Troubleshooting & Usability

IT support is a key partner when a new system or application “goes live.” Users will call in with questions and problems and the support team needs to be ready. 

Describe at least five key troubleshooting steps an IT support professional must take to successfully resolve a caller’s system or application performance problem.

Usability is one of the critical factors in designing an EHR system. Since clinical staff interact with patient electronic health records every day, a poorly designed EHR system can inhibit work flow and performance. Therefore, staff will often report “usability” type performance problems during and after implementation. For example, you may receive a complaint that doctors are refusing to enter lab orders via the EHR because it has too many fields to complete and slows down the doctor’s workflow and patient interactions. 

Consider the types of usability complaints an IT department is likely to hear throughout new system implementation and beyond. 

Explain the following:

  • How usability related complaints could be used to provide information that would be an important part of an organization’s long-term system improvement plans
  • What type of user complaint information should be tracked so trends and improvement opportunities can be identified 

Discussion Week 6 -2 – Cloud Computing

 

According to your readings, cloud computing represents one of the most significant paradigms shifts in information technology (IT) history, due to an extension of sharing an application-hosting provider that has been around for many years, and was common in highly regulated vertical industries like banks and health care institutions.  The author’s knowledge from their research continue to assert that, the impetus behind cloud computing lies on the idea that it provides economies of scale by spreading costs across many client organizations and pooling computing resources while matching client computing needs to consumption in a flexible, real-time version. 

Identify the issues and risks that pose concern to organizations storing data in the cloud –  briefly support your discussion.

— 500 Words

case study

 

1.You have just been hired to perform digital investigations and  forensics analysis for a company. You find that no policies, processes,  or procedures are currently in place. Conduct research to find  information, and then create a policy and process document (3 to 4 pages  in length) to provide the structure necessary for your lab environment.  Be sure to cite your online sources and follow APA formatting.(3,4)

2.Establish a procedure for your organization on how to validate a  new forensics software package. Write 3 to 4 pages outlining the  procedure you plan to use in your lab. Be sure to cite references, such  as the ISO standard or NIST, to support your procedure. Make sure you  use APA formatting.(chapter 5,6)

3.As part of the duties of a digital forensics examiner, creating an  investigation plan is a standard practice. Write a 3 to 4 (not including  title or reference page) page paper that describes how you would  organize an investigation for a potential fraud case. In addition, list  methods you plan to use to validate the data collected from drives and  files such as Word and Excel, with hashes. Specify the hash algorithm  you plan to use, such as MD5 or SHA1. Make sure you follow the grading  rubric and write your paper in APA format.(chapter 9,10)

4. A mother calls you to report that her 15-year-old daughter has run  away from home. She has access to her daughter’s e-mail account and  says her daughter has a number of emails in her inbox suggesting she has  run away to be with a 35-year-old woman. Write a 2 to 3 page  paper/report (not including title or reference page) explaining how you  should proceed. Make sure you adhere to the grading rubric and write the  report in APA format.(chapter 11,12)

· 3-4 pages in length  (excluding cover page, abstract, and reference list)

· APA format, Use the APA template located in the Student Resource Center to complete the assignment.

· Please use the Case Study Guide as a reference point for writing your case study.

IA week12 DB

 

Hello,

i need this paper by 11/11 afternoon.

Strictly No plagiarism please use your own words.

Pick one of the many information security standards organizations and describe what they do and what type of standards they are responsible for.

An initial post must be between 350 words.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

risk management strategies

Compare s and explain a risk management strategies situation in school life or in life where you applied risk management strategies.

Provide enough details so your classmates understand the situation and risk strategy employed.

Choose two of situation and risk strategies and offer a suggestion on how using controls could mitigate certain risks.

discussion-3

 

Malicious individuals have discovered several methods to attack and defeat cryptosystems. It’s important that understand the threats posed by cryptographic attacks to minimize the risks to your network systems.

Identify one cryptographic attack and how you can protect against it. 

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Cloud Security Threats and Mitigation (5 pages)

 Competency

Describe cloud security architecture.

Scenario

You are the cloud security expert for a finance company. Your company is planning to store Personally Identifiable Information (PII) data on a public cloud medium. Your company will use this PII data to run analytics and then send credit card offers to its customers. It is a federal obligation for financial firms to protect PII data. A public cloud is a safe option but there are still many security threats to consider.

You need to analyze the various security threats and analyze various cloud services that are available to protect your data.

Instructions

In order for the leadership team to approve funding for this project, you will create a case study to help the leadership team decide how to enhance the security of the PII data in the future.

Your case study should include the following points:

  1. Security threats on the cloud
  2. Data encryption on a public cloud
  3. Threat detection tools for a public cloud
  4. Vulnerability scanning tools for a public cloud
  5. Cloud-native security services for a public cloud

Be sure to use a professional tone and check your spelling and grammar.

Length

Microsoft Word, 5-6 pages

References

Include a minimum of 5 scholarly resources

Resources

The requirement to PASS (RUBRIC)

 Word document is 5 or more pages. 

 A full, robust, and detailed description of security threats on the cloud. 

 A full, robust, and detailed description of data encryption on a public cloud. 

 A full, robust, and detailed description of threat protection tools for a public cloud. 

 A full, robust, and detailed explanation of vulnerability scanning tools for a public cloud. 

 A full, robust, and detailed description of cloud-native security for public cloud infrastructure as a code tool. 

 5 scholarly references provided; documented correctly.