Information program security management

Assignment Help Basic Computer Science
Reference no: EM132525199

Your company is a security service contractor that consults with businesses in the U.S. that require assistance in complying with HIPAA. You advertise a proven track record in providing information program security management, information security governance programs, risk management programs, and regulatory and compliance recommendations. You identify vulnerabilities, threats, and risks for clients with the end goal of securing and protecting applications and systems within their organization.

Your client is Health Coverage Associates, a health insurance exchange in California and a healthcare covered entity. The Patient Protection and Affordable Care Act (ACA) enables individuals and small businesses to purchase health insurance at federally subsidized rates. In the past 6 months, they have experienced:

A malware attack (i.e., SQL Injection) on a critical software application that processed and stored client protected health information (PHI) that allowed access to PHI stored within the database

An internal mistake by an employee that allowed PHI to be emailed to the wrong recipient who was not authorized to have access to the PHI

An unauthorized access to client accounts through cracking of weak passwords via the company's website login

Health Coverage Associates would like you to develop a security management plan that would address the required safeguards to protect the confidentiality, integrity, and availability of sensitive data from the attacks listed above and protect their assets from the vulnerabilities that allowed the attacks to occur.

Write a high-level executive summary of the legal and regulatory compliance requirements for Health Coverage Associates executives. The summary should provide

Accurate information on the HIPAA requirements for securing PHI

FISMA and HIPAA requirements for a security plan

Scope of the work you will perform to meet the Health Coverage Associates' requests

Compile a list of at least 10 of the CIS controls that provide key alignment with the administrative (policies), physical (secured facilities), and technical safeguards required under HIPAA to protect against the attacks listed above. Include corresponding NIST controls mapped to the selected CIS controls.

Write a concise outline of the contents of the security management plan. Include

Policies Health Coverage Associates will need to manage, protect, and provide access to PHI

The recommended risk management framework Health Coverage Associates should adopt

Key elements Health Coverage Associates should include in its plan of actions and milestones

Reference no: EM132525199

Questions Cloud

Calculate the firm interest coverage ratio : Canadian Bacon Inc, Calculate the firm's Interest Coverage ratio (also called Times Interest Earned). Round the answers to two decimal places.
Calculate the yield to maturity : Twelve-month interest rates for the next four years are expected to be 5%, 6%, 6.8% and 7.4% respectively. Calculate the yield to maturity on:
Why do organizations adjust the financial statements : Why do organizations adjust their financial statements? What are some common adjustments? What effect can these adjustments have on an organization
Determine the maximum deviation allowable : Calculate the IRR and use it to determine the maximum deviation allowable in the cost of capital estimates to leave the decision unchanged.
Information program security management : Your company is a security service contractor that consults with businesses in the U.S. that require assistance in complying with HIPAA.
Are the outcomes presented in this question consistent with : Are the outcomes presented in this question consistent with the EMH?
Calculate the firms total debt-to-equity ratio : Calculate the firm's total debt-to-equity ratio. Round the answers to two decimal places in percentage form. American Bacon Inc. financial statements
Financial institutions in the united states are heavily regu : Financial Institutions in the United States are heavily regulated. Given the current focus on soundness, in particular liquidity and solvency in the face of cri
Conduct a simple review of the literature : Conduct a simple review of the literature on a topic of your choice in the field of psychology, healthcare, or science. Select three primary source articles

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Comment on the usefulness and appropriateness of the display

At a recent sales meeting, one of the staff presented a histogram of the zip codes of the last 500 customers, so that the staff might understand where sales are coming from. Comment on the usefulness and appropriateness of the display.

  Unlawful and unwanted solicitation

CAN SPAM is very easy to comply with, yet we still see much of this unlawful and unwanted solicitation. Why do you suppose the spammers continue to send spam an

  The filter described by the transfer function

Compare the filter shape for the filter described by the transfer function H(z)=.0152+.2263z^-1+.517z^-2+.2263z^-3+.0152z^-4  to the shape obtained after the coefficients are quantized to

  Industrialization to our economy and to society

What are the specific benefits and costs of industrialization to our economy and to society?

  Small store selling high fashion clothes

Janice decides to quit her $20,000 a year job and open a small store selling high fashion clothes. To start her store, she takes $100,000 out of her savings ac

  Compare and contrast the two domains

Discuss how collision and broadcast domains are related, but different. You should compare and contrast the two domains.

  State hypotheses test statistic and df p-value

Refer to Exercise 26 from Chapter 4 on the Alcohol Consumption data, in which a Poisson regression model was fit using first Saturday drink consumption as the response and prel, nrel, posother, negother, age, rosn, and state as the explanatory var..

  Eliminating this funding source and the specific methods

Students need to research a minimum of 3 sources (of which only 2 may be cited from the internet) about a financial source of funding for Al Qaeda.

  What are the three types of security policies

What are the differences between a policy, a standard, and a practice? What are the three types of security policies? Where would each be used? What type of policy would be needed to guide use of the Web? E-mail? Office equipment for personal use?

  Calculate the npv of investment

Calculate the NPV of this investment. (Do not round factor values. Round final answer to 2 decimal places, e.g. 15.25.)

  Determine the magnitudes of the pin reactions

The two couples act at the midpoints of bars AB and BD. Determine the magnitudes of the pin reactions at A and D. Neglect the weights of the members.

  How many more motors should be tested

To determine the efficiency of a batch of production of electric motors, 10 motors are tested. The average efficiency of the sample is calculated to be 91.0%, and the standard deviation of the sample is 0.8 percentage point.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd