What types of policies are needed

Assignment Help Computer Engineering
Reference no: EM132146794

Question: Recently it has become obvious that people are storing data where it does not belong and people are accessing files and directories that they should not have access to.

Elizabeth Montgomery is in charge of the team dealing with designing, maintaining and implementing policies for users and data. You are Elizabeth Montgomery and her team. You need to respond to this incident by taking action immediately.

You will need to complete the following:

Securing the IOT connected devices in HEALTH CARE

1. Summarize the issues that face research hospitals

2. What types of policies are needed?

3. What core principles apply here?

4. What would be the best framework to use for a research hospital?

5. What User Domains should there be?

• Be sure to define who the groups are

• What files and folders containing what type of data should they have access to?

6. How would you go about implementing the changes?

7. What policies need to be in place to address the issues?

Research paper: • Research Paper must be in APA Style

• Research Paper must have at least 5 works cited of which 2 must be peer reviewed works/articles (note your book can be included as a reference)

• Must be at least 10 double-spaced pages with standard 1 inch margins.

• 6 - 8 pages of prose

• Limit the number of bulleted lists

• Prose + charts + figures = 10 pages

Reference no: EM132146794

Questions Cloud

What compliance issues and ethical issues are there : Develop a BYOD policy, in conjunction with a deployment of an MDM device for a medium sized hospital.
Importance of a documentation plan : What's the importance of a Documentation Plan? Please provide an example of a Documentation Plan that you would use.
What kind of mitigations would you recommend : Why was it so much more effective than previous BotNet designs? What kind of mitigations would you recommend for protection?
Explain what would happen if a programmer : Explain what would happen if a programmer were to inadvertently place the call to exec() before the call to fork().
What types of policies are needed : Recently it has become obvious that people are storing data where it does not belong and people are accessing files and directories that they should not have.
Marketing programs logical-consistent across related brands : Similarly, are the supporting marketing programs logical and consistent across related brands?
Discuss the needed short-term and long-term goals : Discuss the needed short-term and long-term goals needed to be achieved in order to accomplish your organizational change.
Hazards impact the performance gain : Please discuss the data hazards associated with pipelining with an example and how these hazards impact the performance gain associated with pipelining.
Analyze key elements of training and development geared : Analyze key elements of training and development geared toward improving the performance of the specific small business for which you are consulting

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd