Investigate whether or not an employee at a local hospital has been accessing patient records and setting information to online pharmacies. It is your first day of the investigation. Put together a list of data sources that must be examined during the investigation.
Cloud_computing_week_12
Discussion Topic: Define auditing in regards to auditing cloud services and what internal controls would you implement (provide an example of each control).
Paper Topic:
Write a paper on governing the cloud. The following are the items to discuss in the paper:
- Define corporate governance.
- Discuss the events that led up to the need for increased corporate governance.
- Define business strategy. List five possible business strategies.
- Discuss the purpose of the Capability Maturity Model.
Paper requirements:
- Minimum 1200 words (excluding title page, table of contents, abstract, and references pages)
- Minimum of four (4) references
- Format your paper consistent with APA guidelines
- When submitting the assignment, please ensure you are submitting as an attached MS Word document.
Security Risk Assessment
Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format double space and have to include at least two references and 400 words.
- When should the architect begin the analysis?
- What are the activities the architect must execute?
- What is the set of knowledge domains applied to the analysis?
- What are the tips and tricks that make security architecture risk assessment easier?
Summary and Chart
Assignment Content
- Phoenix Fine Electronics would like you to brief them on your system recommendation.
Create a chart in a Microsoft® program comparing how enterprise resource planning (ERP), customer relationship management (CRM), and business intelligence/decision support systems (BI/DSS) can help the business. Cite at least two sources within your chart. Compare the following information:
- Elements of the system
- How the system would support management
- How the system would create a successful partnership between the business and IT
- Write an executive summary of your recommendation for PFE’s C-level management. As a general guideline, executive summaries are typically 1 to 2 pages in length, at the 12-point font, and single-spaced.
Include the following in your summary:
- An overview of the business needs and desired outcomes
- The system comparison chart (from above)
- Your system recommendation
- The scope of the project
- References
Digital Forensics Evidence
Preamble
In August of 1997, a Swiss couple, John 52 years old and Buntham 26 years old Graben Stetter, were arrested at the Hilton in Buffalo, New York, and accused of smuggling thousands of computerized pictures of children having sex into the United States. The couple were alleged by authorities to have sold wholesale amounts of child pornography through the internet and carried with them thousands of electronic files of child pornography to the United States from their Swiss home.
Allegations
- The couple were unproven to have agreed over the internet to sell child pornography to the United States (US) Customs agents posing as local US porn shop owners.
- The couple were suspected to have agreed to sell 250 CD-ROMs to US investigators for $10,000. According to reports, one CD-ROM had over 7,000 images.
- The couple were further alleged to have their 2-year-old daughter, traveling with them at the time of the arrest, who is also a victim.
- Authorities professed that photographs of the 2-year old daughter are on the CD-ROMs the parent were distributing.
Mitigation
Criminal’s MO is a learned behavior that continue to grow, develop, and advance tirelessly as the perpetrators turn out to be more experienced, sophisticated, and confident in the operation. Digital imaging technology and the internet allegedly help to unearth Swiss couple; John and Bentham’s prevailing MO, with intent of producing, marketing, and distributing child pornography materials to counterparts, and vulnerable innocent citizens of the world community.
Underground communications, seizure of 250 CD-ROMs and arrest of the Swiss couple was made possible by efficient use of computer and internet technologies. The couple were targeting international buying communities, secured agreement to sell and distribute illicit materials. Furthermore, the illicit items were alleged to have been digitized for transport, ease of storage, and ease of duplication as soon as the couple arrive in the United States. Emergence of computer and internet technologies helped digital forensic investigation in process.
Questions
- The Swiss couple attempted to underestimate the United States custom agents and digital forensic investigator. Provide all-inclusive description on the importance of computer and the internet technologies.
- The couple were suspected to have agreed to sell 250 CD-ROMs to US investigators for $10,000. Provide comprehensive narrative on how to approach the Swiss couple with only allegation; yet, not officially charged.
Disaster recovery
Topic: Each student will locate and review an article relevant to the topic of the class. The review is between 400-to-550 words and should summarize the article. Please include how it applies to our topic, and why you found it interesting.
dis9_dsbda
There is still much confusion regarding what Blockchain is and what it is not. Please discuss your explanation of Blockchain to include why it has been gaining so much popularity.
Ask an interesting, thoughtful question pertaining to the topic and discuss about it in apa format with 2 references
Question – Access control assignment
Discuss the importance of Access Control in a business environment.
500 words
Need APA format with reference.
Data Breach
Before any health information system can be successfully implemented, there must be a team of experts who understand the vision and mission of both the health care organization and its stakeholders. Strategic health care leaders are positioned to propose system upgrades and/or implementations that can withstand inevitable organizational changes. Health information systems’ leaders understand that data is the overall management of the availability, usability, integrity and security of the data. From your weekly readings, choose at least three health information systems’ leaders and/or stakeholders, and define their role in the implementation of health information systems.
All the following items must be addressed in your paper: The Breached vs Uncompromised Data paper
- Compare and contrast the limitations and opportunities in enterprise-wide data. Defend your technology infrastructure’s ability to support organizational leadership and end-user needs.
- Explain the economic impact of your proposed system acquisition.
- Predict the impact of quality improvement as it relates to the improvement of electronic health records.
The Breached vs Uncompromised Data paper
- Must be three double-spaced pages in length (not including title and references pages)
- Must begin with an introductory paragraph that has a succinct thesis statement.
- Must address the topic of the paper with critical thought.
- Must end with a conclusion that reaffirms your thesis.
- Must use at least at least three scholarly or peer-reviewed sources in addition to the course text.
- APA format