SlideShare a Scribd company logo
1 of 12
1. Choose a Case and Complete the Project Plan
Hospital to Research (Kaiser Permanente)
Select a hospital or health care organization as your case to
research. Consider an organization you are familiar with or one
for which you can find sufficient information. To maintain
confidentiality, you do not need to mention the name of the
organization. You can also refer to the Health and Human
Services (HHS) site for organizations that have reported
breaches. Also, read this cybersecurity field overview to
consider different roles that may apply as you review your
case.
Now that you have chosen a case, the next action is to establish
how you will apportion the work. Use your team space to share
ideas and drafts of each member’s contribution.
Conduct research to capture the organization's infrastructure
and processes, the threats to personal health information (PHI)
and determine a strategy to mitigate the threats you anticipate.
This research will go into the technical report (or white paper,
nine to 10 pages excluding cover sheet, references, and any
appendices). After the paper is written, you will create a one-
page executive summary of the paper. It will be part of the
technical report document, immediately after the cover sheet
and before the text of the report.
2. Create an Organizational Profile for Your Case
Now, it is time to research your chosen case to determine how
the organization’s IT department operates, how it is structured,
and how PHI is moved around the organization for stakeholders’
use. Next, review the materials in the links below to define and
describe the hospital’s information system infrastructure.
It is important to understand the organization’s workflow
`processes—how they move patient information to the business
units that need to process and manage that information, from
billing to physician care. All these organizations employ
hardware and software within their information systems. It is
critical to understand these components, termed a “typology,”
and how the components are connected so that appropriate
security is put in place to protect sensitive information.
Your research should provide examples of how an information
system is connected to cybersecurity components, like firewalls
in the information system and network. Be sure you understand
the benefits and weaknesses of your case’s network topology.
Your definition of the organization’s typology should include a
high-level description of information systems hardware and
software components and their interactions. Take time to read
the following resources.
The table below provides a focus for your search strategies. You
should consult scholarly resources as well as online resources,
newspapers, websites, and IT blogs for similar contemporary
cases.
Topics to Address in the Organizational Profile
1. Describe the organization and structure. The structure will
include the different business units and their functions. You
may use an organizational chart to provide this information.
2. Define information security needs to protect mission-critical
systems. Choose one or more mission-critical systems of the
health care organization. Define the information protection
needs for the organization's mission-critical protected health
information (PHI). This information is stored in database
medical records for doctors, nurses, and insurance claims
billing systems, which are used to fulfill the organization’s
information needs.
3. Define the workflows and processes for the high-level
information systems that you have just identified. Workflows
and processes for health care organizations define how the
organization gets its work done.
4. Describe how the typology fulfills the needs of the health
care organization. You may supply this information as a
diagram with inputs, outputs, and technologies to define
workflows and processes for the high-level information systems.
In the next step, you will consider threats to the organization’s
information security and how to mitigate them.
3. Develop Analysis of Threats to the Organization's
Information Systems Infrastructure
Now that you have defined the hospital's information system
infrastructure, you will have to learn about and demonstrate
your understanding of the potential threats to those systems and
the types of measures that could address those threats. In this
section, you will learn about different types of identity access
management solutions and how they protect against the threat of
unauthorized access.
To complete this section of the report, start by reviewing the
following resources:
· Web security issues
· Insider threats
· Intrusion motives/hacker psychology
· CIA triad
Take what you learned about potential threats to assess the
threat(s) to the hospital's information systems infrastructure.
Include a brief summary of insider threats, intrusion motives,
and hacker psychology in your report as it relates to your
organization’s data processing systems. Relate these threats to
the vulnerabilities in the CIA triad.
Your report will also include a description of the purpose and
components of an identity management system, to include
authentication, authorization, and access control. Include a
discussion of doctors’ use of laptop devices when they visit
their patients at the hospital and need access to hospital PHI
data. Review the following resources:
· Authorization
· Access control
· Passwords
· Multifactor authentication
Next, expand your description by defining the types of access
control management, to include access control lists in operating
systems, role-based access controls, files, and database access
controls. Define types of authorization and authentication and
the use of passwords, password management, and password
protection in an identity management system. Describe common
factor authentication mechanisms to include multifactor
authentication.
Topics to Address in the Description of Threats and Mitigation
Strategies
1. Describe potential threats to the organization’s critical
mission areas. These may include sloppy information security
practices, insider threats, or hackers wishing to steal personal
data. Relate these threats to the vulnerabilities in the CIA triad.
2. Describe how the organization restricts access to protect
billing and PHI. Explain the organization’s processes and
workflows to safeguard PHI, specifically the use of passwords,
password management, and password protection in an identity
management system.
3. Define the access management system. What types of access
control management, to include access control lists in operating
systems, role-based access controls, files, and database access
controls will it take to ensure that access is limited to those
with a need to know?
4. Define factor authentication systems. How do common factor
authentication mechanisms, to include multifactor
authentication practices, safeguard sensitive information for an
organization like this?
5. Discuss strategic considerations and provide
recommendations. Review the mission and organization
structure of your organization as well as roles within the
organization, and recommend accesses, restrictions, and
conditions for each role
6. Discuss the manager’s risk considerations. What will happen
if the CIO and the leaders do nothing and decide to accept the
risks? Could the CIO transfer, mitigate, or eliminate the risks?
What are the projected costs to address the risks?
Now, you are ready to start writing your technical report (white
paper). The technical report will identify vulnerabilities in the
information systems infrastructure of the health care
organization, and identify risks to the organization's data. Your
paper will propose a way to prioritize these risks and propose
remediation actions.
Running head: TROY VS DEATH 1
Troy vs Death – A Driving Conflict of the Play
Vernon Hunter
Post University
TROY VS DEATH 2
Troy vs Death – A Driving Conflict of the Play
Fences is a play written by August Wilson that is based on
features of black life towards
the end of the twentieth century and what challenges they had to
face while living in American
society being African-Americans. This play is based on small
and large conflicts in the life of the
main character of the play (Troy), which he had to fight
throughout his life. All these conflicts
were created in his life as he used to believe in self-created
illusions and also that he was unable
to accept the choices of others. "Out of all these conflicts, the
main driving force of the play
Fences is the conflict between Troy and Death as it can be seen
superseding every other conflict
as explained below."
In the first scene of the play, Troy Maxson said: "Death
ain't nothing but a fastball
on the outside corner." (Wilson,1985, act # 1, scene # 1). Troy
was extremely proud of baseball
and knew that he was able to conquer it on his own. He also
believes that he was unbeatable
when it comes to issues of life and death as he was able to
survive pneumonia ten years ago, able
to survive an abusive father, and also when he had to go through
treacherous conditions towards
his journey to Pittsburgh.
Fact is something that is built on a firm belief and not just for
the sake of saying, same as
it was for Troy to have a belief in death that is meant for
everyone in this world. He uttered this
belief in this first scene; he is seen not afraid of anything,
including death again. When he
said, "Ain't nothing wrong with talking about death. That's part
of life. Everybody gonna die. You
gonna die, I'm gonna die. Bono's gonna die. Hell, we all gonna
die." (Wilson,1985, act # 1,
scene # 1). This quote from the play indicates that Troy had a
fair sense of assessing a real thing
and that his interest in that real thing purely was dependent
upon the series of incidents that
TROY VS DEATH 3
happened in his past life, which laid a foundation stone for him
to believe whether it was good or
bad (Nindita & A, 2017).
Death is the driving conflict of this play, which is
expressed in multiple scenes by
the writer. In one of the scenes of this play, bell of a phone
rings in the middle of the night, Rose
answered the phone as woke troy who was asleep at that time.
Rose tells Troy that a baby girl
was born; nevertheless, Alberta was no more due to some
complications during the birth of a
girl. Troy moves towards the window and leans out in the rain
and warns the death to limit itself
only to the other side of the fence that he is constructing. He
continues the challenge by saying
that death should not sneak through the back door to him;
instead, it should knock the front door
and come face to face as he was not afraid of it in any manner.
Troy once fall ill and had to go
through pneumonia. He was fond of telling the tale about his
illness to everybody time and again
by saying that he defeated death. Here he compared mortality to
an army that tried to conquer
him through an illness. He also said that he talked to the end
and felt it standing in front of him
with a sickle visible in its hand. He says, "I wrestled with death
for three days and three nights,
and I'm standing here to tell you about it" (Wilson,1985, act #
1, scene # 1). This quote explains
how proud he was to survive his illness; he was not thankful to
God, who saved him; instead, he
was taking it as his own triumph. He proudly said that he was
standing in front of all to tell the
story as he defeated death after a great fight of three days and
three nights, and finally, death had
to give up (Gale, 2019).
Troy admits in the reality of death in the play as he says,
"Death ain't nothing to
play with. And I know he's gonna get me. I know I got to join
his army" (Wilson,1985, act # 1,
scene # 1), however he was so much into his self-created beliefs
that he doesn't just stop here by
saying it, he continues and says "But as long as I keep my
strength and see him coming … as
TROY VS DEATH 4
long as I keep up my vigilance … he's gonna have to fight to get
me" (Wilson,1985, act # 1,
scene # 1) which means that although he had some ability of
seeing facts as facts, yet he
becomes in charge of his feelings and again starting believing
that he was much stronger than
death and had the ability to defeat it through his strengths. Even
when he was near to his death,
he was still not ready to embrace the reality of death
wholeheartedly. He talks to the death one
on one and says, "I'm gonna take and build me a fence around
this yard. See? I'm gonna build
me a fence around what belongs to me (Wilson,1985, act # 2,
scene # 2), where he asks death not
to enter the fence that he is going to create around himself and
to stay away from him and be on
the other side of that fence (Nadel, 2019). Troy relates death
and baseball metaphors. He
admitted that when major leagues of baseball were integrated,
he had reached an age that
wouldn't allow him to play baseball, which killed his dreams,
and he felt cheated as he loved
playing baseball. He considers the time when he used to play
baseball as his best times; however,
he considered it as the death of his dreams as he could no longer
play it. Moreover, the songs of
Troy are also from the blues ritual. The song "Hear it Ring Hear
it Ring!" he has inherited from
his father. At the time of death of the Troy and towards the last
scenes of this play, Cory and
Raynell could be seen singing the same song after Troy died.
In the play Fences, there are many conflicts that are
presented by the writer August
Wilson; however, the conflict of Troy with the death is of
foremost importance and has played a
vital central role throughout the play. Troy was never ready to
give importance to death by any
means. He was so confident about taking death as inferior that
he would talk to it one on one in
the play to keep a distance from him as he is unbeatable. Even
towards the last scenes of the
play, when Troy was near to his death, he created a fence
around him and stopped the death to
enter into it. This confidence to defeat death as a result of a
series of incidents that happened in
TROY VS DEATH 5
his past life which including pneumonia and was also able to
survive his abusive father. Troy
didn't give up throughout and fought death right from the start
of his life till he actually died.
TROY VS DEATH 6
References
Gale, C. (2019). A Study Guide for" Fences"(lit-to-film). Gale,
Cengage Learning.
Nadel, A. (2019). Reading August Wilson's Character and His
Characters: A Suggestive
Introduction. August Wilson Journal 1.
Nindita, D., & A, P. R. (2017). Troy Maxson’s Extroversion In
August Wilson’s Fences. Litera~
Kultura 5, no. 3.
Wilson, A. (2016). Fences. Penguin.

