Research Paper security management practices

Subject: Foundations of Information Assurance and Security

Research Paper: 5-6 pages WITHOUT title page and with 4 external reference

Topic:  

Choose of the topic and create Research paper of 5-6 page without title page and with 4 external reference

Topics Security management models; security management practices; planning for contingencies; personnel and security; and finally protection mechanisms.  

Discuss how it is used in your organization? how it works or doesn’t work in your environment?

fullterm

Background:

Over the past few weeks, the class has reviewed several topics including the key aspects of workforce management, health policy, and information technology. Applying the information reviewed this week on finance and economics, we will explore how each of these weekly topics are connected from a healthcare administrators’ viewpoint. During each of our weekly readings, information was obtained on the importance of healthcare workforce structures, how policy is created, the significance of quality as well as change management, read about the foundational components of healthcare finance, and learned about the core elements of economics. Based on each of these areas that we have read about during class, discussed during our weekly discussions, and from your own research, you will provide insight to each of these topics, applying the information to the scenario below, for this week’s assignment

Assignment Scenario: Role Playing as a Healthcare Administrator for Your Desired Healthcare Setting

Step 1: Identify your desired healthcare setting and healthcare administrator role for the scenario.  You may elect one of the Options listed below or define your own role within your own healthcare setting.  It is important to note that your selected healthcare facility is part of a large healthcare system and you are one of the many administrators that the system has but you will be playing the role of the executive leader for your specific healthcare setting within your organization’s large healthcare system.

(Examples: Licensed Nursing Home Administrator for a Skilled Nursing Facility with 120 Beds, 70 short-stay rehabilitation beds and 50 long-stay resident beds that is part of a multi-state healthcare system or laboratory director for a 80 bed critical access hospital that is part a larger healthcare system that offers the entire continuum of care within 2 states)

Step 2: Based on your selected healthcare setting and role from Step 1, you will be presenting information at the next executive leadership meeting. Each administrator for your organization will be presenting information to the healthcare system’s executive leadership team, and you are required to complete the strategic planning report as part of your presentation. You will use the Strategic Planning Report Template, provided below, to prepare for this upcoming meeting. Each topic will need to be sufficiently addressed with supporting evidence that will assist the executive leadership team in preparing for next year’s budget and related to updating the strategic plan for your facility.

Assignment Requirements:

Complete the Strategic Planning Report using the Word document template provided within this assignment prompt. You will complete this report for the meeting, ensuring that each question provides the executive leadership team with the appropriate amount of details with supporting external evidence, so your facility’s budget and strategic plan are ready for the upcoming fiscal year. You will need to include at least three APA formatted references from the last five years with correlating in-text citations for the report. Please ensure that that an APA 7th edition cover page, the report, and an APA 7th edition reference page are provided.

Click this hyperlink to access the template:  Strategic Planning Report Template (IN attachments)

Healthcare Setting and Role Options: 

Option 1: Licensed Nursing Home Administrator (LNHA) for a Skilled Nursing Facility (SNF) with 120 Beds: 70 short-stay rehabilitation beds, each dually licensed for Medicare and Medicaid, and accepts major managed care insurance plans for short-stay rehabilitation. Your SNF also has 50 long-stay resident beds that are licensed for Medicaid, Private Pay, or Long-Term Care Insurance. Your SNFs average daily census (ADC) is 60 short-term patients with 45 long stay residents, resulting in a total of 105 patients/residents for your ADC. Your facility is one of 30 SNFs within your nonprofit healthcare system and is located within the state of Florida.

Option 2: Laboratory Director for a 25-bed critical access hospital (CAH) with swing beds for post-acute care to provide skilled nursing services, has an average length of stay of 3.5 days, offers a birthing center, provides cancer and infusion services, and has a connected assisted living facility. Your CAH is one of seven CAHs for your nonprofit healthcare system which is located within a rural Illinois town.

Option 3: Practice Manager for a mid-sized primary care clinic that has three to five physicians with each physician seeing approximately 20 patients per day, accepting all payor-sources. Your practice is in rural area in the state of Virginia and operates in one of the nine states for your nonprofit healthcare system.

Option 4: Ambulatory Director for a multispecialty ambulatory surgery center (ASC) that is Medicare-certified, and accepts private insurance, located in state of Maryland with an average daily census of 17, and is one of the 40 ASCs for your nonprofit healthcare system.

5 PAGE ASSIGNMENT

Mobile -10

 

Programming Project

You will be developing “ATM Software” for MyBank. This ATM software will be accepting deposits and can make withdraws.

The ATM is PIN code protected. You will be developing program to ensure that unauthorized users cannot get into the system. Your program will check if the entered PIN CODE is in the prerecorded data file.

Your source code must be saved as C++ file. And, the document name must be: LastName_ATM.CPP.

The source code file must contain a file header formatted as specified below. The header information must be complete and accurate. The source code file should use self-documenting code and additional comments (as required) to improve code readability.

Final Project Smr2020.pdf

Information Assurance

 

Final Project

Submit your final project here.Topic of your choice within Information Assurance during this course.  Recommend 4-5 pages, including a cover page and reference page, at least three references and in APA format. Include a summary for presentation during residency, slides with highlights and details of your project.  

IMPACT OF IT -7 (b)

Find a recent article that relates to this week’s topic and post a summary of that article and how it relates to this week’s lesson. 

 This week we will cover how to evaluate information and control technology. This is a popular topic because some will say that most information on the internet is fake. Others will say that it is biased or manipulated. Ultimately, you need to have a reasonable amount of judgement to ensure the information you are reading is legitimate. 

in C++

 

In C++

Create a class named SchoolYear.

Include appropriate private data members.

Include a default constructor which sets the start date of school to September 1, 2019.

Include a constructor which allows the user to set the start date of school.

Include the additional functions in your class which are necessary.

Write a main function that tests all of your functions.

Add the following to the SchoolYear class which you created in chapter 7.

Include an overloaded operator which allows two objects of the SchoolYear class to be compared to see if they are equal.

Also include an overloaded operator to subtract one object from another object.

Write the definitions for both overloaded operators.

Include the class in a main function and test the two new overloaded operators.

Fundamentals of Security

You have tasked the IT department with developing an incident response plan to address risks to the information system. 

Based on your research for Unit 5:

Explain some of the key elements of an incident response plan. 

Identify some incidents that should be included in the PCS plan. 

Discuss the relationship between this plan and other related planning such as disaster recovery and business continuity.

As a warm-up for writing the Polynomial

As a warm-up for writing the Polynomial class for Project 1, write a simple class called Quadratic for representing and using quadratic equations. A quadratic equation is any equation of the form f(x) = ax2 +bx + c (and is just a polynomial with degree 2). Your class will have:
one instance variable: an integer array with exactly 3 slots, one for each coefficient
a constructor which takes three integer arguments a, b, and c and stores them in the array, which the constructor creates; a in slot 2, b in slot 1, etc. so the coefficient is at the index that corresponds to the associated power of x
one accessor method that returns the coefficient array when called
a method roots that returns a two-element array containing the roots of the quadratic. Use the quadratic equation from algebra.
a method evaluate that returns the result of evaluating the quadratic for any given real number x
a method toString that returns a String representation of a quadratic function; for example, the function x2 + 3x – 4 will be represented by the string x^2 + 3x – 4.
Having toString available allows us to pass a Quadratic object to the various System.out.print functions and get readable output.
Include a main method to unit test your constructor and methods. It should create at least three Quadratic objects and call the three methods on various values. As in the project, this method should produce output that completely documents each test and the results, so it is clear at a glance what works and what doesn’t.
Coding and Documentation Requirements
Document the complete specification for each method you develop, including preconditions, postconditions, complexity, and throws clauses if applicable. Pay particular attention to possible errors that these methods can produce if the preconditions on inputs and intermediate computations are not checked. In general you want to throw exceptions rather than produce error messages.
Generate HTML documentation using Javadoc and post it on your hive.sewanee.edu web page.

Part I. The Polynomial ClassConstruct a class for representing polynomials as described in Exercise 13, part (a), page 57 of the text, subject to the modifications given below.Store the coefficients in an array of type double (not int as suggested in the text); the coefficient of the k-th term should be stored in index k of the array. This means the array will be at least as big as the degree of the polynomial, even if the coefficients of some terms are zero. For example, the coefficients of the polynomial x5 + 0.3×3 + 0.5×2 – 0.9x + 5 would be stored as [5.0, -0.9, 0.5, 0.4, 0.0, 1.0]Modify the exercise as follows:
As stated above, the coefficients array will hold items of type double.
The constructorpublic Polynomial(int degree)will create a coefficients array large enough to hold the number of coefficients given by the parameter degree.
The coefficient parameter to setCoefficients will be of type double.Override the methods toString and equals. For example:
The string representation of x2 + 2 should be x^2 + 2
The string representation of x5 + 0.3×3 + 0.5×2 – 0.9x + 5 should be x^5 + 0.3x^3 + 0.5x^2 – 0.9x + 5
Two Polynomial objects are equal if they have the same degree and coefficients.
Part II. Polynomial Test ClassWrite a test program in a separate class file, as described in Exercise 13, part (b). Many software developers advocate documenting test cases first, then using those as a guide in writing the test program.Document test cases for each method (especially evaluate) in a separate file called README.TEST; this gives you something to check against. For example, to test evaluate a test case will consist of:a specific polynomial
the input parameter to evaluate
the expected result returned by the method
Test at least 5 different polynomials of various sizes (including just 1 term); for each polynomial, test at least 3 inputs to evaluate (consider a positive value, a negative value, and 0). Test cases must be turned in along with the program. Also, I will be applying my own tests. All test cases (both mine and yours) must pass for full credit.Note: a wise computer scientist once said that tests can show the presence of bugs in a program, but not their absence. There is no such thing as too many test cases.Part III. Inheriting from PolynomialUsing inheritance, create a class that represents a specific family of polynomials used to create the Logistic Map: rx(1 – x) = rx – rx2, where r can be any real number. The only instance variable needed will represent r; initialize it using a parameter in the constructor. Be sure to consider:what should be inherited from the Polynomial class? what should not?
are the access modifiers for instance variables in the superclass appropriate for inheritance?
how will the constructor work?
Add a section of test cases for this type of polynomial to your test docs and your test class.Coding and Documentation Requirements
When writing your project, remember to follow the style guidelines; in particular, include a comment block at the top of each source file giving your name, e-mail address, and project number.
Document the complete specification for each method you develop, including preconditions, postconditions, computational complexity, and throws clauses if applicable.Produce documentation using Javadoc and post it on your web page.
Deliverables
For each project you will turn in these files:a file README containing instructions on how to compile and run your program, where to find your Javadocs online, and a description of any issues or known bugs.
a file README.TEST containing your test cases; show which if any tests did not pass by turn-in time
all Java files required to build and run the program(s)
These files are to be turned in as follows: zipped into a single archive file, emailed to me. My system recognizes ZIP, GZ, and TAR files automatically.
Do not include binary files (such as .class files) as sometimes Gmail will flag those as malware and not send them.
In addition, hand in printouts of the source files you developed or modified (even when you e-mail the code) either in the bin outside my office or beginning of next class meeting.