Information Systems Assignment 6
Please read below
You are a security professional for a large, private health care organization. Users have access to file and application servers, as well as data storage facilities that contain customer health information and personally identifiable information (PII).
Sean, your manager, has been asked to provide the latest version of the organization’s incident response policy. To his knowledge, no policy exists. He has asked you to research and create an incident response policy.
For this assignment:
- Look for at least two incident response policies for organizations of a similar type to your organization.
- Download NIST “Computer Security Incident Handling Guide” SP 800-61 Rev 2 located at https://www.nist.gov/publications/computer-security-incident-handling-guide.
- Based on your research, create an initial draft of a high-level incident response policy for your organization. Consider Health Insurance Portability and Accountability Act (HIPAA) and other health care–related compliance requirements.
- Create a summary report that includes the draft policy and justifies the content you included in the draft policy.
- Provide citations for your sources.
Required Resources
- Course textbook
- Internet access
Submission Requirements
- Format: Microsoft Word (or compatible)
- Font: Arial, size 12, double-space
- Citation Style: Follow your school’s preferred style guide
- Length: 4–6 pages
a month ago
6
other Questions(10)
- 3 homeworks Only For Professional research writer
- "Effects on the Environment" Note: Online students, please respond to one (1) of the following four (4) bulleted items. Discuss three (3) positive and three (3) negative impacts of humans on the biosphere. Which positive and negative impacts do you believ
- Discussion Board 2.1
- Perform the indicated operation. Write the polynomial in standard form. What is the degree of the polynomial?
- Write the number in decimal notation without the use of exponents.
- HRM 326 Week 3 Adult Learning Theory and New Hire Training, Week 3 Electronic Reserve Readings
- HRM 326 Week 1 Workplace Learning-Effective Training, Ch. 2
- Continuation problem
- PCN-515 Week 7 Ethical Codes
- Network Security Paper: In this paper, you will define the security strategies of Defense in Depth and Layered Security along with comparing and contrasting the strategies by explaining, at least, two advantages and disadvantages of implementing each secu