More Related Content

Similar to 1. Choose a Case and Complete the Project PlanHospital to Research.docx

Cst 610 Believe Possibilities / snaptutorial.com
Cst 610  Believe Possibilities / snaptutorial.comCst 610  Believe Possibilities / snaptutorial.com
Cst 610 Believe Possibilities / snaptutorial.comDavis10a
 
CSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.comCSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.comMcdonaldRyan78
 
CSEC 610 Effective Communication - snaptutorial.com
CSEC 610 Effective Communication - snaptutorial.comCSEC 610 Effective Communication - snaptutorial.com
CSEC 610 Effective Communication - snaptutorial.comdonaldzs7
 
CSEC 610 Effective Communication/tutorialrank.com
 CSEC 610 Effective Communication/tutorialrank.com CSEC 610 Effective Communication/tutorialrank.com
CSEC 610 Effective Communication/tutorialrank.comjonhson198
 
CST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.comCST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.comkopiko146
 
Csec 610 Believe Possibilities / snaptutorial.com
Csec 610  Believe Possibilities / snaptutorial.comCsec 610  Believe Possibilities / snaptutorial.com
Csec 610 Believe Possibilities / snaptutorial.comDavis10a
 
CYB 610 Effective Communication/tutorialrank.com
 CYB 610 Effective Communication/tutorialrank.com CYB 610 Effective Communication/tutorialrank.com
CYB 610 Effective Communication/tutorialrank.comjonhson199
 
CST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.comCST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.comagathachristie265
 
CST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Educational Specialist--cst610rank.comCST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Educational Specialist--cst610rank.comVSNaipaul15
 
CST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.comCST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.comKeatonJennings104
 
CST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.comCST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.comagathachristie112
 
CST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comCST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comchrysanthemu49
 
Cyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.comCyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.comMcdonaldRyan80
 
Csec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.comCsec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.comrobertlesew5
 
Cyb 610 Believe Possibilities / snaptutorial.com
Cyb 610  Believe Possibilities / snaptutorial.comCyb 610  Believe Possibilities / snaptutorial.com
Cyb 610 Believe Possibilities / snaptutorial.comDavis12a
 
CYB 610 Exceptional Education - snaptutorial.com
CYB 610   Exceptional Education - snaptutorial.comCYB 610   Exceptional Education - snaptutorial.com
CYB 610 Exceptional Education - snaptutorial.comDavisMurphyA98
 
Cyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.comCyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.comrobertlesew8
 
CYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.comCYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.comdonaldzs9
 
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...Hansa Edirisinghe
 
TOPIC 2AnthonyThe movie that I watched for this week, Cons.docx
TOPIC 2AnthonyThe movie that I watched for this week, Cons.docxTOPIC 2AnthonyThe movie that I watched for this week, Cons.docx
TOPIC 2AnthonyThe movie that I watched for this week, Cons.docxturveycharlyn
 

Similar to 1. Choose a Case and Complete the Project PlanHospital to Research.docx (20)

Cst 610 Believe Possibilities / snaptutorial.com
Cst 610  Believe Possibilities / snaptutorial.comCst 610  Believe Possibilities / snaptutorial.com
Cst 610 Believe Possibilities / snaptutorial.com
 
CSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.comCSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.com
 
CSEC 610 Effective Communication - snaptutorial.com
CSEC 610 Effective Communication - snaptutorial.comCSEC 610 Effective Communication - snaptutorial.com
CSEC 610 Effective Communication - snaptutorial.com
 
CSEC 610 Effective Communication/tutorialrank.com
 CSEC 610 Effective Communication/tutorialrank.com CSEC 610 Effective Communication/tutorialrank.com
CSEC 610 Effective Communication/tutorialrank.com
 
CST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.comCST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.com
 
Csec 610 Believe Possibilities / snaptutorial.com
Csec 610  Believe Possibilities / snaptutorial.comCsec 610  Believe Possibilities / snaptutorial.com
Csec 610 Believe Possibilities / snaptutorial.com
 
CYB 610 Effective Communication/tutorialrank.com
 CYB 610 Effective Communication/tutorialrank.com CYB 610 Effective Communication/tutorialrank.com
CYB 610 Effective Communication/tutorialrank.com
 
CST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.comCST 610 RANK Introduction Education--cst610rank.com
CST 610 RANK Introduction Education--cst610rank.com
 
CST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Educational Specialist--cst610rank.comCST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Educational Specialist--cst610rank.com
 
CST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.comCST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.com
 
CST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.comCST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.com
 
CST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comCST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.com
 
Cyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.comCyb 610Education Specialist / snaptutorial.com
Cyb 610Education Specialist / snaptutorial.com
 
Csec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.comCsec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.com
 
Cyb 610 Believe Possibilities / snaptutorial.com
Cyb 610  Believe Possibilities / snaptutorial.comCyb 610  Believe Possibilities / snaptutorial.com
Cyb 610 Believe Possibilities / snaptutorial.com
 
CYB 610 Exceptional Education - snaptutorial.com
CYB 610   Exceptional Education - snaptutorial.comCYB 610   Exceptional Education - snaptutorial.com
CYB 610 Exceptional Education - snaptutorial.com
 
Cyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.comCyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.com
 
CYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.comCYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.com
 
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
 
TOPIC 2AnthonyThe movie that I watched for this week, Cons.docx
TOPIC 2AnthonyThe movie that I watched for this week, Cons.docxTOPIC 2AnthonyThe movie that I watched for this week, Cons.docx
TOPIC 2AnthonyThe movie that I watched for this week, Cons.docx
 

More from jeremylockett77

M3 ch12 discussionConnecting Eligible Immigrant Families to Heal.docx
M3 ch12 discussionConnecting Eligible Immigrant Families to Heal.docxM3 ch12 discussionConnecting Eligible Immigrant Families to Heal.docx
M3 ch12 discussionConnecting Eligible Immigrant Families to Heal.docxjeremylockett77
 
Loudres eats powdered doughnuts for breakfast  and chocolate that sh.docx
Loudres eats powdered doughnuts for breakfast  and chocolate that sh.docxLoudres eats powdered doughnuts for breakfast  and chocolate that sh.docx
Loudres eats powdered doughnuts for breakfast  and chocolate that sh.docxjeremylockett77
 
Lostinnocenceyoucouldexploreachildsoldierwhohasbeen.docx
Lostinnocenceyoucouldexploreachildsoldierwhohasbeen.docxLostinnocenceyoucouldexploreachildsoldierwhohasbeen.docx
Lostinnocenceyoucouldexploreachildsoldierwhohasbeen.docxjeremylockett77
 
Lori Goler is the head of People at Facebook. Janelle Gal.docx
Lori Goler is the head  of People at Facebook. Janelle Gal.docxLori Goler is the head  of People at Facebook. Janelle Gal.docx
Lori Goler is the head of People at Facebook. Janelle Gal.docxjeremylockett77
 
Looking for someone to take these two documents- annotated bibliogra.docx
Looking for someone to take these two documents- annotated bibliogra.docxLooking for someone to take these two documents- annotated bibliogra.docx
Looking for someone to take these two documents- annotated bibliogra.docxjeremylockett77
 
Lorryn Tardy – critique to my persuasive essayFor this assignm.docx
Lorryn Tardy – critique to my persuasive essayFor this assignm.docxLorryn Tardy – critique to my persuasive essayFor this assignm.docx
Lorryn Tardy – critique to my persuasive essayFor this assignm.docxjeremylockett77
 
M450 Mission Command SystemGeneral forum instructions Answ.docx
M450 Mission Command SystemGeneral forum instructions Answ.docxM450 Mission Command SystemGeneral forum instructions Answ.docx
M450 Mission Command SystemGeneral forum instructions Answ.docxjeremylockett77
 
Lymphedema following breast cancer The importance of surgic.docx
Lymphedema following breast cancer The importance of surgic.docxLymphedema following breast cancer The importance of surgic.docx
Lymphedema following breast cancer The importance of surgic.docxjeremylockett77
 
Love Beyond Wallshttpswww.lovebeyondwalls.orgProvid.docx
Love Beyond Wallshttpswww.lovebeyondwalls.orgProvid.docxLove Beyond Wallshttpswww.lovebeyondwalls.orgProvid.docx
Love Beyond Wallshttpswww.lovebeyondwalls.orgProvid.docxjeremylockett77
 
Longevity PresentationThe purpose of this assignment is to exami.docx
Longevity PresentationThe purpose of this assignment is to exami.docxLongevity PresentationThe purpose of this assignment is to exami.docx
Longevity PresentationThe purpose of this assignment is to exami.docxjeremylockett77
 
Look again at the CDCs Web page about ADHD.In 150-200 w.docx
Look again at the CDCs Web page about ADHD.In 150-200 w.docxLook again at the CDCs Web page about ADHD.In 150-200 w.docx
Look again at the CDCs Web page about ADHD.In 150-200 w.docxjeremylockett77
 
M8-22 ANALYTICS o TEAMS • ORGANIZATIONS • SKILLS .fÿy.docx
M8-22   ANALYTICS o TEAMS • ORGANIZATIONS • SKILLS        .fÿy.docxM8-22   ANALYTICS o TEAMS • ORGANIZATIONS • SKILLS        .fÿy.docx
M8-22 ANALYTICS o TEAMS • ORGANIZATIONS • SKILLS .fÿy.docxjeremylockett77
 
Lombosoro theory.In week 4, you learned about the importance.docx
Lombosoro theory.In week 4, you learned about the importance.docxLombosoro theory.In week 4, you learned about the importance.docx
Lombosoro theory.In week 4, you learned about the importance.docxjeremylockett77
 
Looking over the initial material on the definitions of philosophy i.docx
Looking over the initial material on the definitions of philosophy i.docxLooking over the initial material on the definitions of philosophy i.docx
Looking over the initial material on the definitions of philosophy i.docxjeremylockett77
 
Lucky Iron FishBy Ashley SnookPro.docx
Lucky Iron FishBy Ashley SnookPro.docxLucky Iron FishBy Ashley SnookPro.docx
Lucky Iron FishBy Ashley SnookPro.docxjeremylockett77
 
Lucky Iron FishBy Ashley SnookMGMT 350Spring 2018ht.docx
Lucky Iron FishBy Ashley SnookMGMT 350Spring 2018ht.docxLucky Iron FishBy Ashley SnookMGMT 350Spring 2018ht.docx
Lucky Iron FishBy Ashley SnookMGMT 350Spring 2018ht.docxjeremylockett77
 
look for a article that talks about some type of police activity a.docx
look for a article that talks about some type of police activity a.docxlook for a article that talks about some type of police activity a.docx
look for a article that talks about some type of police activity a.docxjeremylockett77
 
Look at the Code of Ethics for at least two professional agencies,  .docx
Look at the Code of Ethics for at least two professional agencies,  .docxLook at the Code of Ethics for at least two professional agencies,  .docx
Look at the Code of Ethics for at least two professional agencies,  .docxjeremylockett77
 
Locate an example for 5 of the 12 following types of communica.docx
Locate an example for 5 of the 12 following types of communica.docxLocate an example for 5 of the 12 following types of communica.docx
Locate an example for 5 of the 12 following types of communica.docxjeremylockett77
 
Locate and read the other teams’ group project reports (located .docx
Locate and read the other teams’ group project reports (located .docxLocate and read the other teams’ group project reports (located .docx
Locate and read the other teams’ group project reports (located .docxjeremylockett77
 

More from jeremylockett77 (20)

M3 ch12 discussionConnecting Eligible Immigrant Families to Heal.docx
M3 ch12 discussionConnecting Eligible Immigrant Families to Heal.docxM3 ch12 discussionConnecting Eligible Immigrant Families to Heal.docx
M3 ch12 discussionConnecting Eligible Immigrant Families to Heal.docx
 
Loudres eats powdered doughnuts for breakfast  and chocolate that sh.docx
Loudres eats powdered doughnuts for breakfast  and chocolate that sh.docxLoudres eats powdered doughnuts for breakfast  and chocolate that sh.docx
Loudres eats powdered doughnuts for breakfast  and chocolate that sh.docx
 
Lostinnocenceyoucouldexploreachildsoldierwhohasbeen.docx
Lostinnocenceyoucouldexploreachildsoldierwhohasbeen.docxLostinnocenceyoucouldexploreachildsoldierwhohasbeen.docx
Lostinnocenceyoucouldexploreachildsoldierwhohasbeen.docx
 
Lori Goler is the head of People at Facebook. Janelle Gal.docx
Lori Goler is the head  of People at Facebook. Janelle Gal.docxLori Goler is the head  of People at Facebook. Janelle Gal.docx
Lori Goler is the head of People at Facebook. Janelle Gal.docx
 
Looking for someone to take these two documents- annotated bibliogra.docx
Looking for someone to take these two documents- annotated bibliogra.docxLooking for someone to take these two documents- annotated bibliogra.docx
Looking for someone to take these two documents- annotated bibliogra.docx
 
Lorryn Tardy – critique to my persuasive essayFor this assignm.docx
Lorryn Tardy – critique to my persuasive essayFor this assignm.docxLorryn Tardy – critique to my persuasive essayFor this assignm.docx
Lorryn Tardy – critique to my persuasive essayFor this assignm.docx
 
M450 Mission Command SystemGeneral forum instructions Answ.docx
M450 Mission Command SystemGeneral forum instructions Answ.docxM450 Mission Command SystemGeneral forum instructions Answ.docx
M450 Mission Command SystemGeneral forum instructions Answ.docx
 
Lymphedema following breast cancer The importance of surgic.docx
Lymphedema following breast cancer The importance of surgic.docxLymphedema following breast cancer The importance of surgic.docx
Lymphedema following breast cancer The importance of surgic.docx
 
Love Beyond Wallshttpswww.lovebeyondwalls.orgProvid.docx
Love Beyond Wallshttpswww.lovebeyondwalls.orgProvid.docxLove Beyond Wallshttpswww.lovebeyondwalls.orgProvid.docx
Love Beyond Wallshttpswww.lovebeyondwalls.orgProvid.docx
 
Longevity PresentationThe purpose of this assignment is to exami.docx
Longevity PresentationThe purpose of this assignment is to exami.docxLongevity PresentationThe purpose of this assignment is to exami.docx
Longevity PresentationThe purpose of this assignment is to exami.docx
 
Look again at the CDCs Web page about ADHD.In 150-200 w.docx
Look again at the CDCs Web page about ADHD.In 150-200 w.docxLook again at the CDCs Web page about ADHD.In 150-200 w.docx
Look again at the CDCs Web page about ADHD.In 150-200 w.docx
 
M8-22 ANALYTICS o TEAMS • ORGANIZATIONS • SKILLS .fÿy.docx
M8-22   ANALYTICS o TEAMS • ORGANIZATIONS • SKILLS        .fÿy.docxM8-22   ANALYTICS o TEAMS • ORGANIZATIONS • SKILLS        .fÿy.docx
M8-22 ANALYTICS o TEAMS • ORGANIZATIONS • SKILLS .fÿy.docx
 
Lombosoro theory.In week 4, you learned about the importance.docx
Lombosoro theory.In week 4, you learned about the importance.docxLombosoro theory.In week 4, you learned about the importance.docx
Lombosoro theory.In week 4, you learned about the importance.docx
 
Looking over the initial material on the definitions of philosophy i.docx
Looking over the initial material on the definitions of philosophy i.docxLooking over the initial material on the definitions of philosophy i.docx
Looking over the initial material on the definitions of philosophy i.docx
 
Lucky Iron FishBy Ashley SnookPro.docx
Lucky Iron FishBy Ashley SnookPro.docxLucky Iron FishBy Ashley SnookPro.docx
Lucky Iron FishBy Ashley SnookPro.docx
 
Lucky Iron FishBy Ashley SnookMGMT 350Spring 2018ht.docx
Lucky Iron FishBy Ashley SnookMGMT 350Spring 2018ht.docxLucky Iron FishBy Ashley SnookMGMT 350Spring 2018ht.docx
Lucky Iron FishBy Ashley SnookMGMT 350Spring 2018ht.docx
 
look for a article that talks about some type of police activity a.docx
look for a article that talks about some type of police activity a.docxlook for a article that talks about some type of police activity a.docx
look for a article that talks about some type of police activity a.docx
 
Look at the Code of Ethics for at least two professional agencies,  .docx
Look at the Code of Ethics for at least two professional agencies,  .docxLook at the Code of Ethics for at least two professional agencies,  .docx
Look at the Code of Ethics for at least two professional agencies,  .docx
 
Locate an example for 5 of the 12 following types of communica.docx
Locate an example for 5 of the 12 following types of communica.docxLocate an example for 5 of the 12 following types of communica.docx
Locate an example for 5 of the 12 following types of communica.docx
 
Locate and read the other teams’ group project reports (located .docx
Locate and read the other teams’ group project reports (located .docxLocate and read the other teams’ group project reports (located .docx
Locate and read the other teams’ group project reports (located .docx
 

Recently uploaded

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 

Recently uploaded (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

1. Choose a Case and Complete the Project PlanHospital to Research.docx

  • 1. 1. Choose a Case and Complete the Project Plan Hospital to Research (Kaiser Permanente) Select a hospital or health care organization as your case to research. Consider an organization you are familiar with or one for which you can find sufficient information. To maintain confidentiality, you do not need to mention the name of the organization. You can also refer to the Health and Human Services (HHS) site for organizations that have reported breaches. Also, read this cybersecurity field overview to consider different roles that may apply as you review your case. Now that you have chosen a case, the next action is to establish how you will apportion the work. Use your team space to share ideas and drafts of each member’s contribution. Conduct research to capture the organization's infrastructure and processes, the threats to personal health information (PHI) and determine a strategy to mitigate the threats you anticipate. This research will go into the technical report (or white paper, nine to 10 pages excluding cover sheet, references, and any appendices). After the paper is written, you will create a one- page executive summary of the paper. It will be part of the technical report document, immediately after the cover sheet and before the text of the report. 2. Create an Organizational Profile for Your Case Now, it is time to research your chosen case to determine how the organization’s IT department operates, how it is structured, and how PHI is moved around the organization for stakeholders’ use. Next, review the materials in the links below to define and describe the hospital’s information system infrastructure. It is important to understand the organization’s workflow `processes—how they move patient information to the business units that need to process and manage that information, from billing to physician care. All these organizations employ hardware and software within their information systems. It is critical to understand these components, termed a “typology,”
  • 2. and how the components are connected so that appropriate security is put in place to protect sensitive information. Your research should provide examples of how an information system is connected to cybersecurity components, like firewalls in the information system and network. Be sure you understand the benefits and weaknesses of your case’s network topology. Your definition of the organization’s typology should include a high-level description of information systems hardware and software components and their interactions. Take time to read the following resources. The table below provides a focus for your search strategies. You should consult scholarly resources as well as online resources, newspapers, websites, and IT blogs for similar contemporary cases. Topics to Address in the Organizational Profile 1. Describe the organization and structure. The structure will include the different business units and their functions. You may use an organizational chart to provide this information. 2. Define information security needs to protect mission-critical systems. Choose one or more mission-critical systems of the health care organization. Define the information protection needs for the organization's mission-critical protected health information (PHI). This information is stored in database medical records for doctors, nurses, and insurance claims billing systems, which are used to fulfill the organization’s information needs. 3. Define the workflows and processes for the high-level information systems that you have just identified. Workflows and processes for health care organizations define how the organization gets its work done. 4. Describe how the typology fulfills the needs of the health care organization. You may supply this information as a diagram with inputs, outputs, and technologies to define workflows and processes for the high-level information systems. In the next step, you will consider threats to the organization’s
  • 3. information security and how to mitigate them. 3. Develop Analysis of Threats to the Organization's Information Systems Infrastructure Now that you have defined the hospital's information system infrastructure, you will have to learn about and demonstrate your understanding of the potential threats to those systems and the types of measures that could address those threats. In this section, you will learn about different types of identity access management solutions and how they protect against the threat of unauthorized access. To complete this section of the report, start by reviewing the following resources: · Web security issues · Insider threats · Intrusion motives/hacker psychology · CIA triad Take what you learned about potential threats to assess the threat(s) to the hospital's information systems infrastructure. Include a brief summary of insider threats, intrusion motives, and hacker psychology in your report as it relates to your organization’s data processing systems. Relate these threats to the vulnerabilities in the CIA triad. Your report will also include a description of the purpose and components of an identity management system, to include authentication, authorization, and access control. Include a discussion of doctors’ use of laptop devices when they visit their patients at the hospital and need access to hospital PHI data. Review the following resources: · Authorization · Access control · Passwords · Multifactor authentication Next, expand your description by defining the types of access control management, to include access control lists in operating systems, role-based access controls, files, and database access controls. Define types of authorization and authentication and
  • 4. the use of passwords, password management, and password protection in an identity management system. Describe common factor authentication mechanisms to include multifactor authentication. Topics to Address in the Description of Threats and Mitigation Strategies 1. Describe potential threats to the organization’s critical mission areas. These may include sloppy information security practices, insider threats, or hackers wishing to steal personal data. Relate these threats to the vulnerabilities in the CIA triad. 2. Describe how the organization restricts access to protect billing and PHI. Explain the organization’s processes and workflows to safeguard PHI, specifically the use of passwords, password management, and password protection in an identity management system. 3. Define the access management system. What types of access control management, to include access control lists in operating systems, role-based access controls, files, and database access controls will it take to ensure that access is limited to those with a need to know? 4. Define factor authentication systems. How do common factor authentication mechanisms, to include multifactor authentication practices, safeguard sensitive information for an organization like this? 5. Discuss strategic considerations and provide recommendations. Review the mission and organization structure of your organization as well as roles within the organization, and recommend accesses, restrictions, and conditions for each role 6. Discuss the manager’s risk considerations. What will happen if the CIO and the leaders do nothing and decide to accept the risks? Could the CIO transfer, mitigate, or eliminate the risks? What are the projected costs to address the risks? Now, you are ready to start writing your technical report (white paper). The technical report will identify vulnerabilities in the information systems infrastructure of the health care
  • 5. organization, and identify risks to the organization's data. Your paper will propose a way to prioritize these risks and propose remediation actions. Running head: TROY VS DEATH 1 Troy vs Death – A Driving Conflict of the Play Vernon Hunter Post University TROY VS DEATH 2 Troy vs Death – A Driving Conflict of the Play Fences is a play written by August Wilson that is based on features of black life towards
  • 6. the end of the twentieth century and what challenges they had to face while living in American society being African-Americans. This play is based on small and large conflicts in the life of the main character of the play (Troy), which he had to fight throughout his life. All these conflicts were created in his life as he used to believe in self-created illusions and also that he was unable to accept the choices of others. "Out of all these conflicts, the main driving force of the play Fences is the conflict between Troy and Death as it can be seen superseding every other conflict as explained below." In the first scene of the play, Troy Maxson said: "Death ain't nothing but a fastball on the outside corner." (Wilson,1985, act # 1, scene # 1). Troy was extremely proud of baseball and knew that he was able to conquer it on his own. He also believes that he was unbeatable when it comes to issues of life and death as he was able to survive pneumonia ten years ago, able to survive an abusive father, and also when he had to go through treacherous conditions towards his journey to Pittsburgh.
  • 7. Fact is something that is built on a firm belief and not just for the sake of saying, same as it was for Troy to have a belief in death that is meant for everyone in this world. He uttered this belief in this first scene; he is seen not afraid of anything, including death again. When he said, "Ain't nothing wrong with talking about death. That's part of life. Everybody gonna die. You gonna die, I'm gonna die. Bono's gonna die. Hell, we all gonna die." (Wilson,1985, act # 1, scene # 1). This quote from the play indicates that Troy had a fair sense of assessing a real thing and that his interest in that real thing purely was dependent upon the series of incidents that TROY VS DEATH 3 happened in his past life, which laid a foundation stone for him to believe whether it was good or bad (Nindita & A, 2017). Death is the driving conflict of this play, which is expressed in multiple scenes by the writer. In one of the scenes of this play, bell of a phone
  • 8. rings in the middle of the night, Rose answered the phone as woke troy who was asleep at that time. Rose tells Troy that a baby girl was born; nevertheless, Alberta was no more due to some complications during the birth of a girl. Troy moves towards the window and leans out in the rain and warns the death to limit itself only to the other side of the fence that he is constructing. He continues the challenge by saying that death should not sneak through the back door to him; instead, it should knock the front door and come face to face as he was not afraid of it in any manner. Troy once fall ill and had to go through pneumonia. He was fond of telling the tale about his illness to everybody time and again by saying that he defeated death. Here he compared mortality to an army that tried to conquer him through an illness. He also said that he talked to the end and felt it standing in front of him with a sickle visible in its hand. He says, "I wrestled with death for three days and three nights, and I'm standing here to tell you about it" (Wilson,1985, act # 1, scene # 1). This quote explains how proud he was to survive his illness; he was not thankful to
  • 9. God, who saved him; instead, he was taking it as his own triumph. He proudly said that he was standing in front of all to tell the story as he defeated death after a great fight of three days and three nights, and finally, death had to give up (Gale, 2019). Troy admits in the reality of death in the play as he says, "Death ain't nothing to play with. And I know he's gonna get me. I know I got to join his army" (Wilson,1985, act # 1, scene # 1), however he was so much into his self-created beliefs that he doesn't just stop here by saying it, he continues and says "But as long as I keep my strength and see him coming … as TROY VS DEATH 4 long as I keep up my vigilance … he's gonna have to fight to get me" (Wilson,1985, act # 1, scene # 1) which means that although he had some ability of seeing facts as facts, yet he becomes in charge of his feelings and again starting believing that he was much stronger than
  • 10. death and had the ability to defeat it through his strengths. Even when he was near to his death, he was still not ready to embrace the reality of death wholeheartedly. He talks to the death one on one and says, "I'm gonna take and build me a fence around this yard. See? I'm gonna build me a fence around what belongs to me (Wilson,1985, act # 2, scene # 2), where he asks death not to enter the fence that he is going to create around himself and to stay away from him and be on the other side of that fence (Nadel, 2019). Troy relates death and baseball metaphors. He admitted that when major leagues of baseball were integrated, he had reached an age that wouldn't allow him to play baseball, which killed his dreams, and he felt cheated as he loved playing baseball. He considers the time when he used to play baseball as his best times; however, he considered it as the death of his dreams as he could no longer play it. Moreover, the songs of Troy are also from the blues ritual. The song "Hear it Ring Hear it Ring!" he has inherited from his father. At the time of death of the Troy and towards the last scenes of this play, Cory and
  • 11. Raynell could be seen singing the same song after Troy died. In the play Fences, there are many conflicts that are presented by the writer August Wilson; however, the conflict of Troy with the death is of foremost importance and has played a vital central role throughout the play. Troy was never ready to give importance to death by any means. He was so confident about taking death as inferior that he would talk to it one on one in the play to keep a distance from him as he is unbeatable. Even towards the last scenes of the play, when Troy was near to his death, he created a fence around him and stopped the death to enter into it. This confidence to defeat death as a result of a series of incidents that happened in TROY VS DEATH 5 his past life which including pneumonia and was also able to survive his abusive father. Troy didn't give up throughout and fought death right from the start of his life till he actually died.
  • 12. TROY VS DEATH 6 References Gale, C. (2019). A Study Guide for" Fences"(lit-to-film). Gale, Cengage Learning. Nadel, A. (2019). Reading August Wilson's Character and His Characters: A Suggestive Introduction. August Wilson Journal 1. Nindita, D., & A, P. R. (2017). Troy Maxson’s Extroversion In August Wilson’s Fences. Litera~ Kultura 5, no. 3. Wilson, A. (2016). Fences. Penguin.