Create an overview of the HIPAA Security Rule and Privacy Rule. Analyze and describe the network architecture that is needed within an organization, including a medium-sized hospital, in order to be compliant with HIPAA regulations.

Imagine you are the Information Security Officer at a medium-sized hospital chain. The CEO and the other senior leadership of the company want to ensure that all of their hospitals are and remain HIPAA compliant. They are concerned about the HIPAA Security and Privacy Rules and its impact on the organization. You begin looking at the information provided by the Department of Health and Human Services, located at http://www.hhs.gov/ocr/privacy/hipaa/enforcement/index.html. Specifically, you are asked to provide an analysis of two (2) of the cases found here with emphasis on what was done to resolve the compliance issues.

Section 1. Written Paper
Non-compliance with HIPAA regulations can result in significant fines and negative publicity. To help ensure that your organization remains in compliance with HIPAA regulations you have been asked to write a three to five (3-5) page paper in which you:

1a. Create an overview of the HIPAA Security Rule and Privacy Rule.
1b. Analyze the major types of incidents and breaches that occur based on the cases reported.
1c. Analyze the technical controls and the non-technical controls that are needed to mitigate the identified risks and vulnerabilities.
1d. Analyze and describe the network architecture that is needed within an organization, including a medium-sized hospital, in order to be compliant with HIPAA regulations.
1e. Analyze how a hospital is similar to and different from other organizations in regards to HIPAA compliance.
1f. List the IT audit steps that need to be included in the organization’s overall IT audit plan to ensure compliance with HIPAA rules and regulations.
1g. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Identify the cyberlaw principles and explain how each applies to the business, e-commerce, or e-communication industries chosen. Describe the purpose that the application of the principles serves for the industry.

Submit the introduction for your final project. In this assignment, you will identify the cyberlaw principles and explain how each applies to the business, e-commerce, or e-communication industries chosen.

Describe the purpose that the application of the principles serves for the industry. Specifically the following critical elements must be addressed:

a) Apply cyberlaw and security principles to the business, e-commerce, and e communication industries. What purpose does the application of cyber principles serve for these industries?

b) Summarize the selected case, including the necessary organizational information, industry, problem, and time period of the incident.

You work as an IT analyst at XYZ Corporation, and your manager, Farah Ahmad, has asked you to develop a presentation for a new client on emerging trends and/or technologies that the client organization could integrate into its operations.

You work as an IT analyst at XYZ Corporation, and your manager, Farah Ahmad, has asked you to develop a presentation for a new client on emerging trends and/or technologies that the client organization could integrate into its operations. First, you must research emerging trends or technologies presented in a recent news report, trade magazine, research publication, or other source. Online resources are posted annually outlining the emerging trends and technologies for the current and coming year; make sure you search the Internet for these resources as part of your research. You will also discuss the change management strategies to be used during the adoption process, as well as the strategies for implementation and integration of these technologies into the organization. Note that this PowerPoint presentation will be divided into two parts: analyzing the trends and implementing the trends.

Describe the important pieces of information you would need to know, or need to take into consideration, about the emerging trend or technology in order to make a final decision.

Description of how you would go about assessing whether or not the adoption of an emerging trend or technology would add value to your company if you were the CEO. In your description, do the following:

  • Identify the main areas of value you would be looking to add to your business (e.g., profitability).
  • Describe the important pieces of information you would need to know, or need to take into consideration, about the emerging trend or technology in order to make a final decision.

In 250 to 300 words discuss the architectural components in your diagram in detail. Justify the choices that you made regarding standards and architectural configuration. What is the role of cloud computing, if any, in your architecture?

Review the reading Rapidly Deployable IoT Architecture with Data Security: Implementation and Experimental Evaluation article. This readings will assist you in developing your own architecture diagram for the consumer and prescribing provider mobile applications to be used to support the new THS Care 2U organizational brand. Your architecture diagram refers to the THS case.

For this discussion forum, you will be using Microsoft PowerPoint to develop your mobile computing platform architecture diagram. The architecture diagram is intended to summarize your proposed IT platform for the THS chief information officer (CIO). It should include all the various IT system architecture elements needed to support the launch and sustained maintenance of these mobile applications.
In this discussion forum
• Develop a plan for data-based and web server locations.
• Develop a network topography.
• Develop a model for connectivity of mobile users.
• Articulate the Internet standard to be used for web development.

In your initial discussion post, attach your single PowerPoint slide artifact with your architecture diagram. In 250 to 300 words discuss the architectural components in your diagram in detail. Justify the choices that you made regarding standards and architectural configuration. What is the role of cloud computing, if any, in your architecture? What are the potential risk points for data and network security in your architecture?

Identify at least two ethical issues that go along with the global societal topic you have chosen for your final essay.Will AI replace human workers? Do we want evil people to have easy access to AI technology?

Explain the implications of globalization

Identify at least two ethical issues that go along with the global societal topic you have chosen for your final essay.

Will AI replace human workers?

Do we want evil people to have easy access to AI technology?

Explain how globalization contributes to or affects these ethical dilemmas.

Propose solutions to these ethical dilemmas that are feasible financially, socially, and culturally.

 

How can organizations ensure their backup information is protected and the integrity of the backup is assured?

An organization is changing the way it works. For the past ten years, the organization has operated out of a downtown office, and all employees were expected to report onsite for work. Because of the increased costs of real estate, the executive management has identified substantial savings if all employees worked remotely from their homes and the organization maintained only a small office for meetings and executives downtown. The organization has never allowed outside access to its networks and has never allowed equipment off-premises prior to this change. Now employees are being issued laptops, tablets, and smartphones to do their work. What preventive information assurance controls and tools should the organization be concerned with as part of this change?

 

The CIO of an organization is trying to prioritize the information assurance workload of the organization. The CIO has asked the CISO to take vulnerability scanner output and add it to the organization’s dashboard. The CIO then tasks the organization’s system owners to correct the most “critical” vulnerabilities first. Is this the most prudent plan to minimize risk in the organization?

An organization is struggling. After years of investing in research and development, a competitor appears to have stolen design documents for the organization’s flagship product. The organization’s CISO has been asked to give a presentation to the board regarding the best metrics to monitor to prevent information leakage in the future. What information assurance metrics should the CISO propose?

Why should information assurance place such an emphasis on crisis management and business continuity when disaster recovery is an IT function?

How can organizations ensure their backup information is protected and the integrity of the backup is assured?

Analyze the security features within mHealth technologies and list the biggest securities threats for this technology. What is the biggest security/privacy implication facing mHealth technologies.

Analyze the security features within mHealth technologies and list the biggest securities threats for this technology.
Analyze the privacy features (or lack there of) within mHealth technologies and list all the potential privacy breaches for this technology.
In your own words (from reading the assigned material) what is the biggest security/privacy implication facing mHealth technologies.
Discuss some of the features and methodologies you can use to protect and secure health information when using a mHealth device.
Based on reading the assigned material do you feel the benefits of mHealth technology outweigh the security/privacy issues (explain your answer)?

You were hired as a forensic expert to investigate alleged contact between US and Russian officials. Prepare an official evidence report that incorporates all of the element stated

Instructions: Read the following scenario and then prepare an official evidence report that incorporates all of the element stated in the grading criteria below;

Case Scenario: You were hired as a forensic expert to investigate alleged contact between US and Russian officials. You performed a forensic analysis on the laptop and cell phone of a high ranking US government official. During the investigation you found the following:

  • On the phone – a text confirming a lunch meeting on 2/15/2016 and the phone number was labeled “Red Ralph” in the contact list.
  • On the laptop – several email communications about meetings and payment for “consulting services” between the official and RedRalph@gmail.com
  • On the laptop –  several deleted zip files of classified material that web logs show were uploaded to a file sharing site. It is not clear if they were downloaded by anyone. The owner of the laptop and phone has “lawyered up” and is not saying anything about what they were doing on either device or any meetings that may have happened. You are now prepare your official report to the special prosecutor as evidence that may go to court in the future.

Note: For the purposes of this report, all evidence is to be made up by the student.

How can the company get a general understanding of what is being discussed, and how it changes from week to week?Describe your text mining solution including choices of text preprocessing and data mining techniques (e.g., association rule, k-means, decision tree, etc.). 

Suppose that you work for AT&T, which runs customer discussion groups on its website. There are active discussion happening simultaneously – too many for the company to monitor them all.

    1. How can the company get a general understanding of what is being discussed, and how it changes from week to week?Describe your text mining solution including choices of text preprocessing and data mining techniques (e.g., association rule, k-means, decision tree, etc.).

 

  1. Each discussion page has slots for two ads. The company would like to select ads that are good match to the page. Assume that there are many ads. How are the best two ads for this web page are selected?  describe your text mining solution including choices of text preprocessing and data mining techniques (e.g., association rule, k-means, decision tree, etc.).

 

After observing the effectiveness of your solution for a while, the company realizes that advertising revenue could be improved if ad selection is tuned differently for people based on their primary interest in using the website. There are five types of primary interest: “phone hardware,” “phone GUI,” “phone apps,” “coverage,” and “price.” For a particular user, how can you use a person’s profiles (e.g., age, gender) and behavior (e.g., posts, comments, reading history) to predict which type of user he or she is? Please describe your text mining solution including choices of text preprocessing and data mining techniques (e.g., association rule, k-means, decision tree, etc.).