One slide will consist of a LAN diagram


Consider the following scenario:

The senior systems analyst has tasked you to conduct a briefing on the different types of firewalls. In this briefing, you must show a diagram of where on the LAN the firewalls are placed on the network.

Utilize the following guidelines to create your PowerPoint presentation:

  • One slide will consist of a LAN diagram of the location of a firewall.
  • The other three slides should describe the types of firewalls.
  • Utilize the Notes section of the slides to explain phases and additional information (this is required).

Your completed PowerPoint presentation should be six slides in length, which includes your title and reference slides. You should present your text in bulleted lists and add additional information in your notes section of the slides. Include at least two sources in your assignment. All sources used must be referenced; paraphrased and quoted material must have accompanying citations and be cited per APA guidelines. Make sure you format your presentation according to APA style. If you need a refresher on how to create a PowerPoint presentation, refer to the Writing Center resources included in the Unit I PowerPoint assignment instructions.

What steps should the facility take to ensure data recovery?

You have just been hired as the HIM manager for a skilled nursing facility. While this facility has had a medical records department, the department has been staffed by a rotation of nursing staff and the front office clerical staff. The facility has just hired you as the manager, one coder, and two clerks. The facility has plans of implementing an EHR. You have recently created a Data Integrity and Quality Policy and Procedure. The next task you have been given is to develop a risk assessment, contingency plan, and data recovery procedures.

  1. Using the attached assignment file Unit 2 Key Assignment LO#5: Data Protection Risk Assessment Form, create a contingency plan checklist. Have at least 25 items on your checklist.
    • If the EHR went down, what should the facility do?
    • What steps should the facility take to ensure data recovery?
    • Think about a natural disaster happening such as a hurricane or flood, how can the information lost be recovered?
    • What steps should be taken to prevent the loss of data?
  2. Create a one-page summary in APA format discussing the steps that should be taken and addressing health information archival and retrieval system.
  3. Submit your risk assessment, contingency plan, and summary for grading.

Assignment Objectives

  • Meet CAHIIM Curriculum requirement for Bachelor Degree
    • Domain II. Information Protection:  Access Disclosure Archival Privacy and Security
    • Subdomain II.B. Data Privacy Confidentiality and Security
    • Section 3. Collaborate in the design and implementation of risk assessment, contingency planning, and data recovery procedures
    • Competencies: Health information archival and retrieval systems

Advanced Encryption Standard (AES) and the Data Encryption Standard (DES) algorithm

Research the Advanced Encryption Standard (AES) and the Data Encryption Standard (DES) algorithm and write two paragraphs summarizing explaining how it works with examples.

A discussion question will be posted prior to the start of the assigned unit. A detailed response to the discussion is required No Later Than (NLT) the following Wednesday, 11:59 pm ET of each week. At least two replies to your classmates’ posts should be posted NLT end of the unit, Sunday of each week. In order to receive full credit for the discussion posts, you must include at least two citations (APA) from academic resources (i.e. the textbook, U of Cumberlands Library resources, etc.) with a 100-word minimum. One of the discussions was assigned by the department and requires more words. If it specifically requires more for that discussion please follow those requirements. Please post any APA or Discussion Guideline Questions to this Thread.

Here is a link to an APA Online Formatting Guide Resource

Please do NOT attach a separate document for discussion responses unless requested. All discussion posts should be completed inline in the textbox with word wrap utilized.

Explain the difference between a threat and a vulnerability and how business need

Explain  the difference between a threat and a vulnerability and how business need to protect against each type.

Your initial response is due by Thursday 11:59PM. It must be at least 250 words and have references.

Your grade will reflect both the quality of your initial post and the depth of your responses. Refer to the Discussion Forum Grading Rubric under the Settings icon above for guidance on how your discussion will be evaluated.

Guided Response: Respond to at least two of your classmates’ posts. Evaluate their discussions by agreeing, disagreeing, or adding other ideas to strengthen or enhance the perspectives presented in their initial posts.

high-level overview of the Information Systems Security Policy Management:

Chapter 1 provided a high-level overview of the Information Systems Security Policy Management:

Information Systems Security (ISS). What is it? The act of protecting information and the systems that store, process and transmit

Why is ISS needed? ISS provides a foundation for establishing protection of systems and data against risks such as: Unauthorized access and Use, Disclosure, System Disruption, Modification or Corruption


After reading chapter 1 and looking at the ISS Management Life Cycle.

Let’s look at a real-world scenario and discuss what C-I-A Triad is all about.

You must do the following:

1) Create a new thread. As indicated above, please explain how DHS should handle the situation described in the preceding paragraph.

refer the attached file below PPT chapter 1

Describe the evolving mobile platform and the role grid computing appears to be playing.

Answer the following essay questions:

1. What are crucial indicators that would suggest open source software be used? Explain.

2. Describe the evolving mobile platform and the role grid computing appears to be playing.

3. Provide at least two examples of software mash ups and why they bring competitive advantage?

4. What are the key benefits and limitations of a relational DBMS?

5. What are data audits? Why do organizations need to have these done?

6. Read the case study, “Should Business Move to the Cloud?” on page 204 of the textbook. What are the compelling benefits cloud computing might bring to an organization? Does the size of the organization matter and if so, why?

Describe in detail the nature of paper medical records

Making decisions regarding proper access controls does not always require a detailed understanding of information technology. As a matter of fact, some of the most important opportunities for improving access controls are non-technology-based systems such as paper medical records.


Consider a paper medical records system that might be in use by a small doctor’s office. Access to these medical records must be protected just as access to electronic health information must be protected.  Based on your understanding of access controls do the following:

  • Describe in detail the nature of paper medical records so that it is clear what an access control policy would be protecting.
  • Choose and describe two physical access control rules which should be implemented for paper medical records.
  • Choose and describe two user access controls which could be implemented for paper medical records.  Note that in this context such access controls would likely be implemented in the form of an office policy.
  • Comment on two ways that user access controls for paper medical records are similar to user access controls for electronic health records.

Your paper should include the following criteria:

  • 2-3 pages in length, double-spaced.
  • Free of spelling, grammar, punctuation errors, APA format, and In-text citation.

Submit your completed assignment by following the directions linked below. Please check the Course Calendar for specific due dates.

Save your assignment as a Microsoft Word document.

Develop an information systems solution to address an organizational problem.

The executives are taking your information system proposal seriously. In fact, they think it has the potential to transform the way the organization works.

The CIO asked you to read Too Much of a Good Thing to think about what resources you will need to get your new information system up and running. Please also review the five case studies in The Leader’s Role in Managing Change so you can recommend a change management pattern for your company to follow.

Write a memo to the CIO that describes how to implement your information system into the organization. Please focus on these topics:

  1. How much of the implementation work can you handle? What additional resources (people, information, time, money, etc.) will expedite the process so you don’t end up like Susie Jeffer?
  2. What is your change management strategy? Provide an outline. Consider:
    • What new equipment and software are necessary?
    • What training and support will the staff need?
    • How will the staff complete their work during the transition period?
    • Do you anticipate other areas of resistance?

The CIO is very skeptical, so provide evidence that your assessment is accurate and complete. It can be difficult to admit to personal limitations!

Your memo should be 3–5 pages long.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.

The specific course learning outcome associated with this assignment is:

  • Develop an information systems solution to address an organizational problem.


Brett Connelly. 2016. Too Much of a Good Thing: User Leadership at TPAC.

Kallol Kumar Basu. 2015. The Leader’s Role in Managing Change: Five Cases of Technology-Enabled Business Transformation. Global Business & Organizational Excellence, vol. 34, no. 3, pp. 28–42.

Information Systems Risk Controls and Auditing Management

Navigate to the PracticeLabs course “CYB/407 – Information Systems Risk Controls and Auditing Management, Practice Lab Week 2.” The lab replicates a Windows 10 computer that has the HIPAA Security Rule (HSR) Toolkit installed. Directions for navigating the HSR Toolkit are provided in the lab.

Follow the instructions for choosing specific security controls to address the listed vulnerabilities.

Take screenshots from the HSR Toolkit for your responses to the selected security control questions within the HSR Toolkit. You will submit the screenshots along with the worksheet.

Part 2 – Worksheet:

Complete the 3- to 4-page Wk 2 Assignment Template.

For each of the three vulnerabilities complete the following:

  • Cross-reference the HSR Toolkit questions to specific security controls within NIST SP 800-53a. (For example, for the Training question within the HSR Toolkit, the corresponding  security controls within NIST SP 800-53a would be within the Awareness and Training Control Family (AT).)
  • Use NISTSP 800-30 to accurately calculate the risks.
  • Correctly describe how each selected question from the HSR Toolkit can help reduce the risks associated with the vulnerability.
  • Pastethe screenshots into the worksheet.

Cite all references according to APA guidelines.

Define the components of the Porter’s competitive forces model

Answer the following essay questions:

1. Define the components of the Porter’s competitive forces model and describe how it could be used effectively to the benefit of an organization you know well.

2. How do businesses use value chains to discover opportunities?

3. Describe the positive and negative impacts on societal quality of life due to the use of computers and information systems?

4. List three different ethical principles one should employ when confronted with an ethical conflict, and explain their use employing an example you have personally experienced.

5. With different types of computer systems available, how can these be used to sustain competitive organizational advantage?

6. How does our use of the Internet make it difficult to protect individual privacy and intellectual property? Identify two changes, either technical or behavioral, that you believe are crucial in order to improve this situation.