Information technology intern working for health network

Assignment Help Operating System
Reference no: EM132339965

Discuss project- You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota.

Risk management is an important process for all organizations. This is particularly true in information systems, which provides critical support for organizational missions. The heart of risk management is a formal risk management plan. The project activities described in this document allow you to fulfill the role of an employee participating in the risk management process in a specific business situation.

The four parts are worth a total of 200 points and will based on the following:

• Did the students demonstrate an understanding of the competencies covered in the course thus far?

• Did the students include all important components of the deliverables in the outline?

• Did the students demonstrate good research, reasoning, and decision-making skills in identifying key components and compliance laws and regulations? (All references listed in APA format)

• Did the students create a professional, well-developed deliverables with proper grammar, spelling, and punctuation?

• Did the students deliver a relevant and complete summary presentation?

After creating an initial draft of the risk management plan, the second part of the assigned project requires you to create a draft of the risk assessment (RA) plan. To do so, you must:

1. Develop an introduction to the plan explaining its purpose and importance.

2. Create an outline for the RA plan.

3. Define the scope and boundaries for the RA plan.

4. Research and summarize RA approaches.

5. Identify the key roles and responsibilities of individuals and departments within the organization as they pertain to risk assessment.

6. Develop a proposed schedule for the RA process.

7. Create a professional report detailing the information above as an initial draft of the RA plan.

Evaluation Criteria and Rubrics

• Did the students demonstrate an understanding of the competencies covered in the course relating to risk assessments?

• Did the students include all important components of a RA plan in the outline?

• Did the students demonstrate good research, reasoning, and decision-making skills in identifying key components and methodologies?

• Did the students create a professional, well-developed draft with proper grammar, spelling, and punctuation?

Required Source Information and Tools:

The following tools and resources that will be needed to complete this project:

• Course textbook

• Internet access for research

Submission Requirements:

All project submissions should follow this format:

• Format: Microsoft Word or compatible

• Font: Arial, 10-point, double-space

• Citation Style: APA Format

Attachment:- Research Paper Instructions.rar

Attachment:- Risk Management Plan.rar

Attachment:- Risk Mitigation Plan.rar

Reference no: EM132339965

Questions Cloud

Information technology management : Conduct research online to determine the challenges and issues that are related to information technology (IT) management.
Cryptographic protocols : Cryptographic Protocols- Prepare a PowerPoint presentation of the assigned and researched topic. Research the assigned topic to your team
Differences between linux security and windows security : Differences Between Linux Security and Windows Security. What is application security? A process and tools for securing software.
How you will apply what you learn from information security : How you will apply what you learn from Information security and risk management to your current job.
Information technology intern working for health network : You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered
Social-technical-legislative and environmental risks : An analysis of the key political, economic, social, technical, legislative and environmental risks that the organization is currently facing
Assignment discusses situational awareness : Assignment discusses situational awareness. Much of the security efforts of the past have been centered around prevention and protection.
Present sample simulation resembling the caffe nero : Discuss and present sample simulation resembling the Caffe Nero. Be creative and apply quantitative and qualitative measures as needed.
Erm adoption and implementation in higher education : Present a case study of "ERM adoption and implementation in Higher Education (HE) environments. The case review must be from an established organization.

Reviews

Write a Review

Operating System Questions & Answers

  1 what factors affect storage speed2 what features should

1. what factors affect storage speed?2. what features should you look for in a printer? describe at least four in

  A file system stores every file under a i-node

suppose a file system stores every file under a i-node similar to (but may not be the same as) the Unix V7 File System. The i-node contains 15 addresses, each address has 32 bits (4 bytes).

  What is the size of the physical memory

What type of memory, virtual or physical, is exhausted when there is a memory leak problem with a process - How much memory has the program used when reaching

  Explain the function of an operating system

1. Explain the function of an operating system 2. Describe the operating system security environment from a database perspective

  Question about about telecommunications

Think about a simple telephone network consisting of two end offices and one intermediate switch with a 1-MHz full-duplex trunk in each end office and the intermediate switch.

  Describing the different types of operating systems

Computerized Operating Systems (OS) are almost everywhere. We encounter them when we use out laptop or desktop computer. We use them when we use our phone.

  Describing the different types of operating systems

Computerized Operating Systems (OS) are almost everywhere. We encounter them when we use out laptop or desktop computer. We use them when we use our phone.

  Will it always be the result of one''s experience

Or do you forecast more and more automatic ways (algorithms?) to accomplish these tasks?

  Issues with trusted platform modulewrite a research paper

issues with trusted platform modulewrite a research paper discussing the issues with trusted platform module tpm. your

  What is the maximum size of the logical address

What is the page size in this system -  what is the maximum number of pages that can exist for a process and what is the maximum size of the logical address?

  Why does unix need to use a state to represent a process

Why does UNIX need to use a state to represent a process that no longer exists? How is the Zombie state used? Is the Zombie state really useful?

  How will users log onto the systems

How will users log onto the systems? Explain. How will systems receive IP addresses? Explain. How will DNS be accessed by the LSDG systems? Explain.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd