Secure data access and encryption of a patientdatabase

Assignment Help Basic Computer Science
Reference no: EM13701009

OverviewIn this lab, you implemented policies that map to the Sarbanes-Oxley Act (SOX), the PaymentCard Industry Data Security Standard (PCI-DSS), and the Health Insurance Portability andAccountability Act (HIPAA). You ensured secure data access and encryption of a patientdatabase. You backed up and restored patient data. You also ensured access controls on a pointof sale (POS) system by adding distinct user accounts. You configured a host-based firewall toprotect the cardholder information. Finally, you scanned the POS system for vulnerabilities toidentify security risks.

Lab Assessment Questions & Answers

1. With what section of SOX would the IT professional deal the most, and why?

2. Under HIPAA, when is a health care provider required to notify all patients and theDepartment of Health and Human Services when a security breach is discovered?

3. Which database is more secure: the Java-based Apache Derby or MySQL?

4. Which types of businesses or entities are governed by HIPAA?Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.www.jblearning.com Student Lab Manual

5. According to the PCI Quick Reference guide, who must comply with PCI-DSSstandards?

6. What are the 11 titles of mandates and requirements for SOX compliance?

7. What purpose may COBIT serve to help comply with regulations such as SarbanesOxley?

8. What is RDP? What port number does it use?

 

Reference no: EM13701009

Questions Cloud

Absorption isotherm for water in this polymer is linear : A polymeric material is being considered as a coating film to protect an optical storage disk from water vapor damage. Suppose we need to protect a disk surface from an ambient medium that will be at 45% relative humidity at 25° C. How thick must the..
Prepare the report requested by mrs. daycon : Daycon' president felt that with an aggressive marketing campaign, relocation of some of the locations and with a new corporate name, BL should be able to rebound and return to a profitable position by the end of the year.
Ap is the amount of autonomous planned : Where Y is real GDP, Ap is the amount of autonomous planned spending that is independent of the interest rate, Ms is the nominal supply, P is the price level, and W is the nominal wage rate. Assume that Ap equals 5,000, Ms equals 2,000, W equal..
Architecture to assist in the decision-making process : Using enterprise architecture to assist in the decision-making process, write a 1500 words paper in which you do the following:Determine activities that you believe would be appropriate for outsourcing.
Secure data access and encryption of a patientdatabase : OverviewIn this lab, you implemented policies that map to the Sarbanes-Oxley Act (SOX), the PaymentCard Industry Data Security Standard (PCI-DSS), and the Health Insurance Portability andAccountability Act (HIPAA). You ensured secure data acce..
Baking in the vertex colors : Render the sphere in Part I by baking in the vertex colors, for every vertex calculate its vertex normal by averaging the face normals. Normalize it and then pass the normalized value as a Hue Saturation and Lightness color value i.e. x -> H y-..
Profession might be held liable for negligence : The paper should be 5 to 7 typed pages. Professional Liability-select an allied health (nonphysician) profession; this can be your own profession or another profession that interests you. Some examples of allied health professions include phys..
An anonymous block to include two sql statements coded : Write a script that uses an anonymous block to include two SQL statements coded as a transaction to delete the row with a customer ID of 8 from the Customers table. To do this, you must first delete all addresses for that order from the Address..
Public key cryptography : Write a paper about "Public Key Cryptography".The paper will be at least 1,250 words in length. APA formatting must be used, along with proper citations in APA format. At least seven (7) reputable sources will be cited, and at least three (3) o..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd