Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

John Miller is the information security and privacy officer of a local county-owned teaching hospital. He is new to his position and began his work by evaluating the existing security and privacy controls that are in place in the institution. He is also new to information security, having only recently graduated with a BS in information security with professional experience as an active-directory administrator for two years. This work with active directory created his interest in pursuing a position in the field of security. Because he has most experience in the area of account management, user creation and management, groups, roles and group policy, these are the areas where he began his work. He found literally hundreds of idle accounts indicating that users are created but are not properly discontinued when medical students, nursing students, and other employees move on and no longer need access to the data collected and stored by the hospital.

This discovery inspired him to begin digging into other aspects of the security controls, and he found evidence of malware on the servers that house the data collected and stored for use by the hospitals clinical systems. His next discovery was the most alarming. The objective of the malware that had deeply infested the hospital systems was to package and transmit all available data to a remote host located in North Korea. John is clearly in over his head at this point and needs to act quickly to resolve this situation and stop the flow of personally identifiable health information to an unauthorized third party.

Use the study materials and any additional research needed to fill in knowledge gaps. Then discuss the following:

1. What primary laws, regulations, or statutes have been violated by this lack of attention to controls, leading to this serious breach of security?

2. What channels of communication should John enlist to assist him in resolving this matter, and in what order should those communication sources be contacted?

3. What tools and any supporting resources are available to John to determine the breadth of the breach and the mitigations available to secure those assets?

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M91769693
  • Price:- $20

Priced at Now at $20, Verified Solution

Have any Question?


Related Questions in Management Information System

Assessment instructionsnote the assessments in this course

Assessment Instructions Note: The assessments in this course build upon each other, so you are strongly encouraged to complete them in sequence. For this assessment, you will complete a data security strategy. This is do ...

This assignment consists of two 2 sections a project

This assignment consists of two (2) sections: a project introduction and a project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the sectio ...

Question you have been asked by management to secure the

Question : You have been asked by management to secure the laptop computer of an individual who was just dismissed from the company under unfavorable circumstances. Pretend that your own computer is the laptop that has b ...

Assignment 1resource read ch 3 to 4 of the spirit catches

Assignment 1 Resource: read Ch. 3 to 4 of The Spirit Catches You and You Fall Down. After reading the article write a 175- to 265-word response to the following: do publicly funded health care programs overrule cultural ...

Provide a background of the organizationhow was the

Provide a background of the organization. How was the organization impacted? What losses did it suffer? Describe the disaster recovery and business continuity that the business had in place? What were the lessons learned ...

Each case needs to be at least 250 words apa citation

Each case needs to be at least 250 words. APA citation required. Each case needs to be written separately. Turnitin check required. Case 1: Select a company either real or fictious. Completely describe the company includ ...

Background kirk 2016 designed his text to help understand

Background: Kirk (2016) designed his text to help understand the four steps involved in working with data. Kirk (2016) Discuss the following working with data steps: Data acquisition, data examination, data transformatio ...

Response 1annotations have been identified as an important

Response 1 Annotations have been identified as an important aid in analysis record-keeping and recently data discovery. In this paper we discuss the use of annotations on visualization dashboards, with a special focus on ...

Question what are some of the key factors to consider when

Question : What are some of the key factors to consider when gathering requirements for a network? What difficulties might you encounter in this process, and how might you mitigate the problems? Discuss some methods you ...

Designing team and team identitypart 1 think about how to

Designing Team and Team Identity Part 1: Think about how to build teams in terms of designing the task, selecting the people, and then, managing their relationships. How would compose a team for completing a course/work ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As