Identify the necessary components within a policy

Assignment Help Management Information Sys
Reference no: EM131735623

Remote Access Security Policy

Organization: XYZ Health Care Provider:

XYZ Health Care is a provider of health services to senior citizens. It performs its mission with a virtual force of Registered Nurses and Nurse Practitioners.

The nurses visit their elderly patients in their homes and monitor their health.

At the end of the day, the nurses are required to connect back to corporate networks and upload all of the patient records for the day.

Keep in mind that this organization is subjected to HIPAA rules and its required to make the data available to its patients and authorized patient representatives within 48 hours.

Some of the RISKS:

Brute force user ID and password attacks

Users or employees unaware of the risks, threats, and dangers of the Internet and shard WI-FI or broadband Internet Access

Multiple Access attempts and logon retries

Unauthorized access to IT Systems, applications, and data

Privacy data or confidential data is compromised remotely

Data leakage occurs in violation of data classification standard

A remote worker's laptop is stolen

A remote worker requires access to the patient medical records system through the Public Internet

Scope: Control Identification and Creation of a Remote Access Policy

Using or textbooks, internet and other resources, identify the necessary components / sections within a security policy and then craft the actual policy for XYZ Healthcare and address the risks within policy that are prevalent with Remote Access.

Your submission must include the following:

1) Control Matrix: A listing of the risk and 1 or more countermeasure to address the risk.

2) A Section that identifies the necessary components of the policy and why they are important: This does not refer to the controls but more specifically sections within the policy. (You may research the Internet or SANS for sample policies, the sections were also discussed in class).

3) The actual policy, when developing the policy please ensure that it can be used at XYZ Healthcare.

Paper Requirements

1) APA Format (Where applicable)

2) Minimum of 3 - 5 references

3) Safe - Assignment comparison will be done

Reference no: EM131735623

Questions Cloud

Discuss the ethical issues of social networks : Discuss the ethical issues of social networks and anytime, anywhere accessibility.
Venture business plans-business plans of established firms : What are some important differences between new venture business plans and business plans of established firms?
Discuss multiple competing forms of christianity emerged : multiple competing forms of Christianity emerged, each presenting their own reformed interpretation
What is the difference between perception and sensation : What is the difference between Perception and Sensation? Well Perception refers to the occurrence when the brain performs organization of information.
Identify the necessary components within a policy : Identify the necessary components / sections within a security policy and then craft the actual policy for XYZ Healthcare.
Discuss about the narrow stock market application : The CAPM was originally (and is still primarily only) applied within the stock market. Nevertheless, describe the two types of corrections or customizations.
Exponential smoothing have over moving averages : What advantages as a forecasting tool does exponential smoothing have over moving averages?
Discuss a proposal to top management : A proposal to top management, suggesting that the sour sales regions in the United States be combined into just two regions
Think they align with your conflict style assessment : Think about the emotions you feel in conflict and discuss whether and how you think they align with your conflict style assessment?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Find how much the software cost to install in the system

find a software company to implement and record entire shipments products for international and in states. How much this software cost to install in the system.

  Find creative ways to compete with others in their industry

Develop three new IT initiatives that can help your selected company gain competitive advantage. Explain your choices. Include at least two references from the University Library.

  Requirement of an effective solution to interoperability

Determine the most significant requirement of an effective solution to interoperability. Provide a rationale for your determination

  Find a set of guidelines on general computer security

Find a set of guidelines on general computer security. Write a brief essay comparing and contrasting those guidelines against the ones given in this chapter

  Methods to reduce the frustrations among disabled population

Suggest at least three (3) methods to reduce the frustrations among the disabled population and how this population can be better served

  Develop business recovery strategies for sangrafix

Develop business recovery strategies for SanGrafix, a video game design company. The strategies should contain detailed guidance and procedures for restoring a damaged system unique to the system's security impact level and recovery requirements.

  Develop and give presentations to clients

Analyze rows and columns of sales figures, develop a variety of graphical presentations and develop and give presentations to clients and other interorganizational departments.

  Define authentication and provide an example

ITM 517- Define authentication and provide an example. Which type(s) of authentication do you prefer? Explain why. What are relationships between information security principle(s) (confidentiality, integrity, and availability) and authentication?

  Where is the configuration for domain based namespace stored

Install DFS (namespace and replication) on Server01 and Server02. In Exercise 4.2 and Exercise 4.3, you will configure DFS.

  Discuss community group or population that you will target

Select a topic associated with health information that would require educating the public in your community. Consider and discuss the community group or population that you will target.

  Analyze the multiplexing techniques of dsl and cable modem

From the e-Activity, analyze the multiplexing techniques of DSL and cable modem Internet and suggest the one you prefer. Explain your decision.Compare and contrast the use of leased lines in a WAN or LAN setting. Then recommend what you would use..

  Roles of prototyping and rapid application developmet

Discuss the roles of prototyping, rapid application development, and agile development

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd