Posts

Showing posts from November, 2017

IT Security and Forensics Project Management: I Ame Educated To Work-Academic Preparations Necessary

Leadership Meeting Presence One of the hazards for the project manager (PM) of an information security project is the reliance on the subject matter experts to keep the PM fully informed about the status of the project. Theresa is a PM for a single sign-on project within an urban teaching hospital. The project appears to be going along well until Theresa begins to hear rumblings of some technical problems that may interface with the project delivery time line. She calls a meeting with the technical team. The team assures her that things are fine and that they will figure out whatever the problems are and will be ready as planned. Reply to the following questions:  ·          How can Theresa ensure that the technical team is being realistic in their assessment? ·          What strategies might Theresa use to better understand the potential technical issues and the potential impacts of ...

Capella University MS NSA Study: Security and Forensics Focus-Reflections

Collaboration Check-In Your assigned group should be collaborating on your individual proposal ideas, agreeing on how you will share information for the group proposal, confirming that the roles assigned by your instructor make sense, and developing a plan for completing the group activity. For this Collaboration Check-In, each learner will share what is going well in your group's collaboration and what you would change from a communications process to improve the collaboration.   11-28-2017 Unit 8 Discussion Post 2 Response Response from: Miss. Bayo Elizabeth Cary, AA, BA, MLIS The aim of information security is to ensure business continuity and to minimize business damage by preventing and minimizing the impact of security incidents (von Solms, 1998). (Drevin, et., al., 2010, p. 316) I have been out of class, for almost a week. I have been physically ill, and, I am in the middle of court-with no access, to a public defender. I am w...

Healthcare Information-Safety Requirements-You Live or You Die, Based on IT

11-28-2017 Unit 7 Discussion 2 Response 1 to David Keller Response from: Miss. Bayo Elizabeth Cary, AA, BA, MLIS IoT security is a headache, a mess and several other flavors of annoying   for any enterprise, but in healthcare, it can be literally life and death. (Gold, 2017, p. 1)          Healthcare information, pertains to a specific patient, and not to a general group of people. When a patient, goes to a hospital, for treatment, regarding their own personal healthcare needs-then, another person, can not be treated-as any substitute, with the same patient care information. Disease, and illnesses, are patient specific. Treating a patient, based n information, that is not applicable, because of; identity theft, or other data communications issues-is a life-threatening situation. Iot, and BYOD information security, is much more challenging-especially when combined, and, for a-number-of reasons: The key diff...

Apricorn-UK Headquarters-The Reality of the US Data and Information Markets-No Security!

11-28-2017 Unit 7 Discussion 1 Response 2 Zwick Response from: Miss. Bayo Elizabeth Cary, AA, BA, MLIS Headquartered in Poway, California, Apricorn provides secure storage innovations to the most prominent global companies in the categories of finance, healthcare, education, and government. Now with an EMEA office headquartered in the UK, Apricorn products have become the standard for myriad data security strategies worldwide. (M2 PressWire, Apricorn, 2017, p. 4)             Apricorn, a company, with headquarters in the UK, and offices in California, has begun to question and challenge US computer and data collecting companies, because of the blatent disregard, that America companies show, for information security (M2 PressWire, Apricorn, 2017, p. 1). Data safety and security, is not a primary concern, of US information handlers. US companies, are collecting a significant amount, of demographic...

An IoT and BYOD Working Environment US-No Information Safety

11-28-2017 Unit 7 Discussion 2 Response 2 to Steven Beck Response from: Miss. Bayo Elizabeth Cary, AA, BA, MLIS The IoT IAM market is driven by factors such as rise in adoption of BYOD trend, rise in frequency of cybersecurity breaches and cyberattacks, and massive growth in the IoT trend. However, lack of security, expertise, &awareness and cost and budget concerns for IoT IAM solutions may restrict the market growth, and difficulties in assigning unique identities for every network asset of an organization may also limit the growth of the IoT IAM market. (M2 PressWire, IAM, 2017, p. 1) It is a fact, that the BYOD work environment, is increasing security risks, for information, collected, and stored, by US companies. There are new, and improved, security measures, to protect data, and-it is not enough. The new, BYOD, work environment, is such an extreme security risk, that US businesses, should not have considered it, and option. When combining, a BYOD wo...

BYOD Work Environment-Irresponsible-No Information Safety-EVER!

11-28-2017 Unit 7 Discussion 1 Post 2 Response Response from: Miss. Bayo Elizabeth Cary, AA, BA, MLIS They wanted the Samsung Galaxy Note and the Kindle Fire and, most desperately of all, the iPhone: the pinnacle of gadget culture, the device that gave rise to a new acronym in corporate America--BYOD--and forced IT managers everywhere to allow Apple products into the workplace. (Honan, 2013, p. 2)          The primary purpose, of the new design, of the iPhone, by Apple computer systems, was to create a cellphone, and computer environment, to collect information illegally, that should not be shared, with others-covert information (Honan, 2013, p. 1-7). I think it would be legally irresponsible, for any hospital system, to support, a BYOD, electronics environment. You may believe, that you know about an iPhone, and what information disappears. I think it is pure ignorance, to believe, that iPhone information disappears...

The Remote Control Operated Nightmare: Bill Gates Arizona-The New African Village

11-22-2017 Discussion Post Unit 7 Directions: Response from: Miss. Bayo Elizabeth Cary, AA, BA, MLIS Evaluating the Use of IoT technology With Health Care Health care information systems have advanced greatly over the last decade. Just recently, the term, "Internet of things" (IoT) has been introduced and defined as "a user-friendly technology that allows everything to be connected and also allows effective communication between the connected 'things."' (Rajput et. al., 2016). In the health care industry, IoT is being deployed to advance health care security applications that will allow data to be accessed via mobile devices and the cloud. Part I: ·          Discuss some of the: ·          IoT Strategies; ·          Technologies; and ·          Methods- you would recommend that the orga...

Hitler's Sick Demented Dreams Live-On, Through The Bill Gates, IoT World Expressions

11-22-2017 Discussion Post Unit 7 Post 2 Response from: Miss. Bayo Elizabeth Cary, AA, BA, MLIS Discussion 1 Directions: Social Media Use in IAS Health Care Organizations More and more organizations are leveraging social media, including applications such as Twitter, Facebook, and LinkedIn, as part of their communication strategies. In addition to leveraging these applications, some organizations have gone further and have begun to implement a concept known as BYOD or "bring your own device." Discuss some of the IAS strategies, technologies, and methods you would recommend that a health care organization implement in order to mitigate the potential security risks created through the use of these new technologies and applications. Explain how you would approach a recommendation that attempts to discourage or reject the use of some of these tools, as having an imbalance between the benefits of the tool and the risks to the information ass...