Provide a presentation to the csu medical center

Assignment Help Management Information Sys
Reference no: EM131842164

You are a security specialist and have been asked to provide a presentation to the CSU Medical Center. Your audienceconsists of medical receptionists, doctors, and finance personnel.

Summarize the concepts of the threat triad and C-I-Atriad on how patient information is handled by the different jobs within the medical facility.

Hint: Does the receptionist needbilling information, or the finance department need patient prognosis, or do doctors need patient addresses?

Explain whoneeds what information and how C-I-A helps protect that information.

Your completed PowerPoint presentation should be 8 to 10 slides in length. This does not include your title and referenceslides.

Use bullet points for your text, add additional information in your notes section of the slides, and include a minimumof four graphics or pictures.

Include at least two sources in your assignment.

All sources used must be referenced; paraphrased and quoted materialmust have accompanying citations and be cited per APA guidelines.

Make sure you format your presentation according to APA style.

Reference no: EM131842164

Questions Cloud

Event pertaining to an issue of business ethics : Use one of the ethical theories we have discussed in class in order to call the ethicality of the current practice into question
What policy should the us take on drugs : What policy should the U.S. take on drugs? What are the health policy and economic issues created as a result of the topic of this movie?
What discussions and developments concerning the concept : What discussions and developments concerning the concept of "Deity" occurred during the time period before Socrates?
Explain one criticism of mill : Explain one criticism of Mill. Afterward, argue for which ethical approach, on your view is superior. Be specific and provide reasons for your claim
Provide a presentation to the csu medical center : Summarize the concepts of the threat triad and C-I-Atriad on how patient information is handled by the different jobs within the medical facility.
Part of the income generated by an ice cream machine : "Part of the income generated by an ice cream machine is saved to purchase a new machine in the future.
Buddhism or women in hinduism vs women in buddhism : Good title to capture the essence of my topic which is of women in hinduism and buddhism or women in hinduism vs women in buddhism
Why does a doctor serve as the patients agent making choices : Why does a doctor serve as the patient's "agent," making choices about which hospital and what medicine to use? Are they biased in their decisions?
Develop your exploration using specific examples : To respond, explore the difference between an examined life and an unexamined life; develop your exploration using specific examples from the text

Reviews

Write a Review

Management Information Sys Questions & Answers

  Perform a search on the web for articles

Perform a search on the Web for articles and stories about social engineering attacks or reverse social engineering attacks.

  Examine the prevalence of honey pots and honey nets

Examine the prevalence of honey pots and honey nets? Evaluate the advantages and disadvantages of using each. Explain which one of the two you would recommend your organization use and why?

  Is the data from different sources consistent

Is the data from different sources consistent? Are these the results we expected? What new course should be charted or taken as a result of new knowledge derived from the data?

  Using mysql create a database with a table named noveltitles

Using MySql create a Database with a table named NovelTitles that has the following attributes Novel Name, Author, Genre, Main Character and Rating/Review.Create an HTML Form that allows the above attributes to be added/deleted to the data base

  Physical and environmental security

Research the Internet for the physical and environmental security measures taken by an organization of your choice. Also, read the NIST publication of Security Guide for Interconnecting Information Technology Systems

  Define an auditing plan which includes scope and benchmark

Define an auditing plan which includes: scope, benchmarks, data-collection, post-audit activities, log management and testing of security systems.

  A description of the ethical issue faced by the company

Write a paper of approximately 3 pages on the company and topic chosen in terms of both the personal and professional ethical issues that existed.

  Explain the it solution you are proposing

Your annotated outline will define and explain the IT solution you are proposing and address each of the next steps shown below that UMUC Haircuts will take to implement your technology solution

  Apply ethics to information systems

Write an analysis of ethical considerations for maintaining privacy and confidentiality of customer data within your organization. Address the following issues in your analysis: Define ethics. Apply ethics to information systems

  Describe enterprise architecture

Using the DMV case study provided, determine how an EA could be used to help the DMV accomplish the objectives stated explicitly and implicitly in the case study

  Produce a cognitive map on a provided mis topic area

Produce a Cognitive Map (using FreeMind) on a provided MIS topic area (see list of topics below): Expectations are that the map will have a minimum of:

  What steps need to be taken to implement your solution

What are indirect costs (time lost by personnel; health benefits; insurance for equipment; unexpected delays)? What will be the total cost? How do you arrive at the total?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd