1. Choose a Case and Complete the Project Plan
Hospital to Research (Kaiser Permanente)
Select a hospital or health care organization as your case to research. Consider an organization you are familiar with or one for which you can find sufficient information. To maintain confidentiality, you do not need to mention the name of the organization. You can also refer to the Health and Human Services (HHS) site for organizations that have reported breaches. Also, read this cybersecurity field overview to consider different roles that may apply as you review your case.
Now that you have chosen a case, the next action is to establish how you will apportion the work. Use your team space to share ideas and drafts of each member’s contribution.
Conduct research to capture the organization's infrastructure and processes, the threats to personal health information (PHI) and determine a strategy to mitigate the threats you anticipate. This research will go into the technical report (or white paper, nine to 10 pages excluding cover sheet, references, and any appendices). After the paper is written, you will create a one-page executive summary of the paper. It will be part of the technical report document, immediately after the cover sheet and before the text of the report.
2. Create an Organizational Profile for Your Case
Now, it is time to research your chosen case to determine how the organization’s IT department operates, how it is structured, and how PHI is moved around the organization for stakeholders’ use. Next, review the materials in the links below to define and describe the hospital’s information system infrastructure.
It is important to understand the organization’s workflow `processes—how they move patient information to the business units that need to process and manage that information, from billing to physician care. All these organizations employ hardware and software within their information systems. It is critical to understand these components, termed a “typology,” and how the components are connected so that appropriate security is put in place to protect sensitive information.
Your research should provide examples of how an information system is connected to cybersecurity components, like firewalls in the information system and network. Be sure you understand the benefits and weaknesses of your case’s network topology.
Your definition of the organization’s typology should include a high-level description of information systems hardware and software components and their interactions. Take time to read the following resources.
The table below provides a focus for your search strategies. You should consult scholarly resources as well as online resources, newspapers, websites, and IT blogs for similar contemporary cases.
Topics to Address in the Organizational Profile
1. Describe the organization and structure. The structure will include the different business units and their functions. You may use an organizational chart to provid ...
1. Choose a Case and Complete the Project PlanHospital to Research.docx
1. 1. Choose a Case and Complete the Project Plan
Hospital to Research (Kaiser Permanente)
Select a hospital or health care organization as your case to
research. Consider an organization you are familiar with or one
for which you can find sufficient information. To maintain
confidentiality, you do not need to mention the name of the
organization. You can also refer to the Health and Human
Services (HHS) site for organizations that have reported
breaches. Also, read this cybersecurity field overview to
consider different roles that may apply as you review your
case.
Now that you have chosen a case, the next action is to establish
how you will apportion the work. Use your team space to share
ideas and drafts of each member’s contribution.
Conduct research to capture the organization's infrastructure
and processes, the threats to personal health information (PHI)
and determine a strategy to mitigate the threats you anticipate.
This research will go into the technical report (or white paper,
nine to 10 pages excluding cover sheet, references, and any
appendices). After the paper is written, you will create a one-
page executive summary of the paper. It will be part of the
technical report document, immediately after the cover sheet
and before the text of the report.
2. Create an Organizational Profile for Your Case
Now, it is time to research your chosen case to determine how
the organization’s IT department operates, how it is structured,
and how PHI is moved around the organization for stakeholders’
use. Next, review the materials in the links below to define and
describe the hospital’s information system infrastructure.
It is important to understand the organization’s workflow
`processes—how they move patient information to the business
units that need to process and manage that information, from
billing to physician care. All these organizations employ
hardware and software within their information systems. It is
critical to understand these components, termed a “typology,”
2. and how the components are connected so that appropriate
security is put in place to protect sensitive information.
Your research should provide examples of how an information
system is connected to cybersecurity components, like firewalls
in the information system and network. Be sure you understand
the benefits and weaknesses of your case’s network topology.
Your definition of the organization’s typology should include a
high-level description of information systems hardware and
software components and their interactions. Take time to read
the following resources.
The table below provides a focus for your search strategies. You
should consult scholarly resources as well as online resources,
newspapers, websites, and IT blogs for similar contemporary
cases.
Topics to Address in the Organizational Profile
1. Describe the organization and structure. The structure will
include the different business units and their functions. You
may use an organizational chart to provide this information.
2. Define information security needs to protect mission-critical
systems. Choose one or more mission-critical systems of the
health care organization. Define the information protection
needs for the organization's mission-critical protected health
information (PHI). This information is stored in database
medical records for doctors, nurses, and insurance claims
billing systems, which are used to fulfill the organization’s
information needs.
