Assets to Protect in Cyber Security Discussion Essay Project
Order ID# 45178248544XXTG457 Plagiarism Level: 0-0.5% Writer Classification: PhD competent Style: APA/MLA/Harvard/Chicago Delivery: Minimum 3 Hours Revision: Permitted Sources: 4-6 Course Level: Masters/University College Guarantee Status: 96-99% Instructions
Assets to Protect in Cyber Security Discussion Essay Project
Activity 1: Classification Activity (100 points)
This activity is comprised of two parts. (100 points) (A two-page response is required for the combination of Parts A and B.)
Cybersecurity starts with understanding what assets are essential to protect. Healthcare organizations should have a classification system based on the value of the information. It’s important to note that this type of data classification differs from that of computer programming, which is also called classification, but relates more to labeling the data to differentiate it into classes and sets.
In cybersecurity, data classification is required to apply a value relative to how sensitive and critical the information is, as defined by the organization. This value will determine what level of information protection controls will be applied to information collected, maintained, retained, used, and disposed of when no longer needed.
Perform data classification analysis on the below list of healthcare data points and determine how each should be classified. Explain your thought process and reasoning for each decision. Use the categories of Confidential, Internal Company Use Only, or Open to Public.
Part A: Define and describe each of the three categories in your own terms. Research information security data classification systems and definitions online. (25 points)
Part B: Label each of the data points below the appropriate category and explain your reasoning. (75 points)
Patient name, address, and social security number
A hospital blog website with patient health tips
Assets to Protect in Cyber Security Discussion Essay Project
Patient medical history such as medicine and allergy lists
Patient laboratory test results
Doctor name, address, and employee ID number
Patient radiology images (X-ray, MRIs, and so on) and clinical photographs (endoscopy, laparoscopy, and so on)
A newsletter for all hospital staff
Nurse shift schedule for the month
A page on the hospital website that describes how patient data is protected
Prescribed and administered medications for patients
A summary report of a new clinical trial, soon to be published in the public news
Assets to Protect in Cyber Security Discussion Essay Project
RUBRIC
Excellent Quality 95-100%
Introduction 45-41 points
The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned.
Literature Support 91-84 points
The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned.
Methodology 58-53 points
Content is well-organized with headings for each slide and bulleted lists to group related material as needed. Use of font, color, graphics, effects, etc. to enhance readability and presentation content is excellent. Length requirements of 10 slides/pages or less is met.
Average Score 50-85%
40-38 points More depth/detail for the background and significance is needed, or the research detail is not clear. No search history information is provided.
83-76 points Review of relevant theoretical literature is evident, but there is little integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are included. Summary of information presented is included. Conclusion may not contain a biblical integration.
52-49 points Content is somewhat organized, but no structure is apparent. The use of font, color, graphics, effects, etc. is occasionally detracting to the presentation content. Length requirements may not be met.
Poor Quality 0-45%
37-1 points The background and/or significance are missing. No search history information is provided.
75-1 points Review of relevant theoretical literature is evident, but there is no integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are not included in the summary of information presented. Conclusion does not contain a biblical integration.
48-1 points There is no clear or logical organizational structure. No logical sequence is apparent. The use of font, color, graphics, effects etc. is often detracting to the presentation content. Length requirements may not be met
You Can Also Place the Order at www.perfectacademic.com/orders/ordernow or www.crucialessay.com/orders/ordernow Assets to Protect in Cyber Security Discussion Essay Project
Assets to Protect in Cyber Security Discussion Essay Project