Quiz IT electronic documents management

1-The HIPAA Security Rule protects:

verbal data

electronic data

written data

All of the above

2-According to HIPAA, PHI does NOT include:

IP addresses

Patient’s past medical treatment information

Payments for  health care provision

Health information with the identifiers removed

3-Which of the following access control mechanisms used to prevent employees from copying a document labeled with high security to another document labeled with ‘public’?

Firewall

Zones

Encryption

Archive

4-It would be appropriate to release patient information to:

the patient’s (non-attending) physician brother

personnel from the hospital the patient transferred from 2 days ago, who is calling to check on the patient

the respiratory therapy personnel doing an ordered procedure

retired physician who is a friend of the family

5-Healthcare providers must ensure the confidentiality, integrity, and availability of electronic protected health information (ePHI) that the covered entity creates, receives, maintains, or transmits under:

HIPAA

EHR

FCRA

FERPA

6-The mission of the law is to protect consumers’ personal financial information held by financial institutions

PCAOB

PHR

HIPAA

GLB

7-Which of the following statements about retention principles is true?

Organizations should keep business records as long as possible.

We only need to manage the records that are in use.

How long the records should be kept depends on  the legal requirements and business needs.

Due to the security consideration, organizations should retain records longer than required.

8-Red flag rule requires that financial institutions:

must implement a written Identity Theft prevention Program

must comply with PCI standards

notify the customer that they may be a victim of identity theft

All of the above

9-Restricting access to the IT Department office of a hospital would fall under which type of safeguard required by the Security Rule of HIPAA?

electronic

technical

physical

administrative

10-According to Omnibus Final Rule, which of the following statements are correct?

If one EMR software vendor needs access to PHI, it would need to complete a BAA.

Business associates does not include entity that  maintain PHI.

A BAA is required for the US Postal Service.

Cloud service providers for EMR storage and backup are not liable for compliance with the HIPAA privacy rule.

11-Which of the following is not part of the PII definition established by GAPP:

Address

Credit card number

Student ID

Medical information

12-This term refers to the security practice where no one has more access than is needed to do their job

Auditing

Least privilege

Authentication

CIA Triangle

13-The law “to protect investors by improving the accuracy and reliability of corporate disclosures made pursuant to securities laws, and for other purposes.”

CIA

PCI

SOX

SEC

14-Being able to recover records after a disaster:

Effectiveness

Efficiency

Competency

Continuity

15-Law that requires a free credit report annually

FACTA

Red Flag Rule

FERPA

FCRA

16-Any list, description, or other grouping of consumers (and publicly available information pertaining to them) derived using any personally identifiable financial information that is not publicly available

PII

NPI

FTC

PIN

17-Which of the following is specific to the health care industry?

PII

Non-public financial information

Student academic record

PHI

18-The statutory requirement that public companies submit quarterly and annual reports is promulgated by which agency:

FBI

SEC

CIA

CICA

19-Disposition is not part of the records management lifecycle.

True.

False.

20-In the CIA Triangle, the letters  refer to what:

Confidentiality, Integrity, and Availability

Central Intelligence Agency

Confidentiality, Intrusion, and Availability

Cybersecurity In Action

canon.com/ijsetup

 

canon.com/ijsetup is a website to download Canon printer drivers, you can also visit the canonsetup-canon.com/ijsetup website for the same. All-in-one Canon Inkjet printers are suitable for home, business, school, and others to improve productivity. Depending on your requirement, it offers a type printer including PIXMA, SELPHY, MAXIFY, etc. Some factors need to be in mind while choosing an inkjet printer for you. Later, you can easily set up your Canon printer through drivers from canon.com/ijsetup, wireless connection, USB, and a few components. The setup process for every Canon model is almost similar, however the download through http //ij.start.cannon or https //ij.start.cannon and  installation process may differ.

ITS-834: Emerging Threats & Countermeasures. Discussion, reflection: practical connection and Research Paper

 Subject: ITS-834: Emerging Threats & Countermeasures

Reading Resources:

 Wangen, G., Snekkenes, E., & Hallstensen, C. (2018). A framework for estimating information security risk assessment method completeness.  International Journal of Information Security17(6), 681–699.  https://doi.org/10.1007/s10207-017-0382-0

Goutam and V. Tiwari, “Vulnerability Assessment and Penetration Testing to Enhance the Security of Web Application,” 2019 4th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 2019, pp. 601-605.  https://ieeexplore.ieee.org/document/9036175

G. Yadav, A. Allakany, V. Kumar, K. Paul and K. Okamura, “Penetration Testing Framework for IoT,” 2019 8th International Congress on Advanced Applied Informatics (IIAI-AAI), Toyama, Japan, 2019, 477-482.  https://ieeexplore.ieee.org/document/8992645

Textbook Title: (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide ISBN: 9781119475958, Authors: Mike Chapple, James Michael Stewart, Darril Gibson, Publisher: John Wiley & Sons, Publication Date: 2018-04-10  

Discussion: Pen Attack and Cyber Terrorism

 Word count: 300+ words

Chapters 15, and 16 in the course textbook 

 There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism? 

Make sure to back up your statements with scholarly support.

· Please cite properly in APA 7

· At least one scholarly source should be used. 

· Use proper citations and references in your post.

Research Paper:

Number of pages: 4+

 Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

· 4+ pages in length, not including the required cover page and reference page.

· Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

· Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.

· Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Reflection: Practical Connection Assignment

Number of pages: 2+ pages

This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career. Assignment: 
Provide a reflection of at least 2 pages of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment.

Requirements:

  • Provide 2+ pages minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment.
  • You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Note: plagiarism check required, APA7 format, include References, within 8hrs

This post has 3 individual assignments (discussion, research paper and reflection).

Please provide answers in separate documents. 

Case: Cost Is No Object

  

Arrays
 

Case: Cost Is No Object
In earlier chapters, you developed programs for Cost Is No Object—a car rental service. Create an application that produces employee information for Cost Is No Object. The application prompts the user for an employee ID number, first and last names, street address, zip code, and job description code.
 

Any time the user enters an invalid value, continue to reprompt the user for the same data. Invalid values are:
· An employee ID number that is negative or greater than 999
· A zip code that is not in the list of allowed zip codes
· A job description code that is not between 10 and 19 inclusive

wk-research assignment

 After responding to the weekly discussion topic on FOOTPRINTING, you now have an idea as to how to conduct a digital investigative project. For this assignment, you are asked to develop your own crime scenario. Explain the incident that occurred, and then list the steps you would follow to solve this case (examples might include: a lost child, an unauthorized charge on your credit card, an unidentified charge made with your EZ PASS, etc.). 

Python

4.Probability of Doubles. In the mid-1600s, a French nobleman (Antoine Gombaud, Chevalier de Méré) frequently gambled using six-sided dice. One of his favorite games of chance involved an attempt to roll at least one “double six” within 24 attempts (or rolls of the 2 dice). He knew the probability to roll a double six on any given roll of two dice is 1/36 (6 possible outcomes for each die; 2 dice; 6 * 6 = 36). He falsely assumed that the probability of rolling double sixes in 24 attempts would be 1/36 * 24 or approximately 67%. Due to the financial losses he experienced over time, he determined his probability logic must be false. He subsequently sought expertise from Blaise Pascal (a contemporary mathematician) to assist him in determining the correct probability as closer to 49%.1Write a “simulation” program that repeats the 24 rolls 10,000 times. Check to see if your simulated data provides supporting evidence of the 49% probability of rolling double sixes at least once in 24 rolls of 2 dice. Create two separate data files from your simulation. Your program should: a.(5 points) Use a “markdown” cell in your Jupyter Notebook to introduce your solution for this problem and describe any difficulties/issues your team encountered while solving the problemb.(5 points) Use a main function to control overall program flowc.(15 points) Store the outcome of each pair of dice roll as a .csv file (add text delimiters as necessary). At a minimum, fields should include: i.Round (1 to 10,000)ii.Roll (1 to 24)iii.Die-1 (roll of one die 1 to 6) iv.Die-2 (roll of second die 1 to 6) v.Doubles (1 if result of roll is doubles or 0 if the result is not doubles)vi.Double sixes (1 if result is double sixes or 0 if the result is not double sixes)d.(15 points) Store the outcome of each round of 24 rolls as a .csv file (add text delimiters as necessary). At a minimum, fields should include:i.Round (1 to 10,000)1 See Ma, Dan, “One Gambling Problem that Launched Modern Probability Theory”, Introductory Statistics blog, available at https://introductorystats.wordpress.com/2010/11/12/one-gambling-problem-that-launched-modern-probability-theory/,  last accessed September 28, 2021 and “de Méré’s Problem,” Wolfram MathWorld, available at http://mathworld.wolfram.com/deMeresProblem.html, last accessed September 28, 2021 for more information.

Last modified: September 28, 2021Page 6   of 6 ii.Double sixes (True if double sixes occurred at least once during 24 rolls; otherwise, False)iii.Winner (House or Gambler). The gambler wins if double sixes are rolled at least one out of 24 rolls.  iv.Number of Double Sixes Rolled (count of the number of double sixes in the 24 rolls)e.(25 points) Conduct an analysis of your simulation results and report to the user what you learned. For this part of the problem, you should use the data files you created in parts   (a) and (b) as input data for your analysis. You should display the results of your analysis on the screen and save the same output to a .txt file. Some suggestions include: i.Check to see if your data supports the 49% probability as described aboveii.Validation checks to ensure that the dice are “fair” (i.e., each number 1 to 6 has equal chance of occurring)iii.Summary statistics such as the number of times double sixes occurred in 24 rolls, number of doubles rolled in 24 rollsiv.Other interesting statisticsv.Use your creativity here! f.(5 points) Include a program header and appropriate comments to document your code

Bi 2

APAformat

0. Go to theinternetofthings.eu and find information about the IoT Council. Write a summary of it.

1. Compare the IoT with regular Internet.

2. Discuss the potential impact of autonomous vehicles on

our lives.

3. Why must a truly smart home have a bot?

4. Why is the IoT considered a disruptive technology?

Mobile Application – discussion

Among one of many reasons to target the Android platform, first and foremost is cost. On average you can get an Android smartphone for a fraction of the cost of an iPhone. They may not have commensurate features, but thrift is a major component for new smartphone buyers. Next is flexibility.    Developers can often find on cheap and imported Android devices a version of Google Play that is maintained by the manufacturer.  Developers should develop as if they expect their app to be available to all Android devices.

  • Besides cost, why should mobile app developers target the Android platform?
  • Why is Android competition to itself?
  • Describe key ingredients needed to create mobile applications on the iOS platform. 

– 2 pages

– apa