Categories
Cyber Security

What are the components of e-commerce?

Learning Goal: I’m working on a cyber security question and need an explanation and answer to help me learn.
Please post about the importance of e-commerce and online shopping to an organization’s marketing and sales program. What are the components of e-commerce? How are organizations using these technologies to increase sales and serve customers?
Instructions:
Each primary post must include at least two research references (cited in primary post) and be at least 500 words to be considered.
All research needs to be cited at the end of the primary post and PDF articles .Only academic research articles count.t
All articles can be derived from Google Scholar and must be “empirical studies” on the topic. Empirical studies must have three components: (research model, survey, and statistical tables and graphics). Article files must be turned in as PDF .

Categories
Cyber Security

Discuss the digitization of medical equipment.

Learning Goal: I’m working on a cyber security discussion question and need an explanation and answer to help me learn.
You are free to get more references from each topic
online if needed. Be sure to cite all references.
Format the answers as Times New Roman, 10 pt. Single Spaced, number all of the pages. Start each Question (#1, #2, and
#3) on a separate page by entering inserting a page break. Please write out a bold heading for each question and sub-heading
and answer the question. Insert page numbers at the bottom right of each page. Leave a blank line between sub-headings.
You may use the articles as a reference, please cite the author and exact page you are taking the information from or quoting.
Be sure to answer each question in in your own words. To be comprehensive, it is estimated that you will need to write about
1 page for each question (total of 5 pages total). If you use external articles, you will need to cite (with page numbers). Be sure to submit a bibliography at the end.
Questions
1. Healthcare ecosystem
a. Comprehensively discuss all of the industries in the healthcare ecosystem (based on Zoom class videos)
b. What are the 4 major digital challenges in the healthcare industry? Discuss each.
c. Discuss the digitization of medical equipment.
d. How will digitization play an important role in patient medical records?
2. Hospital administration
a. Discuss the obligations specific to hospital outpatient departments.
b. Discuss the obligations specific to off-campus hospital facilities.
c. Discuss the requirements specific to joint ventures between hospitals and physicians.
3. Privacy and security
a. Discuss why patient privacy matters.
b. Explain how the HIPAA either helps or hurts the burden of regulations in the industry.
c. What are the provider responsibilities under HIPAA.
d. Under what circumstances can a provider disclose a patient’s health information to another health care provider?

Categories
Cyber Security

What are the 4 major digital challenges in the healthcare industry? Discuss each.

Learning Goal: I’m working on a cyber security exercise and need an explanation and answer to help me learn.
You are free to get more references from each topic
online if needed. Be sure to cite all references.
Format the answers as Times New Roman, 10 pt. Single Spaced, number all of the pages. Start each Question (#1, #2, and
#3) on a separate page by entering inserting a page break. Please write out a bold heading for each question and sub-heading
and answer the question. Insert page numbers at the bottom right of each page. Leave a blank line between sub-headings.
You may use the articles as a reference, please cite the author and exact page you are taking the information from or quoting.
Be sure to answer each question in in your own words. To be comprehensive, it is estimated that you will need to write about
1 page for each question (total of 5 pages total). If you use external articles, you will need to cite (with page numbers) . Be sure to submit a bibliography at the end of the exam.
Questions
1. Healthcare ecosystem
a. Comprehensively discuss all of the industries in the healthcare ecosystem (based on Zoom class videos)
b. What are the 4 major digital challenges in the healthcare industry? Discuss each.
c. Discuss the digitization of medical equipment.
d. How will digitization play an important role in patient medical records?
2. Hospital administration
a. Discuss the obligations specific to hospital outpatient departments.
b. Discuss the obligations specific to off-campus hospital facilities.
c. Discuss the requirements specific to joint ventures between hospitals and physicians.
3. Privacy and security
a. Discuss why patient privacy matters.
b. Explain how the HIPAA either helps or hurts the burden of regulations in the industry.
c. What are the provider responsibilities under HIPAA.
d. Under what circumstances can a provider disclose a patient’s health information to another health care provider?

Categories
Cyber Security

Define the role of project/program management and process management.

Learning Goal: I’m working on a cyber security question and need an explanation and answer to help me learn.
Assessment Traits
Benchmark
Assessment Description
A major goal of a compliance risk assessment framework is to determine the company’s legal and reputational risk exposure in regard to adhering to laws and regulations, as well as all internal company policies and standards of conduct.
Build on to your “Business Profile” from Topic 1 and the “Challenge Your Hacking Skills,” assignment from CYB-610 by writing a 1,000- to 1,250-word report on compliance and security governance that includes the following:
Cybersecurity Risk Assessment:
Interpret risk assessments, gap analysis, and current cybersecurity trends to formulate a cybersecurity governance strategy that establishes mitigation plans for future challenges to achieve security . Describe the likelihood of risks occurring and the resulting impact. Identify threats to, and vulnerabilities of, those systems and assets based on various risk analysis methodologies. Express risks both internally and externally. Determine the acceptable level of risk (risk tolerance) with respect to technology, individuals, and the enterprise.
Privacy Risk Management:
Define the role of project/program management and process management. Describe how the business is integrating the compliance with applicable privacy laws and regulations, prioritizing and measuring progress with security policies. Analyze the ethical implications of cybersecurity policies and regulations put in place to protect the c, integrity, and availability of your organization’s intellectual property.
Compliance Gaps:
Summarize the various type of audits that should be effectively performed in order to keep a consistent measure of risk. Determine what type of gap analysis should be performed in order to properly identify the security elements and variables within the environment that pose the most risk. Formulate a cybersecurity governance strategy that establishes mitigation plans to achieve security objectives.
Security Measures:
Apply your knowledge to develop a security program, identifying goals, objectives, and metrics, and make the necessary modifications for the system security plans.
Note: Since this course is the culmination of the Business Continuity Plan, students may utilize or adapt any of their previous assignments from earlier classes in the program for assignments in this course.
While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.  An abstract is not required.
This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
You are not required to submit this assignment to LopesWrite.
Benchmark Information
This benchmark assignment assesses the following programmatic competencies:
MS Cybersecurity
4.3 Analyze the ethical implications of cybersecurity policies and regulations put in place to protect the Confidentiality, Integrity, and Availability of Intellectual Property.
4.4 Interpret risk assessments, gap analysis, and current cybersecurity trends to formulate a cybersecurity governance strategy that establishes mitigation plans for future challenges to achieve security objectives.

Categories
Cyber Security

Describe how security best practices and frameworks can be used as a reference to develop a cybersecurity program.

Learning Goal: I’m working on a cyber security question and need an explanation and answer to help me learn.
The main objective of information security frameworks is to lower the level of risk, reducing the possibility of a vulnerability and making the company more secure. The framework shows the details of the daily procedures to reduce exposure to risk.
Refer to your “Conduct a Risk Assessment,” assignment from CYB-650 and the “Develop a Business Impact Analysis Parts 1-3” assignments from CYB-630 and the “Business Continuity Plan” from the Topic 1 assignment.
Create a 10- to 12-slide digital presentation that demonstrates how to implement a security framework to identify and close gaps between an organization’s current cybersecurity status and its future target cybersecurity status. Make sure to align to an appropriate regulation (e.g., PCI DSS, HITECH, HIPAA, SOX, GLBA, or GDPR) and address the following:
Explain the current cybersecurity environment, such as development processes, paradigms, information, configuration management, and systems directly involved in the delivery of services.
Describe the current risk management practices, development threats, legal and regulatory requirements, business/mission objectives, and organizational constraints using the framework identified.
Describe how security best practices and frameworks can be used as a reference to develop a cybersecurity program.
Create a diagram related to the common workflow of information and decisions at the major levels within the organization.
Explain the critical cybersecurity needs that should be in place to ensure compliance with the appropriate regulation by differentiating from NIST, ISO/IEC 27000-series (e.g., PCI DSS, HIPAA, SOX, GLBA). Then, prioritize organizational efforts, business needs, and outcomes.
List and describe the elements of a software assurance maturity model.
Include title slide, reference slide, and presenter’s notes.
Additionally, include graphics that are relevant to the content, visually appealing, and placed appropriately.
Note: Since this course is the culmination of the Business Continuity Plan, students may utilize or adapt any of their previous assignments from earlier classes in the program for assignments in this course.
While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center. An abstract is not required.
This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
You are not required to submit this assignment to LopesWrite.

Categories
Cyber Security

Defines the specifications of required technologies.

Learning Goal: I’m working on a cyber security project and need support to help me learn.
Project 2: Cloud Vendor Presentation
Hide Assignment Information
Instructions
In this project, you will develop a detailed comparative analysis of cloud vendors and their services. A comparative analysis provides an item-by-item comparison of two or more alternatives, processes, products, or systems. In this case, you will compare the pros/cons of the cloud service providers in terms of security, ease of use, service models, services/tools they provide, pricing, technical support, cloud service providers’ infrastructure, and architecture model.
You will present your findings to the owner of the company in a narrated PowerPoint presentation with 10 to 20 slides. Use the Cloud Presentation Template.
This resource can help you prepare and record your presentation: Presentation Resources.
Presentation Guidelines
Your presentation should be comprised of the following:
One to two slides on the company profile.
One to two slides on what the company is struggling with.
One to two slides on current infrastructure.
Three to six slides on the top three cloud services providers. Include their service models (i.e., SaaS, PaaS, IaaS), services/tools/solutions (i.e., compute, storage, database, developer tools, analytics tools, networking and content delivery, customer engagement), pricing, accessibility, technical support for companies, global infrastructure.
One to two slides on a recommended cloud service provider based on the comparative analysis and the cloud vendor’s abilities to meet the service needs of the company.
One slide on the conclusion.
All slides must be narrated by you, the student.
How Will My Work Be Evaluated?
As a professional, you will likely make presentations to customers, client audiences, and management. By summarizing your results and recommendations in an effective presentation, you are demonstrating how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express recommendations to decision makers with the right mix of technical detail in an accepted format is an important workplace and career skill.
The following evaluation criteria aligned to the competencies will be used to grade your assignment:
1.1.1: Articulate the main idea and purpose of a communication.
1.1.2: Support the main idea and purpose of a communication.
2.1.1: Identify the issue or problem under consideration.
2.2.2: Evaluate sources of information on a topic for relevance and credibility.
2.3.1: State conclusions or solutions clearly and precisely.
10.1.1: Identify the problem to be solved.
10.1.2: Gather project requirements to meet stakeholder needs.
10.1.3: Define the specifications of required technologies.
13.1.1: Create documentation appropriate to the stakeholder.
13.2.1: Evaluate vendor recommendations in the context of organization requirements.
When you are finished, click “add a file” to upload your work, then click the Submit button.
Due Date
Jul 25, 2022 11:59 PM
Hide Rubrics
Rubric Name: Project 2: Cloud Vendor Presentation
Print Rubric
CriteriaExceeds Performance RequirementsMeets Performance Requirements
Approaches Performance Requirements
Does Not Meet Performance Requirements
Criterion Score
1.1.1: Articulate the main idea and purpose of a communication.
6 points
Articulates fully and clearly the main idea and purpose of the communication.
5.1 points
Articulates the main idea and purpose of a communication.
4.5 points
Attempts to articulate the main idea and or purpose of the communication, but one or both is not clear.
0 points
Does not attempt to articulate the main idea and purpose of communication.
Score of 1.1.1: Articulate the main idea and purpose of a communication.,
/ 6
1.1.2: Support the main idea and purpose of a communication.
6 points
Supports fully and appropriately the main idea and purpose of communication.
5.1 points
Supports the main idea and purpose of communication.
4.5 points
Attempts to support the main idea and/or purpose of the communication, but the support is lacking in some areas.
0 points
Does not support the main idea or purpose of communication.
Score of 1.1.2: Support the main idea and purpose of a communication.,
/ 6
2.1.1: Identify the issue or problem under consideration.
6 points
Identifies the issue or problem under consideration in a clear and thorough manner.
5.1 points
Identifies the issue or problem under consideration.
4.5 points
Attempts to Identify the issue or problem under consideration, but there is a lack of clarity or thoroughness.
0 points
Does not identify the issue or problem under consideration.
Score of 2.1.1: Identify the issue or problem under consideration.,
/ 6
2.2.2: Evaluate sources of information on a topic for relevance and credibility.
6 points
Evaluates sources of information thoroughly and appropriately on a topic for relevance and credibility.
5.1 points
Evaluates sources of information on a topic for relevance and credibility.
4.5 points
Attempts to evaluate sources of information on a topic for relevance and credibility, but there are gaps in the evaluation.
0 points
Does not evaluate sources of information on a topic for relevance and credibility.
Score of 2.2.2: Evaluate sources of information on a topic for relevance and credibility.,
/ 6
2.3.1: State conclusions or solutions clearly and precisely.
6 points
States well-conceived conclusions or solutions clearly and precisely.
5.1 points
States conclusions or solutions clearly and precisely.
4.5 points
Attempts to state conclusions or solutions, but they are not clear or precise.
0 points
Does not state conclusions or solutions.
Score of 2.3.1: State conclusions or solutions clearly and precisely.,
/ 6
10.1.1: Identify the problem to be solved.
14 points
Presents a relevant IT problem clearly and specifically.
11.9 points
Presents an IT problem that requires a solution.
10.5 points
Identifies an IT problem but may lack clarity and/or specificity regarding the need to be addressed.
0 points
Does not identify an IT problem to be solved.
Score of 10.1.1: Identify the problem to be solved.,
/ 14
10.1.2: Gather project requirements to meet stakeholder needs.
14 points
Identifies IT project requirements in a thorough and clear manner to meet all stated stakeholder needs.
11.9 points
Identifies IT project requirements to meet stated stakeholder needs.
10.5 points
Attempts to identify project requirements to meet stakeholder needs, but there are gaps and/or lack of clarity.
0 points
Does not identify IT project requirements to meet stated stakeholder needs.
Score of 10.1.2: Gather project requirements to meet stakeholder needs.,
/ 14
10.1.3: Define the specifications of required technologies.
14 points
Defines thoroughly and clearly the specifications of required technologies.
11.9 points
Defines the specifications of required technologies.
10.5 points
Attempts to define the specifications of required technologies, but there are gaps and/or lack of clarity.
0 points
Does not define the specifications of required technologies.
Score of 10.1.3: Define the specifications of required technologies.,
/ 14
13.1.1: Create documentation appropriate to the stakeholder.
14 points
Creates thorough and accurate IT documentation that exceeds requirements.
11.9 points
Creates IT documentation that meets requirements.
10.5 points
Creates IT documentation that lacks detail and/or does not fully meet requirements.
0 points
Does not create appropriate IT documentation.
Score of 13.1.1: Create documentation appropriate to the stakeholder.,
/ 14
13.2.1: Evaluate vendor recommendations in the context of organization requirements.
14 points
Evaluate and provides detailed justification for vendor recommendations in the context of organization requirements.
11.9 points
Evaluates vendor recommendations in the context of organization requirements.
10.5 points
Attempts to evaluate vendor recommendations in the context of organization requirements, but some recommendations lack detail or do not consider context.
0 points
Does not evaluate vendor recommendations in the context of organization requirements.
Score of 13.2.1: Evaluate vendor recommendations in the context of organization requirements.,
/ 14
TotalScore of Project 2: Cloud Vendor Presentation,
/ 100Overall Score
Exceeds Performance Requirements90 points minimum
Meets Performance Requirements80 points minimum
Approaches Performance Requirements70 points minimum
Does Not Meet Performance Requirements0 points minimum
Associated Learning Objectives
1.1.1: Articulate the main idea and purpose of a communication.
Assessment Method: Score on Criteria – 1.1.1: Articulate the main idea and purpose of a communication.
Required Performance: Meets Performance Requirements
1.1.2: Support the main idea and purpose of a communication.
Assessment Method: Score on Criteria – 1.1.2: Support the main idea and purpose of a communication.
Required Performance: Meets Performance Requirements
10.1.1: Identify the problem to be solved.
Assessment Method: Score on Criteria – 10.1.1: Identify the problem to be solved.
Required Performance: Meets Performance Requirements
10.1.2: Gather project requirements to meet stakeholder needs.
Assessment Method: Score on Criteria – 10.1.2: Gather project requirements to meet stakeholder needs.
Required Performance: Meets Performance Requirements
10.1.3: Define the specifications of required technologies.
Assessment Method: Score on Criteria – 10.1.3: Define the specifications of required technologies.
Required Performance: Meets Performance Requirements
13.1.1: Create documentation appropriate to the stakeholder.
Assessment Method: Score on Criteria – 13.1.1: Create documentation appropriate to the stakeholder.
Required Performance: Meets Performance Requirements
13.2.1: Evaluate vendor recommendations in the context of organization requirements.
Assessment Method: Score on Criteria – 13.2.1: Evaluate vendor recommendations in the context of organization requirements.
Required Performance: Meets Performance Requirements
2.1.1: Identify the issue or problem under consideration.
Assessment Method: Score on Criteria – 2.1.1: Identify the issue or problem under consideration.
Required Performance: Meets Performance Requirements
2.2.2: Evaluate sources of information on a topic for relevance and credibility.
Assessment Method: Score on Criteria – 2.2.2: Evaluate sources of information on a topic for relevance and credibility.
Required Performance: Meets Performance Requirements
2.3.1: State conclusions or solutions clearly and precisely.
Assessment Method: Score on Criteria – 2.3.1: State conclusions or solutions clearly and precisely.
Required Performance: Meets Performance Requirements

Categories
Cyber Security

Discuss IT improvement in healthcare ecosystem.

Learning Goal: I’m working on a cyber security question and need guidance to help me learn.
Prepare a class readiness paper with your analysis of how information technology can improve the healthcare ecosystem.
Papers should be formatted with headings:
Introduction to the topic area
Problems and 3 alternatives with IT improvement in healthcare ecosystem (Problem(s) with regards to the topic area
Internet of Things
This assignment is due no later than Wednesday, July 7, by 11:59 pm or earlier.
My topic only on Problem(s) with regards to the topic area and Internet of things on Information Technology Improvement Need brief for this topics only

Categories
Cyber Security

What Strategy you would take to encrypt data?

Learning Goal: I’m working on a cyber security writing question and need an explanation and answer to help me learn.
Research various different types of encryption techniques and highlight the four 4 most secured encryption techniques? and if you were Chief Security Officer in a Data Center, what Strategy you would take to encrypt data?
Please provide detailed answer and examples to support your response.

Categories
Cyber Security

What is a zero day attack?

Learning Goal: I’m working on a cyber security discussion question and need an explanation and answer to help me learn.
What is a zero day attack? How would you recommend a company defend itself against a zero day attack?