3. Define the workflows and processes for the high-level
information systems that you have just identified. Workflows
and processes for health care organizations define how the
organization gets its work done.
4. Describe how the typology fulfills the needs of the health
care organization. You may supply this information as a
diagram with inputs, outputs, and technologies to define
workflows and processes for the high-level information systems.
In the next step, you will consider threats to the organization’s
3. information security and how to mitigate them.
3. Develop Analysis of Threats to the Organization's
Information Systems Infrastructure
Now that you have defined the hospital's information system
infrastructure, you will have to learn about and demonstrate
your understanding of the potential threats to those systems and
the types of measures that could address those threats. In this
section, you will learn about different types of identity access
management solutions and how they protect against the threat of
unauthorized access.
To complete this section of the report, start by reviewing the
following resources:
· Web security issues
· Insider threats
· Intrusion motives/hacker psychology
· CIA triad
Take what you learned about potential threats to assess the
threat(s) to the hospital's information systems infrastructure.
Include a brief summary of insider threats, intrusion motives,
and hacker psychology in your report as it relates to your
organization’s data processing systems. Relate these threats to
the vulnerabilities in the CIA triad.
Your report will also include a description of the purpose and
components of an identity management system, to include
authentication, authorization, and access control. Include a
discussion of doctors’ use of laptop devices when they visit
their patients at the hospital and need access to hospital PHI
data. Review the following resources:
· Authorization
· Access control
· Passwords
· Multifactor authentication
Next, expand your description by defining the types of access
control management, to include access control lists in operating
systems, role-based access controls, files, and database access
controls. Define types of authorization and authentication and
4. the use of passwords, password management, and password
protection in an identity management system. Describe common
factor authentication mechanisms to include multifactor
authentication.
Topics to Address in the Description of Threats and Mitigation
Strategies
1. Describe potential threats to the organization’s critical
mission areas. These may include sloppy information security
practices, insider threats, or hackers wishing to steal personal
data. Relate these threats to the vulnerabilities in the CIA triad.
2. Describe how the organization restricts access to protect
billing and PHI. Explain the organization’s processes and
workflows to safeguard PHI, specifically the use of passwords,
password management, and password protection in an identity
management system.
3. Define the access management system. What types of access
control management, to include access control lists in operating
systems, role-based access controls, files, and database access
controls will it take to ensure that access is limited to those
with a need to know?
4. Define factor authentication systems. How do common factor
authentication mechanisms, to include multifactor
authentication practices, safeguard sensitive information for an
organization like this?
5. Discuss strategic considerations and provide
recommendations. Review the mission and organization
structure of your organization as well as roles within the
organization, and recommend accesses, restrictions, and
conditions for each role
6. Discuss the manager’s risk considerations. What will happen
if the CIO and the leaders do nothing and decide to accept the
risks? Could the CIO transfer, mitigate, or eliminate the risks?
What are the projected costs to address the risks?
Now, you are ready to start writing your technical report (white
paper). The technical report will identify vulnerabilities in the
information systems infrastructure of the health care
5. organization, and identify risks to the organization's data. Your
paper will propose a way to prioritize these risks and propose
remediation actions.
Running head: TROY VS DEATH 1
Troy vs Death – A Driving Conflict of the Play
Vernon Hunter
Post University
TROY VS DEATH 2
Troy vs Death – A Driving Conflict of the Play
Fences is a play written by August Wilson that is based on
features of black life towards
6. the end of the twentieth century and what challenges they had to
face while living in American
society being African-Americans. This play is based on small
and large conflicts in the life of the
main character of the play (Troy), which he had to fight
throughout his life. All these conflicts
were created in his life as he used to believe in self-created
illusions and also that he was unable
to accept the choices of others. "Out of all these conflicts, the
main driving force of the play
Fences is the conflict between Troy and Death as it can be seen
superseding every other conflict
as explained below."
In the first scene of the play, Troy Maxson said: "Death
ain't nothing but a fastball
on the outside corner." (Wilson,1985, act # 1, scene # 1). Troy
was extremely proud of baseball
and knew that he was able to conquer it on his own. He also
believes that he was unbeatable
when it comes to issues of life and death as he was able to
survive pneumonia ten years ago, able
to survive an abusive father, and also when he had to go through
treacherous conditions towards
his journey to Pittsburgh.
7. Fact is something that is built on a firm belief and not just for
the sake of saying, same as
it was for Troy to have a belief in death that is meant for
everyone in this world. He uttered this
belief in this first scene; he is seen not afraid of anything,
including death again. When he
said, "Ain't nothing wrong with talking about death. That's part
of life. Everybody gonna die. You
gonna die, I'm gonna die. Bono's gonna die. Hell, we all gonna
die." (Wilson,1985, act # 1,
scene # 1). This quote from the play indicates that Troy had a
fair sense of assessing a real thing
and that his interest in that real thing purely was dependent
upon the series of incidents that
TROY VS DEATH 3
happened in his past life, which laid a foundation stone for him
to believe whether it was good or
bad (Nindita & A, 2017).
Death is the driving conflict of this play, which is
expressed in multiple scenes by
the writer. In one of the scenes of this play, bell of a phone
8. rings in the middle of the night, Rose
answered the phone as woke troy who was asleep at that time.
Rose tells Troy that a baby girl
was born; nevertheless, Alberta was no more due to some
complications during the birth of a
girl. Troy moves towards the window and leans out in the rain
and warns the death to limit itself
only to the other side of the fence that he is constructing. He
continues the challenge by saying
that death should not sneak through the back door to him;
instead, it should knock the front door
and come face to face as he was not afraid of it in any manner.
Troy once fall ill and had to go
through pneumonia. He was fond of telling the tale about his
illness to everybody time and again
by saying that he defeated death. Here he compared mortality to
an army that tried to conquer
him through an illness. He also said that he talked to the end
and felt it standing in front of him
with a sickle visible in its hand. He says, "I wrestled with death
for three days and three nights,
and I'm standing here to tell you about it" (Wilson,1985, act #
1, scene # 1). This quote explains
how proud he was to survive his illness; he was not thankful to
9. God, who saved him; instead, he
was taking it as his own triumph. He proudly said that he was
standing in front of all to tell the
story as he defeated death after a great fight of three days and
three nights, and finally, death had
to give up (Gale, 2019).
Troy admits in the reality of death in the play as he says,
"Death ain't nothing to
play with. And I know he's gonna get me. I know I got to join
his army" (Wilson,1985, act # 1,
scene # 1), however he was so much into his self-created beliefs
that he doesn't just stop here by
saying it, he continues and says "But as long as I keep my
strength and see him coming … as
TROY VS DEATH 4
long as I keep up my vigilance … he's gonna have to fight to get
me" (Wilson,1985, act # 1,
scene # 1) which means that although he had some ability of
seeing facts as facts, yet he
becomes in charge of his feelings and again starting believing
that he was much stronger than
10. death and had the ability to defeat it through his strengths. Even
when he was near to his death,
he was still not ready to embrace the reality of death
wholeheartedly. He talks to the death one
on one and says, "I'm gonna take and build me a fence around
this yard. See? I'm gonna build
me a fence around what belongs to me (Wilson,1985, act # 2,
scene # 2), where he asks death not
to enter the fence that he is going to create around himself and
to stay away from him and be on
the other side of that fence (Nadel, 2019). Troy relates death
and baseball metaphors. He
admitted that when major leagues of baseball were integrated,
he had reached an age that
wouldn't allow him to play baseball, which killed his dreams,
and he felt cheated as he loved
playing baseball. He considers the time when he used to play
baseball as his best times; however,
he considered it as the death of his dreams as he could no longer
play it. Moreover, the songs of
Troy are also from the blues ritual. The song "Hear it Ring Hear
it Ring!" he has inherited from
his father. At the time of death of the Troy and towards the last
scenes of this play, Cory and
11. Raynell could be seen singing the same song after Troy died.
In the play Fences, there are many conflicts that are
presented by the writer August
Wilson; however, the conflict of Troy with the death is of
foremost importance and has played a
vital central role throughout the play. Troy was never ready to
give importance to death by any
means. He was so confident about taking death as inferior that
he would talk to it one on one in
the play to keep a distance from him as he is unbeatable. Even
towards the last scenes of the
play, when Troy was near to his death, he created a fence
around him and stopped the death to
enter into it. This confidence to defeat death as a result of a
series of incidents that happened in
TROY VS DEATH 5
his past life which including pneumonia and was also able to
survive his abusive father. Troy
didn't give up throughout and fought death right from the start
of his life till he actually died.
12. TROY VS DEATH 6
References
Gale, C. (2019). A Study Guide for" Fences"(lit-to-film). Gale,
Cengage Learning.
Nadel, A. (2019). Reading August Wilson's Character and His
Characters: A Suggestive
Introduction. August Wilson Journal 1.
Nindita, D., & A, P. R. (2017). Troy Maxson’s Extroversion In
August Wilson’s Fences. Litera~
Kultura 5, no. 3.
Wilson, A. (2016). Fences. Penguin.