What types of policies are needed

Assignment Help Computer Engineering
Reference no: EM132146794

Question: Recently it has become obvious that people are storing data where it does not belong and people are accessing files and directories that they should not have access to.

Elizabeth Montgomery is in charge of the team dealing with designing, maintaining and implementing policies for users and data. You are Elizabeth Montgomery and her team. You need to respond to this incident by taking action immediately.

You will need to complete the following:

Securing the IOT connected devices in HEALTH CARE

1. Summarize the issues that face research hospitals

2. What types of policies are needed?

3. What core principles apply here?

4. What would be the best framework to use for a research hospital?

5. What User Domains should there be?

• Be sure to define who the groups are

• What files and folders containing what type of data should they have access to?

6. How would you go about implementing the changes?

7. What policies need to be in place to address the issues?

Research paper: • Research Paper must be in APA Style

• Research Paper must have at least 5 works cited of which 2 must be peer reviewed works/articles (note your book can be included as a reference)

• Must be at least 10 double-spaced pages with standard 1 inch margins.

• 6 - 8 pages of prose

• Limit the number of bulleted lists

• Prose + charts + figures = 10 pages

Reference no: EM132146794

Questions Cloud

What compliance issues and ethical issues are there : Develop a BYOD policy, in conjunction with a deployment of an MDM device for a medium sized hospital.
Importance of a documentation plan : What's the importance of a Documentation Plan? Please provide an example of a Documentation Plan that you would use.
What kind of mitigations would you recommend : Why was it so much more effective than previous BotNet designs? What kind of mitigations would you recommend for protection?
Explain what would happen if a programmer : Explain what would happen if a programmer were to inadvertently place the call to exec() before the call to fork().
What types of policies are needed : Recently it has become obvious that people are storing data where it does not belong and people are accessing files and directories that they should not have.
Marketing programs logical-consistent across related brands : Similarly, are the supporting marketing programs logical and consistent across related brands?
Discuss the needed short-term and long-term goals : Discuss the needed short-term and long-term goals needed to be achieved in order to accomplish your organizational change.
Hazards impact the performance gain : Please discuss the data hazards associated with pipelining with an example and how these hazards impact the performance gain associated with pipelining.
Analyze key elements of training and development geared : Analyze key elements of training and development geared toward improving the performance of the specific small business for which you are consulting

Reviews

Write a Review

Computer Engineering Questions & Answers

  What distinguishes sheet metal from foil or plates

Why should we not use the assembly modeling approach to create welded parts as assemblies? Define sheet metal. What distinguishes it from foil or plates?

  Explain briefly the reasons behind the given trend

In parallel processing systems with multiple processors, there has been a trend away from shared media interconnects. Explain briefly reasons behind this trend.

  Implement constraint satisfaction problem - Sudoku Puzzles

CS 550 - Artificial Intelligence Assignment contains a partially implemented constraint satisfaction problem class for solving Sudoku puzzles

  Create a set of use cases for health club membership system

Create a set of use cases for the following health club membership system: When members join the health club, they pay a fee for a certain length of time.

  What are the possible security threats

What are the possible security threats that have a direct effect on a company's network performance? What is network optimization?

  What is not working properly since you can get to a site

What isn't working properly, since you can get to a site via the Internet but can't get the domain name CNN to be recognized?

  Create a depreciation schedule showing depreciation amounts

Create a depreciation schedule showing annual depreciation amounts and end-of year book values for a +26,000 asset with a 5-year service life.

  Investigate and describe how data is structured stored and

there are six problems that can be minimized by using the database approachdata redundancydata isolationdata

  How the relationships can be classified

What are these different kinds of classifications? Do they overlap, or do they each tell us something unique about the entity relationship? Why is it important to classify each of these types in an ERD (entity relationship diagram) model?

  Explain why 802.11b is the first popular standard

the first widely popular standard and still by far most used by IT industry today.

  Why keys usually partitioned first by significant position

In radix sort, why are the keys usually partitioned first by the least significant position, not the most significant?

  What would be some of the risks associated

In your role as a project manager at an IT company, you are tasked with shortening the critical path of the project and saving money. Is this possible?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd