Choose two chapters from Kathryn McPherson

  

Choose two chapters from Kathryn McPherson, Bedside Matters, our textbook for this course (any two of your choice, ie. chapters two and three, five and six. It might be better to choose two chapters that deal with a somewhat similar topic so that you are not comparing/contrasting “apples and oranges”).Present a critical analysis of these two chapters: do the chapters appear to present a true picture of the era in nursing history that they cover?Your thesis for this paper could be something like: “Chapters Two and Three of Kathryn McPherson’s Bedside Matters present an effective portrayal of X period in nursing history for X reasons.”When analyzing the chapters, you might also consider questions like:what kinds of primary and secondary sources did McPherson use?Were they effective in making her argument? What kinds of words/language did McPherson use in presenting her argument (i.e. longer words, words that were difficult to follow of understand)?How did McPherson’s diction/word choice influence her argument?Did one of the chapters appear to present a stronger argument than the other one?Why did one chapter’s argument appear to be stronger?

Security Architecture and Design

In today’s fast-paced, agile software development environment, how can we make sure security is implemented into the design? What are some of the key strategies?

Use facts and examples to support your answer. Any outside sources should be cited using APA style.

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. 

Organization leader and decision making – Discussion

Note : Please answer below 3 questions and APA 7 format 

After completing the reading this week, we reflect on a few key concepts this week:

  1. Discuss what ethical leadership is and how it impacts the organizational culture.
  2. What are the various dimensions of ethical leadership?
  3. Note some failures in ethical leadership, please find an example, explain the failure and note possible solutions to fix the issue with leadership.

Please be sure to answer all the questions above in the initial post.Please ensure the initial post and two response posts are substantive.  Substantive posts will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Expand on the topic, by adding additional thoughtful information
  • Answer a question posted by another student in detail
  • Share an applicable personal experience
  • Provide an outside source
  • Make an argument

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread.  Please ensure to use information from your readings and other sources from the UC Library.  Use APA references and in-text citations. 

 Required Reading

Optional Resources:Chapter 5 Journal articles

RM -10

 Read the attached NIST Documents 800-37 and 800-39. Compare and contrast informal vs formal risk management in todays digital infrastructures.  Explain the consequences of not formalizing risk management.  Also, how is information security integrating into system development life cycle?  Why is this important to risk management?  Finally, explain how risk management helps establish, risk capacity, risk tolerance, and risk appetite.  What are the differences between the latter three?  What is accomplished by knowing their metrics?   

Access Control Plan

Access controls provides the ability allow or deny access to critical information and devices on a network. Access controls can be physical, or logical.

In a 500- to 750-word essay, develop a plan for implementing access control models in an enterprise based on the principles of least privilege. Make sure to address the following:

  1. Which of the elements of access control would you use in your plan? Would you use them all? Why?
  2. What are some of the best practices concerning access control? For example, multi-factor authentication or bio-metrics.
  3. Defend the strategy for your plan.