Discussion Response 300 words and 1 references.

Please review below post and provide a response to this: 

The HIPAA rules assist to protect the privacy and confidentiality of patients’ health care information while effectively preventing fraud as well as discriminating activities. It enables people to protect themselves as well as their privacy from unauthorized disclosure as well as misuse by third parties (Hordern, 2016). Compliance with these Regulations is important in that the confidentiality of PHI-personal health information, credit card information as well as other sensitive information such as lab results, social security numbers, medical history, etc. is covered.

     The violations of a HIPAA have serious implications, which cost agencies millions of dollars each year. Breaches frequently classified may arise from poor knowledge or insufficient training for employees to handle health confidential data (Swede et al., 2019). The employees occasionally misuse both paper documents and digital records for medical information that may be readily available to outside users and hackers. Outdated technology, as well as applications, could also contribute to data leakage as well as hacker vulnerability, since these breaches may contribute to millions of dollars in data leakages.

Potential Solutions

     To maintain compliance with HIPAA rules, an organization’s primary responsibility is to educate and train its personnel on the handling of sensitive information. Hard and soft copies of different documents must be securely protected as well as selectively accessed to specific personnel, who are trained in safe handling. Applications utilized to process and store data must be updated on a regular basis, as well as active anti-virus as well as anti-malware systems must be in place to prevent cybersecurity assaults on these mission-critical systems. The needs for patient permission with signature, as well as the restriction of an authorization to release data, are both essential for the safe management of data. Best practices for the disposal of documents must be developed to ensure the data may not be disposed of incorrectly.

     HIPAA safety standards require that health services use appropriate measures to guarantee the safety of health information to secure electronic health records (Swede et al., 2019). Electronic patient data with strong safe identification as well as access control must be secure. One of the measures will be to monitor the dark web to instantly detect breaches, install firewalls to protect the health organization, cloud computing, as well as secure a network of the organization.

Electronic health information includes a wide range of patient information as well as diagnostic data. Unauthorized access to electronic health records may be prevented using these methods. Identifying types of firewalls and encryption methods may provide the best and most effective privacy protection techniques.

References

Hordern, V. (2016). Data protection compliance in the age of digital health. European Journal of Health Law, 23(3), 248–264. https://doi.org/10.1163/15718093-12341393

Swede, M. J., PhD., Scovetta, V., PhD., & Eugene-Colin, M. (2019). Protecting patient data is the new scope of practice: A recommended cybersecurity curricula for healthcare students to prepare for this challenge. Journal of Allied Health, 48(2), 148-155.

Assignment

 

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. Describe Digital Literacy (how to know what is real on the web). 

2. None of these people exist. What does this mean to you?

3. Why is Wikipedia more reliable than a paper encyclopedia?

4. How useful are crowd sources answers?

5. What are some drawbacks to crowd sourced answers?

6. Do people generally utilize the diversity of sources on the Internet effectively?

7. How reliant are we and how reliant should we be on getting our news from social media?

8. How do humans remain vigilant when we turn over authority to computers? Have you tried to navigate without gps?

9. If models are simplifications or reality, why do we rely on them?

10. Why was this model, used by Amazon for hiring, wrong?

11. Why did Skynet declare war on the human race?

Windows Network Proposal

  

Windows Network Proposal

You have been hired by Universal LLC as an Information Technology consultant to develop a technology proposal. Universal LLC manufactures and distributes solar panel for the consumer market. Your job is to submit a proposal that meets their criteria.Current Implementation/Concerns:
• The company will have 3 locations (Los Angeles, Dallas, and Houston) but are planning to grow rapidly due to high demand in solar panels. Main staff will be at Dallas and Houston offices.
• Data security is priority since patent and trademarks are at stake.
• Los Angeles sales personnel will need secure remote access to Houston office.
• The WAN connectivity is in place and it is not an issue. There is ample bandwidth in place.
• Feel free to make other assumptions but they need to be noted in the paper.
Topics to Cover:
Your document should cover the content presented in the course. The outline below contains recommended points to cover. You are free to add other related information.Describe the technical and business reasons for each choice, citing other resources as appropriate. The Windows Server 2012 operating system should be used for all aspects of the solution.The topics include:
Active Directory:
• What forest/domain model should Universal LLC implement? What is the domain name?
• Where should the domain controllers be place? Should RODC be part of the consideration?
• FSMO Roles placement
• Plan for AD backup and recoveryGroup Policy:
• Is Group Policy needed?
• What settings might be considered via Group Policy?DNS:
• What namespace should Universal LLC implement?
• What types of zones needed?File Services:
• How will the shares be secured?
• Will quotas be used? FSRM be configured?
• Will DFS be implemented?Remote Services:
• What technology will be implemented to provide secure remote access for users?
• Who should have remote access?WSUS:
• How will the servers and clients be updated?
• How will new servers be deployed?
Submission Requirements:
There are specific requirements for the assignment: The final submission should contain at least 6 pages’ worth of text written by the student (not counting title page, images, diagrams, tables, or quotations), but may be longer, not to exceed approximately 10 pages’ worth of student-supplied text. (With the required diagram, and other images, title page, etc., the final submission may end up being more than 10 pages in length.) It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required; APA format for the title page is optional.
• At least one diagram must be included (not counted towards the minimum length described above). You can have more.
• The submission must cover all of the 6 major topics outlined above. Each choice should be explained with technical and business reasoning. The solution should be reasonably detailed.
• The structure of the final submission is flexible. There is no specific format required, although it should be organized logically and represent a single, unified solution. It is likely that the format will include separate sections for each of the 6 topics required, as well as a summary.
• At least one non-textbook, non-Wikipedia reference is required; preferably, this would be a “best practice” guide or similar content from Microsoft or an experienced provider of Microsoft solutions.
• Be sure to properly quote or cite any sources used. APA format is required for in-text citations and the list of works cited at the end. In its simplest form, if you are using text from a source, you must cite and/or quote it. If plagiarism is found, then there will be a penalty to the grade.

Individual Simulation Report 4

Each student, independently of the team will prepare a brief summary for the week’s simulation efforts. This report will include the following information: 

  1. What was your one corporate generic strategy as reviewed from our text for the week?  Break this down by your target market and your competitive advantage.  Why?  Did your overall strategy change since week 1?  Why?
  2. What was your strategic action plan going into the rounds detailed in Blackboard including the reasons for the moves and how it relates to your overall strategy?  What are your objective and measurable goals for the moves?  Did you have to make operationally reactive moves not related to your strategy?  Why?
  3. What was the objective, fact-based results compared to your intended moves and the reasons of these moves generally? How did your moves advance your one Generic Strategy?  Be specific.  Did you get the objective results you expected?  Why/why not?  Share any objective measures from the simulation program that are pertinent to the strategic implementation results and note any purely operational moves.  How did your competition and the external environment impact your moves?  What is your analysis of this data results compared to your intended results?
  4. What do you think the next set of objective and measurable moves you will have to consider, and what will you suggest to your partners regarding next week’s moves?
  5. What have you learned and how does this relate to other lessons in this course and to your career?
  6. Provide a log regarding the specific dates and times that you accessed the simulation system including specifically when and how you and your teammate reviewed and discussed the simulation system data and decided on your moves to make.  A sample is provided in week 1.

Your report this week should cover periods 9 thru 10 inclusively with fact-based objective data that you analyze from all four periods.  DO NOT copy from your first paper.  Each paper must be written in your own words with proper APA referencing.Your grade for each of the simulation report papers will be based on your analysis and critical thinking around the selection and implementation of the corporate strategy for your company.  Your analysis must be increasingly more thorough with each paper as you become more familiar with the simulation program and with the concepts from our course.  The grade will also include a portion based on your team’s current position and your team’s work together.  Review the required components in the grading rubric for the simulation paper.Submission Details: Your assignment will be between 1000 and 1500 words and follow APA Guidelines. Include a cover page and at least your course text as a reference.

Note: Please write in own words and make sure to watch the values for 9&10

Do the following two programs

  

Do the following two programs:

  1. Write a Java application that inputs three integers from the user and displays the sum, average, product, smallest and largest of the numbers. Use a Scanner object to get the input      from the user. Use System.out to output the results. The average should be a floating point result, and      should be displayed with 2 digits after the decimal point.
  2. Write      a Java application which tests the random number generation abilities of Java. Random number generation is explained below.Your application should simulate rolling a pair of dice some number of times. Use a JOptionPane to ask the user how many times the dice should be rolled. Each dice roll can be a value between 1 and 6, so rolling 2 dice will result in values      between 2 and 12. You need to generate a random number between 1 and 6 to      simulate rolling each dice. Keep track of the result of each roll using an      array that is indexed by the sum of the roll of the two dice. Output      your result in a table which shows each value (ie. 2 – 12) and the number      of times that value was rolled.

The program must have the following structure:

  1. The       main function declares the counting array and gathers input from the       user.
  2. A       separate function is called which takes an integer array parameter as       well as the number of dice rolls to execute. This function rolls the dice       the required number of times and uses the array provided to count the       number of times each value is rolled.
  3. The       main program takes the count data from the array, formats it and displays       it as described above.

For output, you should build a formatted string which includes tabs and new lines to represent your table. JOptionPanes by themselves are not capable of properly formatting tabs. However, there is another Java class which can be used with JOptionPanes to correctly display a formatted string. TheJTextArea class understands all string formatting instructions. The following illustrates how to use the JTextArea class with a JOptionPane to display a formatted string.

#import javax.swing.JOptionPane;

#import javax.swing.JTextArea;

String output = “This t is t a t formatted t string. n”;

// Create a new JTextArea object

JTextArea area = new JTextArea( );

// Place a formatted string into the JTextArea

area.setText( output );

// Place the text area into the JOptionPane

JOptionPane.showMessageDialog( null, area, “Title for dialog box”, JOptionPane.INFORMATION_MESSAGE );

For each of the two programming problems, create an Eclipse project and develop a Java program to solve the problem. Make sure to capture a sample of your program’s output. The best way to do this is to click on the console window you want to capture and then press the Alt and PrintScreen keys at the same time.Then paste your captured screen image into a Word document. For each of the two programs, put the screen capture followed by a copy of your source code into your Word document.

Random Numbers in Java

There are two different classes available to generate random numbers in Java. The static method random from the Math class can be used to generate a random floating point number from 0 up to but not including 1. This number can be scaled to whatever range of random numbers is desired. 

(int)(Math.random( ) * 10);  //results in an integer between 0 and 9

The Random class from the java.util package can also be used to get random numbers. The nextInt method returns an integer from 0 up to but not including the argument value provided to the nextInt method. 

Random rand = new Random( );
int number = rand.nextInt(10); //results in an integer between 0 and 9

minimumValue + differenceBetweenValues * rand.nextInt( scalingFactor )

The formula shown above is used to generate a range of random numbers starting at some minimum value and generating some specified number of random values. The scalingFactor determines how many different random values will be generated by the call to nextInt, starting with the value 0. The difference between values is usually 1.

Your final programming document should contain in the following order:

1. Screen capture of the first program followed by source code.

2. Screen capture of the second program followed by source code.

3. Submit this as the Week 1 Programming Solution.

Cisco Lab 2

 

This Lab explores the Cisco IOS and its hierarchal design by configuring Gateway interfaces that face the LAN.

Assignment

Do the PT Lab

Answer the questions in the Lab 2v7 Directions and Submisson. doc and submit with a screenshot of the ‘Activity Results’ > ‘Assessment Items‘ page from the PT lab

Graph Data Structures

 

This assignment consists of two parts:

Part 1:

  1. Draw a simple undirected graph G that has 10 vertices and 15 edges.
  2. Draw an adjacency list and adjacency matrix representation of the undirected graph in question 1.
  3. Write a short paragraph to describe the graph you draw.

Part 2:

  1. Based on the course reading in this module and your own research,  use big O notation to explain the complexity and performance of the  following data structures:

Arrays, linked list, and vector

  1. Based on the course reading in this module and your own research,  use big O notation to explain the complexity and performance of the  following data structures:

Stacks and Queues

Business Continuity Plan

Discuss Business Continuity Planning Policy in detail. Also discuss any 2 policies that may affect disaster recovery.  

Requirements:

Length: 2 and half pages

APA Format

Add at least 2 references

Research Paper

 Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. 

dataframeNow

Book to Market Ratios in pandas

Read the Exam-Ford_Accounting.csv file into a pandas dataframeNow read in the Exam-Ford_Price_Shares.csv file into another pandas dataframeFor each dataframe, make year the index so that we can easily add/subtract/multiple/divide, etc. across the two dataframes and the years will be lined up correctly. Note that you don’t have to convert anything into a datetime.The Book-to-Market ratio is the Book value of equity divided by the market value of equity.In this case, shares are listed in thousands and the accounting data are in millions, so let’s divide shares by 1000 so that they are also in millions.ME (Market value of equity in millions) = price * (shares/1000)Create a market value of equity column in the dataframe with prices and shares.Now calculate the book to market ratio using the book value of equity and the market value of equity. You’ll have to use columns from both dataframes.Show the summary statistics (i.e., mean, standard deviation, min, max, etc.)Set all negative values equal to zeroNow what are the summary statistics?Plot out Ford’s Book-to-Market ratio over time.