Security Architecture and Design

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two reference.

One of the big challenges with cloud-based reputation checks is performance. Users do not typically want to wait a few seconds while the reputation of potential URLs is checked. Most of us have come to expect that websites are at the immediate tips of our fingers and that access and loading of the content should take place rapidly and immediately. This presents a tricky security problem. Since the reputation service exists in the cloud, the challenge can be summed up as, “How can a reputation be securely retrieved without slowing Web access down so much as to create a poor user experience?”

Cloud Computing and Digital Forensics

1.) Discuss, in your own words using 500 words or more, how virtualization may create it’s own security vulnerabilities.  

Use at least three sources. Use the   Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  

Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  

Stand alone quotes will not count toward the 3 required quotes.

2.) Using the Web or other resources, find a case where an illegal search was claimed.

Write a brief essay of 300 words describing that case and how it relates to this week’s topic.

discussion

 

Discussion Conflict with Teams

Part 1: Conflict within Teams

Think of a conflict that occurred in a team you were a part of and analyze it. What were the main sources of the conflict? What interventions can be used to improve the quality of conflict a team?

Part 2: Creativity in Teams

Evaluate yourself using the three indices of creativity. What strategies can you use to enhance your creativity?

Pairs Assignment

How to create a program Pairs that prompts user to enter two numbers (double) and then prints the addition, subtraction, multiplication, and division of the two numbers in Java (IntelliJ).

Group project discussion

Hello, am looking for someone to help summarize this group project to a discussion comment . this is my discussion question for this week, not more than 200 words. please see the attached

HIPAA Compliance Planning

 

Assignment Content

  1. Your company is a security service contractor that consults with businesses in the U.S. that require assistance in complying with HIPAA. You advertise a proven track record in providing information program security management, information security governance programs, risk management programs, and regulatory and compliance recommendations. You identify vulnerabilities, threats, and risks for clients with the end goal of securing and protecting applications and systems within their organization.

    Your client is Health Coverage Associates, a health insurance exchange in California and a healthcare covered entity. The Patient Protection and Affordable Care Act (ACA) enables individuals and small businesses to purchase health insurance at federally subsidized rates. In the past 6 months, they have experienced:

    • A malware attack (i.e., SQL Injection) on a critical software application that processed and stored client protected health information (PHI) that allowed access to PHI stored within the database
    • An internal mistake by an employee that allowed PHI to be emailed to the wrong recipient who was not authorized to have access to the PHI
    • An unauthorized access to client accounts through cracking of weak passwords via the company’s website login
    • Health Coverage Associates would like you to develop a security management plan that would address the required safeguards to protect the confidentiality, integrity, and availability of sensitive data from the attacks listed above and protect their assets from the vulnerabilities that allowed the attacks to occur. 

      Write a 1- to 2-page high-level executive summary of the legal and regulatory compliance requirements for Health Coverage Associates executives. The summary should provide

    • Accurate information on the HIPAA requirements for securing PHI
    • FISMA and HIPAA requirements for a security plan
    • Scope of the work you will perform to meet the Health Coverage Associates’ requests
    • Compile a 1-to 2-page list of at least 10 of the CIS controls that provide key alignment with the administrative (policies), physical (secured facilities), and technical safeguards required under HIPAA to protect against the attacks listed above. Include corresponding NIST controls mapped to the selected CIS controls.

      Write a 1- to 2-page concise outline of the contents of the security management plan. Include

    • Policies Health Coverage Associates will need to manage, protect, and provide access to PHI
    • The recommended risk management framework Health Coverage Associates should adopt
    • Key elements Health Coverage Associates should include in its plan of actions and milestones
    • Cite all sources using APA guidelines.

       

Theory

Explain the Bresenham line Algorithm as related to computer c++ programming language.