(240)-343-2585 info@essaymerit.com

NR 543 W7 Security Assessment Assignment FAQs NR 543 W7 Security Assessment Assignment FAQs NR 543 W7 Security Assessment Assignment FAQs Over the years, the use of information technology in the healthcare sector has been on the rise as one of the technological advancements. Hospitals and other healthcare facilities have been applying information technology due to the benefits that come with it. For examples, the introduction of various software and information systems have helped to substantially lower the healthcare costs and improve patient services and safety (Avgerou & Walsham, 2017). On the other hand, security threats to these information systems have also been on the rise. While some are due to accidental actions, other threats come from deliberate actions, with the perpetrators having selfish interest to achieve. As such there is always a need to address these security threats for better outcomes The adverse effects of security threats to information systems means that they should be prevented or eliminated. However, a successful identification depends on how well an assessment has been conducted (Abouelmehdi et al., 2018). Therefore, this presentation will focus on the practice management system. As part of the presentation, a discussion on and a description of the practice management system will be explored. In addition, this presentation will also identify common security threats to the practice management systems. As earlier indicated, the potential damage that can be caused by these security threats mean that they need to be addressed or mitigated. As such, evidence-based recommendations will be given as possible solutions. Security Assessment Graded Assignment #4 Guidelines & Grading Rubric Purpose The purpose of this assignment is to recognize threats to information and information-system security; identify safeguards to protect information and information-system security; and develop strategies to increase safeguards to protect information and information-system security. Due Date: Submit by Sunday 11:59 p.m. MT at the end of Week 7. Total Points:  125 Requirements Select a software application, preferably an information system that you currently use in your work setting, to assess security threats. NR 543 W7 Security Assessment Assignment FAQs You may personally test the application as well as observe the practices of other users. Identify system threats. Examine the organization’s information-system policies for threat management, noting strengths as well as potential problem areas, with rationales. Propose an evidence-based solution to each threat identified. In the event that you identify more than seven threats, prioritize the top seven and propose a solution for the three threats that you deem greatest. If you do not currently have access to an automated system, then speak with your instructor to determine a mutually agreeable alternative. Preparing the Assignment Required texts may be used as additional APA current edition is the expected format. The slide presentation (excluding the title  and reference slides ) should not be longer than 20 slides. Ideas and information from professional sources must be cited correctly. Grammar, spelling, punctuation, and citations are consistent with formal academic writing. A minimum of 3 scholarly references is required. Click here to ORDER an A++ paper from our Verified MASTERS and DOCTORATE WRITERS: NR 543 W7 Security Assessment Assignment FAQs Category Points % Description Introduction 20 15 Introduction presents the topic of security assessment and identifies the sections of the presentation. Threat identification 33 26.4 Provides detailed information on the information system assessed for security, threats identified, and potential impact of each threat.   Evidence-based recommendations 33 26.4 Provides evidence-based recommendations to resolve each threat identified. Conclusions 21 17.4 Concluding statements summarize insights gained during the assignment. APA format/Speaker Notes 6 4.8 Text, title page, and reference page(s) are consistent with APA format. Presentation shows speaker notes for each slide that would permit another presenter to take over References and citations 6 4.8 Ideas and information from other sources are cited correctly. Mechanics of writing/Presentation quality 7 5 Rules of grammar, spelling, word usage, and punctuation are consistent with formal written work. Maximum of 20 slides excluding title and reference slides.  125 100 A quality assignment will meet or exceed all of the above requirements.         Security Assessment: Graded Assignment #4: Grading Rubric Assignment Criteria Exceptional (100%) Outstanding or highest level of performance Exceeds (88%) Very good or high level of performance Meets (80%) Competent or satisfactory level of performance Needs Improvement (38%) Poor or failing level of performance Developing (0) Unsatisfactory level of performance Content Possible Points = 106 Points                 Introduction 20 Points 18 Points 16 Points 8 Points 0 Points Introduction presents the topic of security assessment in information systems and names the key sections of the presentation. Introduction presents the topic of security assessment in information systems and names some key sections of the presentation. Introduction does not present the topic of   security assessment in information systems   OR does not name the key sections of the presentation. Introduction does not present the topic of security assessment in information systems   AND does not name the key sections of the presentation.   No introduction present             Threat identification 33 Points 29 Points 26 Points 12 Points 0 Points Clearly identifies threats along with potential impact of each. Identifies threats and  potential impact of each. Identifies several threats but is not consistent in identifying potential impact associated with each. Fails to clearly identify threats AND does not identify associated threat impact. Does not identify threats.           Evidence-based recommendations 33 Points 29 Points 26 Points                                                            12 Points 0 Points Evidence-based recommendations to resolve each problem are presented clearly and discussed in detail. Evidence-based recommendations to resolve each problem are presented and discussed. Evidence-based recommendations to resolve each problem are presented but not discussed. Recommendations to resolve each problem are present but evidence is not clearly presented or may be of poor quality and there is no discussion No                                                                                                                                                                                                                                                                                                                                                                                                         recommendations, evidence, or discussion                                                                 are presented. Conclusions 21 Points 19 Points 17 Points 8 Points 0 Points Concluding statements clearly summarize insights gained during the assignment. Concluding statements summarize insights gained during the assignment. Concluding statements include a partial summary of the insights gained during the assignment. Concluding statements do not summarize insights gained during the assignment. Conclusion is not present. Content Subtotal     _____of 106 Points Format Possible Points =   19 Points           APA format/Speaker notes 6 Points 5 Points 4 Points 2 Points 0 Points 0–3 errors in use of APA format in title page, body of the paper, references, or appendix. Detailed speaker notes present on each slide 4–6 errors in use of APA format in title page, body of the presentation, references, or appendix. Detailed speaker notes present on most slides. 7–8 errors in use of APA format in title page, body of the presentation, references, or appendix. Speaker notes, when present, are inadequate to convey key information. 9 errors in use of APA format in title page, body of the presentation, references, or appendix. Speaker notes, largely missing and are inadequate to convey key information. 10 or more errors in use of APA format in title page, body of the presentation, references, or appendix and no speaker notes References and citation 6 Points 5 Points 4 Points 2 Points 0 Points At least 3 scholarly references are provided. Texts may be used as additional references AND Ideas and information from other sources are cited correctly. Only 2 scholarly references are provided AND ideas and information from other sources are cited correctly. Only 1 scholarly reference is provided AND there are errors in the citation of ideas and information from other sources. There are multiple errors in the citation of ideas and information from other sources.                           No scholarly references are provided.   Mechanics of writing/Presentation quality 6 Points 5 Points 4 Points 2 Points 0 Points 0–3 errors in spelling, grammar, punctuation, and other aspects of formal academic writing. Slide total within maximum  allowable number using graphics and space well. 4–6 errors in spelling, grammar, punctuation, and other aspects of formal academic writing. Meets slide restriction.   Most, not all, slides use space, key words, and graphics well. 7–8 errors in spelling, grammar, punctuation, and other aspects of formal academic writing. OR Does not meet slide  restriction.   OR   Many slides use space, key words, graphics poorly. 9 errors in spelling, grammar, punctuation, and other aspects of formal academic writing. AND Does not meet slide  restriction AND Poor use of space, key words, and graphics on most/all slides 10 or more errors in spelling, grammar, punctuation, and other aspects of formal academic writing. AND Does not meet slide  restriction And slides poorly done or missing important content     Format Subtotal   _____of  19 Points Total Points     _____of  125 Points   Security Assessment Graded Assignment #4 Guidelines & Grading Rubric Purpose The purpose of this assignment is to recognize threats to information and information-system security; identify safeguards to protect information and information-system security; and develop strategies to increase safeguards to protect information and information-system security. Due Date: Submit by Sunday 11:59 p.m. MT at the end of Week 7. Total Points:  125 Requirements Select a software application, preferably an information system that you currently use in your work setting, to assess security threats. You may personally test the application as well as observe the practices of other users. Identify system threats. Examine the organization’s information-system policies for threat management, noting strengths as well as potential problem areas, with rationales. Propose an evidence-based solution to each threat identified. In the event that you identify more than seven threats, prioritize the top seven and propose a solution for the three threats that you deem greatest. If you do not currently have access to an automated system, then speak with your instructor to determine a mutually agreeable alternative. Preparing the Assignment Required texts may be used as additional APA current edition is the expected format. The slide presentation (excluding the title  and reference slides ) should not be longer than 20 slides. Ideas and information from professional sources must be cited correctly. Grammar, spelling, punctuation, and citations are consistent with formal academic writing. A minimum of 3 scholarly references is required.   Category Points % Description Introduction 20 15 Introduction presents the topic of security assessment and identifies the sections of the presentation. Threat identification 33 26.4 Provides detailed information on the information system assessed for security, threats identified, and potential impact of each threat.   Evidence-based recommendations 33 26.4 Provides evidence-based recommendations to resolve each threat identified. Conclusions 21 17.4 Concluding statements summarize insights gained during the assignment. APA format/Speaker Notes 6 4.8 Text, title page, and reference page(s) are consistent with APA format. Presentation shows speaker notes for each slide that would permit another presenter to take over References and citations 6 4.8 Ideas and information from other sources are cited correctly. Mechanics of writing/Presentation quality 7 5 Rules of grammar, spelling, word usage, and punctuation are consistent with formal written work. Maximum of 20 slides excluding title and reference slides.  125 100 A quality assignment will meet or exceed all of the above requirements.         Security Assessment: Graded Assignment #4: Grading Rubric Assignment Criteria Exceptional (100%) Outstanding or highest level of performance Exceeds (88%) Very good or high level of performance Meets (80%) Competent or satisfactory level of performance Needs Improvement (38%) Poor or failing level of performance Developing (0) Unsatisfactory level of performance Content Possible Points = 106 Points                 Introduction 20 Points 18 Points 16 Points 8 Points 0 Points Introduction presents the topic of security assessment in information systems and names the key sections of the presentation. Introduction presents the topic of security assessment in information systems and names some key sections of the presentation. Introduction does not present the topic of   security assessment in information systems   OR does not name the key sections of the presentation. Introduction does not present the topic of security assessment in information systems   AND does not name the key sections of the presentation.   No introduction present             Threat identification 33 Points 29 Points 26 Points 12 Points 0 Points Clearly identifies threats along with potential impact of each. Identifies threats and  potential impact of each. Identifies several threats but is not consistent in identifying potential impact associated with each. Fails to clearly identify threats AND does not identify associated threat impact. Does not identify threats.           Evidence-based recommendations 33 Points 29 Points 26 Points                                                            12 Points 0 Points Evidence-based recommendations to resolve each problem are presented clearly and discussed in detail. Evidence-based recommendations to resolve each problem are presented and discussed. Evidence-based recommendations to resolve each problem are presented but not discussed. Recommendations to resolve each problem are present but evidence is not clearly presented or may be of poor quality and there is no discussion No                                                                                                                                                                                                                                                                                                                                                                                                         recommendations, evidence, or discussion                                                                 are presented. Conclusions 21 Points 19 Points 17 Points 8 Points 0 Points Concluding statements clearly summarize insights gained during the assignment. Concluding statements summarize insights gained during the assignment. Concluding statements include a partial summary of the insights gained during the assignment. Concluding statements do not summarize insights gained during the assignment. Conclusion is not present. Content Subtotal     _____of 106 Points Format Possible Points =   19 Points           APA format/Speaker notes 6 Points 5 Points 4 Points 2 Points 0 Points 0–3 errors in use of APA format in title page, body of the paper, references, or appendix. Detailed speaker notes present on each slide 4–6 errors in use of APA format in title page, body of the presentation, references, or appendix. Detailed speaker notes present on most slides. 7–8 errors in use of APA format in title page, body of the presentation, references, or appendix. Speaker notes, when present, are inadequate to convey key information. 9 errors in use of APA format in title page, body of the presentation, references, or appendix. Speaker notes, largely missing and are inadequate to convey key information. 10 or more errors in use of APA format in title page, body of the presentation, references, or appendix and no speaker notes References and citation 6 Points 5 Points 4 Points 2 Points 0 Points At least 3 scholarly references are provided. Texts may be used as additional references AND Ideas and information from other sources are cited correctly. Only 2 scholarly references are provided AND ideas and information from other sources are cited correctly. Only 1 scholarly reference is provided AND there are errors in the citation of ideas and information from other sources. There are multiple errors in the citation of ideas and information from other sources.                           No scholarly references are provided.   Mechanics of writing/Presentation quality 6 Points 5 Points 4 Points 2 Points 0 Points 0–3 errors in spelling, grammar, punctuation, and other aspects of formal academic writing. Slide total within maximum  allowable number using graphics and space well. 4–6 errors in spelling, grammar, punctuation, and other aspects of formal academic writing. Meets slide restriction.   Most, not all, slides use space, key words, and graphics well. 7–8 errors in spelling, grammar, punctuation, and other aspects of formal academic writing. OR Does not meet slide  restriction.   OR   Many slides use space, key words, graphics poorly. 9 errors in spelling, grammar, punctuation, and other aspects of formal academic writing. AND Does not meet slide  restriction AND Poor use of space, key words, and graphics on most/all slides 10 or more errors in spelling, grammar, punctuation, and other aspects of formal academic writing. AND Does not meet slide  restriction And slides poorly done or missing important content     Format Subtotal   _____of  19 Points Total Points     _____of  125 Points   recognize threats to information and information-system security; identify safeguards to protect information and information-system security; and develop strategies to increase safeguards to protect information and information-system security. Requirements Select a software application, preferably an information system that you currently use in your work setting, to assess security threats. You may personally test the application as well as observe the practices of other users. Identify system threats. Examine the organization’s information-system policies for threat management, noting strengths as well as potential problem areas, with rationales. Propose an evidence-based solution to each threat identified. In the event that you identify more than seven threats, prioritize the top seven and propose a solution for the three threats that you deem greatest. If you do not currently have access to an automated system, then speak with your instructor to determine a mutually agreeable alternative. Security Assessment Assignment FAQs Q: I was wondering if I could use a completely different computerized system for this presentation than I used for earlier assignments. The system that I used did not seem to have many security issues. A: Yes—by all means! While the original intent of the course design was to assess different aspects of a single system throughout the course, the faculty supports selections that will make the experience the most meaningful for the individual learner. Q: One quick question regarding this last assignment. I know you would like us to do a form of assessment on a policy regarding an information system within the organization we work for. Are we to use the name of the organization, or should we mask it to preserve privacy? A: That is a good question. I leave that to your discretion because, at present, it is for your eyes and mine only; but, if you prefer, you can describe the type of setting instead. Q: Are we required to specifically cite, in text and reference list, the information we gather from the policy? Meaning, if we describe something from the policy, are we required to cite the policy in the body of the paper? I am assuming yes, but I was not completely sure. The reason why I ask is if we do not specifically state the name of the organization, it may be hard to cite the policy. Unless there is a way to correctly cite it without disclosing the identity of the organization. A: That is an absolutely excellent question. While technically the answer is “yes”, I will be very happy for you to: note that the policy is from your facility, provide a summary rather than a word-for-word restatement of the entire policy, and state what you feel is an outstanding or deficient portion, and why.   Order Now