your subjects as well as authentication factors.

7. Discuss the privileges that will be assigned to users, classes of users or types of users for each of your systems, networks and/or databases. Consider and discuss group access controls.

8. Discuss the classification schemes of information that will reside on your networks, systems and/or databases and explain the security classifications for each. Include how and when information may possibly be declassified.

9. Consider how and when information/data will be destroyed or disposed of at the end of its useful lifecycle. Also, consider the process of taking the computers, hard drives, and other physical components out of service at the end of their useful life.

10. Perform risk assessment for major components and discuss how you will handle risk for each major system/network/database. Consider and discuss alternatives and options for backup, mitigation of loss, loss prevention, and recovery. Explain why you chose one option over another.

11. Discuss and make recommendations for CMS's policies, standards, guidelines and procedures for information security. With regard to information security policies, demonstrate your critical thinking by developing an acceptable use policy for CMS that will describe what tasks can and cannot be performed using the organization's computing resources.

Discuss the password policy, the account management policy and the remote access policy that you would recommend. While you will be unable to develop a complete set of standards needed to support CMS's policies, please highlight what you would consider the most significant standards and procedures that detail authentication, password management, and remote access.

Discuss where you believe separation of duties, job rotation, and other policies are essential within the different departments or divisions of the organization in order to maximize security.

12. Discuss the alternative available and your recommendations for employee training regarding CMS's overall access control and security.

13. Don't overlook physical security! Discuss perimeter security and design a comprehensive plan for physical, building, parking structures, points of entry, creating physical obstacles and barriers that enhance security. Discuss the physical and logical placement of the data control center and its physical security. If you consider it beneficial use a schematic or drawing to illustrate physical security (and any other aspect of your access control model where illustrations, diagrams, or tables would enhance your explanation and/or presentation).

14. Consider biometric access controls for the different areas, systems, networks etc. that you have identified and discuss the alternative, explaining your recommendation and why you arrived at the conclusion that you did.

Also, consider various options for technology-related access control solutions where applicable and explain the alternatives and your recommendation for security and the possibility of outsourcing parts or all of it.

Reference no: EM131694427

Questions Cloud

What would be the total time : What would be the total time it would take to reach a speed of 52 m/s?
Implementing changes in displays of goods and order : The store's management recently implemented some changes in displays of goods, order within aisles, and other changes, and it now wants to know whether average.
Analyze why the work was viewed as controversial at the time : Analyze why the work was viewed as controversial at the time. Explain how the art you chose prompted social change or awareness.
Evaluate how stocks are affected by standard and poor index : A study was undertaken to evaluate how stocks are affected by being listed in the Standard & Poor's 500 Index. The aim of the study was to assess average.
Discuss the classification schemes of information : The different types of computing systems and networks that you anticipate will be necessary and the types of databases stored on each network.
Describe the elements of art and principles of design : Select 1 work of art by one of the following artists. Describe some of the elements of art and principles of design that are used.
Statistical evidence to reject the claim made by magazine : According to Money, the average appreciation, in percent, for stocks has been 4.3% for the five-year period ending in May 2007.
Describe the scope and analyze how to control the scope : Describe the scope and analyze how to control the scope. Speculate and give justifications for how to control scope.
Explain what are benefit of investing in art for corporation : Explain What are the benefits of investing in art for a corporation? Why might employees be interested in these works of art?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain three major advantages to its use

The Relational Database Model is the foundation of all modern DBMSs. Explain three major advantages to its use.

  What security concerns are associated with the thumb drive

What security concerns are associated with the thumb drive - How could information security policies or information security plans help the cafe in this type of situation?

  Fraud and risk factors and enterprise systems

Review the Fraud Risk Factors on page 288 of the textbook. Choose one (1) factor which you believe is the most important. Justify your response. Next, choose one (1) factor and determine two (2) policies that a company could put in place in order ..

  Discuss how information can be used strategically

How use of information in each article relates to Porter's Five Competitive Forces model. Discuss how information can be used strategically, based on example.

  Show the information sharing with global partners

Information Sharing with Global Partners - What procedures would you put in place to allow information sharing between your global partners without compromising your information's security?

  Create a storyboard diagram depicting layout of your website

Create a narrative that describes the site to your prospective client. Create a storyboard diagram depicting the layout of your Website.

  Which governmental challenge of operating in digital world

Which of the following is a governmental challenge of operating in the digital world? Which of the following occurred when Alvin Toffler's "third wave" gained speed?

  Explain what are security policies or e-policies

Information Security and Ethics: Protection Policies and Procedures - Explain What are security policies or e-policies? Explain three security policies that you would primarily recommend to an organization to have as a minimum and why? How security..

  Moving from a 10baset to a 100baset networkyour company is

moving from a 10baset to a 100baset networkyour company is in the process of upgrading the network infrastructure which

  What planning methods would you use to develop business

What planning methods would you use to develop business/ IT strategies and applications for your own business? Explain your choices.

  Explain information security standards applicable to company

Describe the information security standards applicable to your organization (3-4 slides), and 3) summarize the key elements of your organization's cyber security profile

  The design of user interfaces is of critical importance in

the design of user interfaces is of critical importance in systems analysis and design. discuss.word limit 700

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd