Question

(System Assurance Security) Layered Defenses Suppose you were tasked with creating a layered security approach for...

(System Assurance Security) Layered Defenses Suppose you were tasked with creating a layered security approach for a remote workforce in a healthcare organization. Consider the three (3) most important layered controls you would consider implementing for this workforce, and indicate why you believe those controls to be the most important

0 0
Add a comment Improve this question Transcribed image text
Answer #1

in layered secuirty approach importment parametesfor healthcare organisation these

integrity means data must be secure such as no one can modify or delect the content of data or misuse of data , authenticity means must be focused on data is handle by authenticate person only and also valid person only can see and check the data , non-repudiation secure area may use a card system or password . non-repudiation would be misuse if cards were shared or password is change and stolen cards were updated immediatly. user should be share the personal infromation to others .

those controls are important the system to secure the information and consider techanical aspects such as must use digital signature ,apply antivirus protection and also worked on strong firewall to secure the system for outside attackers.

Add a comment
Know the answer?
Add Answer to:
(System Assurance Security) Layered Defenses Suppose you were tasked with creating a layered security approach for...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Assume you were implementing a security strategy for an organization that had no previous security operations;...

    Assume you were implementing a security strategy for an organization that had no previous security operations; determine the first three security controls you would consider implementing and explain why you believe these are the most important to commence these efforts

  • Give your opinion on what you believe to be the greatest IT security concern facing businesses...

    Give your opinion on what you believe to be the greatest IT security concern facing businesses today and explain the main reason(s) why you believe such is the case. Additionally, propose at least one security control that a business could consider implementing in order to protect against the IT security concern in question. Read the article titled "10 security best practice guidelines for consumers". Next, identify the security practice guideline that you believe consumers should. educate themselves with the most...

  • Analyzing and Creating Value for Stakeholders For this discussion, consider important stakeholders from an organization you...

    Analyzing and Creating Value for Stakeholders For this discussion, consider important stakeholders from an organization you are familiar with or from those at Independence Medical Center presented in the Vila Health: Analysis of an EHR System. If you were going to implement improvements in an EHR or HIT system, who would be the most important to get onboard? Additionally, how could you illustrate value to the relevant groups to help create buy-in for specific improvements? Keep these thoughts in mind...

  • Introduction The result of implementing a total quality management system in any organization is that it...

    Introduction The result of implementing a total quality management system in any organization is that it continuously serves the needs of its customers (both internal and external) in an efficient and effective manner. Therefore, in order for Total Quality to function as designed (plan), systems must be instituted (do), studied (check), measured, and reviewed (act) for effectiveness. Accomplishing this cycle of improvement requires an interacting set of systems that operate in tandem. These systems are represented by categories in Figure...

  • 1. Is it actually more effective, for you, to draw a few sketches to think something...

    1. Is it actually more effective, for you, to draw a few sketches to think something through before you code. Why or why not? 2. What are the trade-offs of modeling with others? In what situations would you be faster or slower? Get a better result? Learn something new? 3. Discuss the advantages and disadvantages of working closely with your business stakeholders. Who would you consider a stakeholder and why? 4. How long would you keep a sketch for? Why?...

  • Implement information system project What is e-learning? What is proof you have the individual difference matter...

    Implement information system project What is e-learning? What is proof you have the individual difference matter in the computer training? Why do corporations are lights to a heavily on vender support.? Describe the delivery methods many vendors employee for providing? Describe the various roles could be found in a helpdesk function? What are the common security threats to systems? How can they be address? One of the most difficult aspects of using the single location of pros to installing is...

  • CHapter 8 from 978-0-13-408504-3 (Security in Computing 5th Edition) 1. Explain the differences between public, private,...

    CHapter 8 from 978-0-13-408504-3 (Security in Computing 5th Edition) 1. Explain the differences between public, private, and community clouds. What are some of the factors to consider when choosing which of the three to use? 2. How do cloud threats differ from traditional threats? Against what threats are cloud services typically more effective than local ones? 3. You are opening an online store in a cloud environment. What are three security controls you might use to protect customers’ credit card...

  • Suppose you were able to choose three fossils to extract DNA from and your goal was...

    Suppose you were able to choose three fossils to extract DNA from and your goal was to test the hypothesis that completely modern humans evolved in Africa. Which three would you pick? Explain why. Important information: This discussion is to focus on MODERN humans. That means hominids that appeared in the fossil record after 300kya. Please focus on the topic. Consider how you would use DNA to test the origins of modern humans. No discussion of apes, australopithecines and earlier...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Most motivation theories in use today were developed in the United States by Americans and about...

    Most motivation theories in use today were developed in the United States by Americans and about Americans. Of those that were not, many have been strongly influenced by American theories. But several motivation theories do not apply to all cultures. For example, Maslow’s theory does not often hold outside the United States. In countries higher on uncertainty avoidance (such as Greece and Japan) as compared with those lower on uncertainty avoidance (such as the United States), security motivates employees more...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT