SlideShare a Scribd company logo
Project: Access Control Proposal
Purpose
This course project is intended to assess your ability to
comprehend and apply the basic concepts related to information
security management, such as the following:
The ability to discern when a risk assessment should be
performed and carrying out the task
Understanding user or customer access requirements, whether
remote or local
Using a layered security approach to establish and maintain
access controls
Working with other departments, such as the human resources
department, to identify and implement methods to prevent
unwarranted exposure to information by inappropriate personnel
Your ability to execute the tasks within these information
security domains and others will be evaluated against the
learning objectives as identified and described in previous
lessons of instruction for this course. Required Source
Information and Tools
Web References: Links to Web references in this Instructor
Guide and related materials are subject to change without prior
notice. These links were last verified on August 2, 2014.
The following tools and resources will be needed to complete
this project:
· Course textbook
· Access to the Internet
· Access to the library
· Text sheet: Integrated Distributors Incorporated
(access_project_ts_integrateddistributors)Learning Objectives
and Outcomes
Successful completion of this project will ensure that you are
capable of supporting the implementation and management of an
information systems security framework. To be able to do so,
you need to be able to do the following:
Relate how an access control policy framework is used to define
authorization and access to an information technology (IT)
infrastructure for compliance.
Mitigate risks to an IT infrastructure’s confidentiality, integrity,
and availability with sound access controls.
Relate how a data classification standard influences an IT
infrastructure’s access control requirements and
implementation.
Develop an access control policy framework consisting of best
practices for policies, standards, procedures, and guidelines to
mitigate unauthorized access.
Define proper security controls within the User Domain to
mitigate risks and threats caused by human nature and behavior.
Implement appropriate access controls for information systems
within IT infrastructures.
Mitigate risks from unauthorized access to IT systems through
proper testing and reporting.Project Checkpoints
The course project has a checkpoint strategy. Checkpoint
deliverables allow you to receive valuable feedback on your
interim work. In this project, you have four ungraded
checkpoint deliverables. (See the syllabus for the schedule.)
You may discuss project questions with the instructor, and you
should receive feedback from the instructor on previously
submitted work. The checkpoint deliverable ensures refinement
of the final deliverables, if incorporated effectively. The final
deliverable for this project is a professional report and a
PowerPoint presentation.
Checkpoint
Purpose of the Checkpoint
Expected Deliverables
1
· Understanding requirements
· Clarification on project deliverables
· Discussion on project concerns and progress up to this
checkpoint
· A review of the course project’s outline and schedule for
completion
Prepare an initial outline of issues and potential solutions and
discuss with your instructor, the chief information officer
(CIO).
2
· Clarification on project deliverables
· Discussion on project concerns and progress up to this
checkpoint
· A review of the course project’s outline and schedule for
completion
Prepare an extended outline of issues and potential solutions
and discuss with your instructor, the CIO.
3
· Clarification on project deliverables
· Discussion on project concerns and progress up to this
checkpoint
· A review of the course project’s outline and schedule for
completion
Draft the report and the PowerPoint presentation to discuss with
your instructor, the CIO.
4
· Clarification on project deliverables
· Discussion on project concerns and progress up to this
checkpoint
· A review of the course project’s outline and schedule for
completion
Modify the report and the PowerPoint presentation based on
feedback from your instructor, the
CIO.DeliverablesIntroduction
User identification, authentication, and authorization are
essential in developing, implementing, and maintaining a
framework for information system security. The basic function
of an information system security framework is to ensure the
confidentiality and the integrity, as well as the availability of
systems, applications, and data. Certain information security
implementation and management knowledge is required of
network administrators, IT service personnel, management, and
IT security practitioners, such as information security officers,
security analysts, and domain administrators. Scenario
You play the dual role of an IT architect and IT security
specialist working for Integrated Distributors Incorporated
(IDI), a multi-national organization with offices in several
countries. Your instructor for this course plays the role of the
chief information officer (CIO). Your peers play the role of
selected technology staff. Each of the organization’s locations
is operating with different information technologies and
infrastructure—IT systems, applications, and databases. Various
levels of IT security and access management have been
implemented and embedded within their respective
locations.Tasks
Your goals as the IT architect and IT security specialist are to:
Develop solutions to the issues that the specified location of IDI
is facing.
Develop plans to implement corporate-wide information access
methods to ensure confidentiality, integrity, and availability.
Assess risks and vulnerabilities with operating IT facilities in
the disparate locations where IDI now functions and develop
mitigation plans and implementation methods.
Analyze the strengths and weaknesses in the current systems of
IDI.
Address remote user and Web site user’s secure access
requirements.
Develop a proposed budget for the project—consider hardware,
software, upgrades/replacements, and consulting services.
Prepare detailed network and configuration diagrams outlining
the proposed change to be able to present it to the management.
Develop and submit a comprehensive report addressing the
learning objectives and your solutions to the issues within the
scenario.
Prepare a 10- to 15-slide PowerPoint presentation that addresses
important access control, infrastructure, and management
aspects from each location. Self-Assessment Checklist
I have considered an access control policy framework to define
authorization and access to an IT infrastructure for compliance
within the course project.
I have considered the influence of the data classification
standard in an IT infrastructure’s access control requirements
and implementation.
I have defined proper security controls within the User Domain
to mitigate risk and threats caused by human nature and
behavior.
I have developed and implemented an effective plan to mitigate
risks to an IT infrastructure’s confidentiality, integrity, and
availability with sound access controls.
I have developed an access control policy framework consisting
of best practices for policies, standards, procedures, and
guidelines to mitigate unauthorized access.
I have implemented appropriate access controls for information
systems within IT infrastructures.
I have followed the submission requirements and necessary
details for writing the report.
© 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning
Company. All rights reserved.
www.jblearning.com Page 1
Running head: UNIT 4
UNIT 4
2
Assignment Unit 4
HA405-01: Leadership And Ethics In Healthcare
Running head: UNIT 4
1
UNIT 4
Assignment Unit 4
Mercy death is when action is taking to terminate a patient’s
life on the request of the patient who typically is terminally ill
and often is unable to end their own lives (Thiroux &
Krasemann, 2015). Physician-assisted suicide also falls under
mercy death with the physician supplying lethal drugs to the
patient and letting them perform the action to end their own
life. Currently, there are only eight states in the U.S. that have
laws that allow physician-assisted suicide, which includes
California, Colorado, District of Columbia, Hawaii, Montana,
Oregon, Vermont, and Washington (Andriessen, Krysinska,
Castelli-Dransart, Dargis, & Mishara, 2019). For this paper, I
will assume the role of an administrator in the state of
California, where physician-assisted suicide is legal. It is my
stance that if allowed by the laws governing the state, then
physician-assisted suicide is ethical and would be allowed at the
facility with strict stipulations in place. The first stipulation
would be that the patient would have to be terminally ill without
any chances of being cured. Second, the patient would have to
wait 30 days from the time they have made their decision to
give them a chance to thoroughly think about the actions they
want to take and give them time to change their minds. The
patient would also have to go through a psychological and
cognitive assessment to ensure that the patient can make such a
decision. Once all of these stipulations have been met, the
physician may provide the patient with lethal drugs to terminate
their own lives. The physician would not be able to perform the
actions of administering the medications directly. If the patient
is unable to perform it themselves, they may designate someone
to administer it for them. Legal documentation would have to be
provided, showing the patients will to end their lives as well as
who they have designated when appropriate. Many of us
wouldn’t hesitate to end a family pet’s life to end pain and
suffering; patients should hold the same determination over
their own lives.
References
Andriessen, K., Krysinska, K., Castelli-Dransart, D. A., Dargis,
L., & Mishara, B. L. (2019). Grief after euthanasia and
physician-assited suicide. The Journal of Crisis Intervention and
Suicide Prevention, 1–18. http://dx.doi.org/10.1027/0277-
5910/a000630
Thiroux, J. P., & Krasemann, K. W. (2015). Ethics theory and
practice (11th updated). New York, NY: Pearson. Retrieved
from
http://purdueuniversityglobal.vitalsource.com/#/books/9781323
130162/cfi/6/2!/4/[email protected]:75.0

More Related Content

Similar to Project Access Control ProposalPurposeThis course project i.docx

ITS 834 Emerging Threats and CountermeasuresTotal points - 100.docx
ITS 834 Emerging Threats and CountermeasuresTotal points - 100.docxITS 834 Emerging Threats and CountermeasuresTotal points - 100.docx
ITS 834 Emerging Threats and CountermeasuresTotal points - 100.docx
vrickens
 
Running Header 1SYSTEM ARCHITECTURE24Gr.docx
Running Header  1SYSTEM ARCHITECTURE24Gr.docxRunning Header  1SYSTEM ARCHITECTURE24Gr.docx
Running Header 1SYSTEM ARCHITECTURE24Gr.docx
rtodd599
 
Case Study
Case StudyCase Study
Case Studylneut03
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...
Laura Benitez
 
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
oswald1horne84988
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)Kathy_67
 
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 CMGT 582 STUDY Inspiring Innovation--cmgt582study.com CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
KeatonJennings98
 
IT 549 Final Project Guidelines and Rubric Overview .docx
IT 549 Final Project Guidelines and Rubric  Overview .docxIT 549 Final Project Guidelines and Rubric  Overview .docx
IT 549 Final Project Guidelines and Rubric Overview .docx
christiandean12115
 
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
yoroflowproduct
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docx
toltonkendal
 
There are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database managThere are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database manag
GrazynaBroyles24
 
Development of home health solution using ehr
Development of home health solution using ehrDevelopment of home health solution using ehr
Development of home health solution using ehr
Dr. Samir Sawli
 
CST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comCST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.com
jonhson198
 
Cmgt 582 Effective Communication / snaptutorial.com
Cmgt 582  Effective Communication / snaptutorial.comCmgt 582  Effective Communication / snaptutorial.com
Cmgt 582 Effective Communication / snaptutorial.com
HarrisGeorg12
 
CYB 610 Effective Communication/tutorialrank.com
 CYB 610 Effective Communication/tutorialrank.com CYB 610 Effective Communication/tutorialrank.com
CYB 610 Effective Communication/tutorialrank.com
jonhson199
 
CST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comCST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.com
chrysanthemu49
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdf
Kamal Acharya
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdf
Kamal Acharya
 
CSEC 610 Effective Communication/tutorialrank.com
 CSEC 610 Effective Communication/tutorialrank.com CSEC 610 Effective Communication/tutorialrank.com
CSEC 610 Effective Communication/tutorialrank.com
jonhson198
 
Csec 610 Enhance teaching / snaptutorial.com
Csec 610  Enhance teaching / snaptutorial.comCsec 610  Enhance teaching / snaptutorial.com
Csec 610 Enhance teaching / snaptutorial.com
Baileyabv
 

Similar to Project Access Control ProposalPurposeThis course project i.docx (20)

ITS 834 Emerging Threats and CountermeasuresTotal points - 100.docx
ITS 834 Emerging Threats and CountermeasuresTotal points - 100.docxITS 834 Emerging Threats and CountermeasuresTotal points - 100.docx
ITS 834 Emerging Threats and CountermeasuresTotal points - 100.docx
 
Running Header 1SYSTEM ARCHITECTURE24Gr.docx
Running Header  1SYSTEM ARCHITECTURE24Gr.docxRunning Header  1SYSTEM ARCHITECTURE24Gr.docx
Running Header 1SYSTEM ARCHITECTURE24Gr.docx
 
Case Study
Case StudyCase Study
Case Study
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...
 
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)
 
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 CMGT 582 STUDY Inspiring Innovation--cmgt582study.com CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 
IT 549 Final Project Guidelines and Rubric Overview .docx
IT 549 Final Project Guidelines and Rubric  Overview .docxIT 549 Final Project Guidelines and Rubric  Overview .docx
IT 549 Final Project Guidelines and Rubric Overview .docx
 
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
10 Ways For Mitigating Cybersecurity Risks In Project Management.docx
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docx
 
There are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database managThere are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database manag
 
Development of home health solution using ehr
Development of home health solution using ehrDevelopment of home health solution using ehr
Development of home health solution using ehr
 
CST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comCST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.com
 
Cmgt 582 Effective Communication / snaptutorial.com
Cmgt 582  Effective Communication / snaptutorial.comCmgt 582  Effective Communication / snaptutorial.com
Cmgt 582 Effective Communication / snaptutorial.com
 
CYB 610 Effective Communication/tutorialrank.com
 CYB 610 Effective Communication/tutorialrank.com CYB 610 Effective Communication/tutorialrank.com
CYB 610 Effective Communication/tutorialrank.com
 
CST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comCST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.com
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdf
 
Chapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdfChapter_1_INTRODUCTION.pdf
Chapter_1_INTRODUCTION.pdf
 
CSEC 610 Effective Communication/tutorialrank.com
 CSEC 610 Effective Communication/tutorialrank.com CSEC 610 Effective Communication/tutorialrank.com
CSEC 610 Effective Communication/tutorialrank.com
 
Csec 610 Enhance teaching / snaptutorial.com
Csec 610  Enhance teaching / snaptutorial.comCsec 610  Enhance teaching / snaptutorial.com
Csec 610 Enhance teaching / snaptutorial.com
 

More from stilliegeorgiana

1. The Incident Command System (ICS) is a tool forA. Co.docx
1. The Incident Command System (ICS) is a tool forA. Co.docx1. The Incident Command System (ICS) is a tool forA. Co.docx
1. The Incident Command System (ICS) is a tool forA. Co.docx
stilliegeorgiana
 
1. The Thirteenth Amendment effectively brought an end to slaver.docx
1. The Thirteenth Amendment effectively brought an end to slaver.docx1. The Thirteenth Amendment effectively brought an end to slaver.docx
1. The Thirteenth Amendment effectively brought an end to slaver.docx
stilliegeorgiana
 
1. The Thirteenth Amendment effectively brought an end to slavery in.docx
1. The Thirteenth Amendment effectively brought an end to slavery in.docx1. The Thirteenth Amendment effectively brought an end to slavery in.docx
1. The Thirteenth Amendment effectively brought an end to slavery in.docx
stilliegeorgiana
 
1. The Fight for a True Democracyhttpswww.nytimes.com201.docx
1. The Fight for a True Democracyhttpswww.nytimes.com201.docx1. The Fight for a True Democracyhttpswww.nytimes.com201.docx
1. The Fight for a True Democracyhttpswww.nytimes.com201.docx
stilliegeorgiana
 
1. The article for week 8 described hip hop as a weapon. This weeks.docx
1. The article for week 8 described hip hop as a weapon. This weeks.docx1. The article for week 8 described hip hop as a weapon. This weeks.docx
1. The article for week 8 described hip hop as a weapon. This weeks.docx
stilliegeorgiana
 
1. The Hatch Act defines prohibited activities of public employees. .docx
1. The Hatch Act defines prohibited activities of public employees. .docx1. The Hatch Act defines prohibited activities of public employees. .docx
1. The Hatch Act defines prohibited activities of public employees. .docx
stilliegeorgiana
 
1. The Case for Reparations” by Ta-Nehisi Coates (604-19) in Rere.docx
1. The Case for Reparations” by Ta-Nehisi Coates (604-19) in Rere.docx1. The Case for Reparations” by Ta-Nehisi Coates (604-19) in Rere.docx
1. The Case for Reparations” by Ta-Nehisi Coates (604-19) in Rere.docx
stilliegeorgiana
 
1. Some people say that chatbots are inferior for chatting.Others di.docx
1. Some people say that chatbots are inferior for chatting.Others di.docx1. Some people say that chatbots are inferior for chatting.Others di.docx
1. Some people say that chatbots are inferior for chatting.Others di.docx
stilliegeorgiana
 
1. Some people say that chatbots are inferior for chatting.Other.docx
1. Some people say that chatbots are inferior for chatting.Other.docx1. Some people say that chatbots are inferior for chatting.Other.docx
1. Some people say that chatbots are inferior for chatting.Other.docx
stilliegeorgiana
 
1. Some people say that chatbots are inferior for chatting. Others d.docx
1. Some people say that chatbots are inferior for chatting. Others d.docx1. Some people say that chatbots are inferior for chatting. Others d.docx
1. Some people say that chatbots are inferior for chatting. Others d.docx
stilliegeorgiana
 
1. Tell us about yourself and your personal journey that has to .docx
1. Tell us about yourself and your personal journey that has to .docx1. Tell us about yourself and your personal journey that has to .docx
1. Tell us about yourself and your personal journey that has to .docx
stilliegeorgiana
 
1. Tell us what characteristics of Loma Linda University are particu.docx
1. Tell us what characteristics of Loma Linda University are particu.docx1. Tell us what characteristics of Loma Linda University are particu.docx
1. Tell us what characteristics of Loma Linda University are particu.docx
stilliegeorgiana
 
1. Tell us about yourself and your personal journey that has lea.docx
1. Tell us about yourself and your personal journey that has lea.docx1. Tell us about yourself and your personal journey that has lea.docx
1. Tell us about yourself and your personal journey that has lea.docx
stilliegeorgiana
 
1. The Research paper will come in five parts. The instructions are.docx
1. The Research paper will come in five parts. The instructions are.docx1. The Research paper will come in five parts. The instructions are.docx
1. The Research paper will come in five parts. The instructions are.docx
stilliegeorgiana
 
1. The minutiae points located on a fingerprint will help determine .docx
1. The minutiae points located on a fingerprint will help determine .docx1. The minutiae points located on a fingerprint will help determine .docx
1. The minutiae points located on a fingerprint will help determine .docx
stilliegeorgiana
 
1. The initial post is to be posted first and have 300-500 words.docx
1. The initial post is to be posted first and have 300-500 words.docx1. The initial post is to be posted first and have 300-500 words.docx
1. The initial post is to be posted first and have 300-500 words.docx
stilliegeorgiana
 
1. The key elements of supplier measurement are quality, delivery, a.docx
1. The key elements of supplier measurement are quality, delivery, a.docx1. The key elements of supplier measurement are quality, delivery, a.docx
1. The key elements of supplier measurement are quality, delivery, a.docx
stilliegeorgiana
 
1. Search the Internet and locate an article that relates to the top.docx
1. Search the Internet and locate an article that relates to the top.docx1. Search the Internet and locate an article that relates to the top.docx
1. Search the Internet and locate an article that relates to the top.docx
stilliegeorgiana
 
1. Text mining – Text mining or text data mining is a process to e.docx
1. Text mining – Text mining or text data mining is a process to e.docx1. Text mining – Text mining or text data mining is a process to e.docx
1. Text mining – Text mining or text data mining is a process to e.docx
stilliegeorgiana
 
1. Students need to review 3 different social media platforms that a.docx
1. Students need to review 3 different social media platforms that a.docx1. Students need to review 3 different social media platforms that a.docx
1. Students need to review 3 different social media platforms that a.docx
stilliegeorgiana
 

More from stilliegeorgiana (20)

1. The Incident Command System (ICS) is a tool forA. Co.docx
1. The Incident Command System (ICS) is a tool forA. Co.docx1. The Incident Command System (ICS) is a tool forA. Co.docx
1. The Incident Command System (ICS) is a tool forA. Co.docx
 
1. The Thirteenth Amendment effectively brought an end to slaver.docx
1. The Thirteenth Amendment effectively brought an end to slaver.docx1. The Thirteenth Amendment effectively brought an end to slaver.docx
1. The Thirteenth Amendment effectively brought an end to slaver.docx
 
1. The Thirteenth Amendment effectively brought an end to slavery in.docx
1. The Thirteenth Amendment effectively brought an end to slavery in.docx1. The Thirteenth Amendment effectively brought an end to slavery in.docx
1. The Thirteenth Amendment effectively brought an end to slavery in.docx
 
1. The Fight for a True Democracyhttpswww.nytimes.com201.docx
1. The Fight for a True Democracyhttpswww.nytimes.com201.docx1. The Fight for a True Democracyhttpswww.nytimes.com201.docx
1. The Fight for a True Democracyhttpswww.nytimes.com201.docx
 
1. The article for week 8 described hip hop as a weapon. This weeks.docx
1. The article for week 8 described hip hop as a weapon. This weeks.docx1. The article for week 8 described hip hop as a weapon. This weeks.docx
1. The article for week 8 described hip hop as a weapon. This weeks.docx
 
1. The Hatch Act defines prohibited activities of public employees. .docx
1. The Hatch Act defines prohibited activities of public employees. .docx1. The Hatch Act defines prohibited activities of public employees. .docx
1. The Hatch Act defines prohibited activities of public employees. .docx
 
1. The Case for Reparations” by Ta-Nehisi Coates (604-19) in Rere.docx
1. The Case for Reparations” by Ta-Nehisi Coates (604-19) in Rere.docx1. The Case for Reparations” by Ta-Nehisi Coates (604-19) in Rere.docx
1. The Case for Reparations” by Ta-Nehisi Coates (604-19) in Rere.docx
 
1. Some people say that chatbots are inferior for chatting.Others di.docx
1. Some people say that chatbots are inferior for chatting.Others di.docx1. Some people say that chatbots are inferior for chatting.Others di.docx
1. Some people say that chatbots are inferior for chatting.Others di.docx
 
1. Some people say that chatbots are inferior for chatting.Other.docx
1. Some people say that chatbots are inferior for chatting.Other.docx1. Some people say that chatbots are inferior for chatting.Other.docx
1. Some people say that chatbots are inferior for chatting.Other.docx
 
1. Some people say that chatbots are inferior for chatting. Others d.docx
1. Some people say that chatbots are inferior for chatting. Others d.docx1. Some people say that chatbots are inferior for chatting. Others d.docx
1. Some people say that chatbots are inferior for chatting. Others d.docx
 
1. Tell us about yourself and your personal journey that has to .docx
1. Tell us about yourself and your personal journey that has to .docx1. Tell us about yourself and your personal journey that has to .docx
1. Tell us about yourself and your personal journey that has to .docx
 
1. Tell us what characteristics of Loma Linda University are particu.docx
1. Tell us what characteristics of Loma Linda University are particu.docx1. Tell us what characteristics of Loma Linda University are particu.docx
1. Tell us what characteristics of Loma Linda University are particu.docx
 
1. Tell us about yourself and your personal journey that has lea.docx
1. Tell us about yourself and your personal journey that has lea.docx1. Tell us about yourself and your personal journey that has lea.docx
1. Tell us about yourself and your personal journey that has lea.docx
 
1. The Research paper will come in five parts. The instructions are.docx
1. The Research paper will come in five parts. The instructions are.docx1. The Research paper will come in five parts. The instructions are.docx
1. The Research paper will come in five parts. The instructions are.docx
 
1. The minutiae points located on a fingerprint will help determine .docx
1. The minutiae points located on a fingerprint will help determine .docx1. The minutiae points located on a fingerprint will help determine .docx
1. The minutiae points located on a fingerprint will help determine .docx
 
1. The initial post is to be posted first and have 300-500 words.docx
1. The initial post is to be posted first and have 300-500 words.docx1. The initial post is to be posted first and have 300-500 words.docx
1. The initial post is to be posted first and have 300-500 words.docx
 
1. The key elements of supplier measurement are quality, delivery, a.docx
1. The key elements of supplier measurement are quality, delivery, a.docx1. The key elements of supplier measurement are quality, delivery, a.docx
1. The key elements of supplier measurement are quality, delivery, a.docx
 
1. Search the Internet and locate an article that relates to the top.docx
1. Search the Internet and locate an article that relates to the top.docx1. Search the Internet and locate an article that relates to the top.docx
1. Search the Internet and locate an article that relates to the top.docx
 
1. Text mining – Text mining or text data mining is a process to e.docx
1. Text mining – Text mining or text data mining is a process to e.docx1. Text mining – Text mining or text data mining is a process to e.docx
1. Text mining – Text mining or text data mining is a process to e.docx
 
1. Students need to review 3 different social media platforms that a.docx
1. Students need to review 3 different social media platforms that a.docx1. Students need to review 3 different social media platforms that a.docx
1. Students need to review 3 different social media platforms that a.docx
 

Recently uploaded

The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 

Recently uploaded (20)

The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 

Project Access Control ProposalPurposeThis course project i.docx

  • 1. Project: Access Control Proposal Purpose This course project is intended to assess your ability to comprehend and apply the basic concepts related to information security management, such as the following: The ability to discern when a risk assessment should be performed and carrying out the task Understanding user or customer access requirements, whether remote or local Using a layered security approach to establish and maintain access controls Working with other departments, such as the human resources department, to identify and implement methods to prevent unwarranted exposure to information by inappropriate personnel Your ability to execute the tasks within these information security domains and others will be evaluated against the learning objectives as identified and described in previous lessons of instruction for this course. Required Source Information and Tools Web References: Links to Web references in this Instructor Guide and related materials are subject to change without prior notice. These links were last verified on August 2, 2014. The following tools and resources will be needed to complete this project: · Course textbook · Access to the Internet · Access to the library · Text sheet: Integrated Distributors Incorporated (access_project_ts_integrateddistributors)Learning Objectives and Outcomes Successful completion of this project will ensure that you are capable of supporting the implementation and management of an
  • 2. information systems security framework. To be able to do so, you need to be able to do the following: Relate how an access control policy framework is used to define authorization and access to an information technology (IT) infrastructure for compliance. Mitigate risks to an IT infrastructure’s confidentiality, integrity, and availability with sound access controls. Relate how a data classification standard influences an IT infrastructure’s access control requirements and implementation. Develop an access control policy framework consisting of best practices for policies, standards, procedures, and guidelines to mitigate unauthorized access. Define proper security controls within the User Domain to mitigate risks and threats caused by human nature and behavior. Implement appropriate access controls for information systems within IT infrastructures. Mitigate risks from unauthorized access to IT systems through proper testing and reporting.Project Checkpoints The course project has a checkpoint strategy. Checkpoint deliverables allow you to receive valuable feedback on your interim work. In this project, you have four ungraded checkpoint deliverables. (See the syllabus for the schedule.) You may discuss project questions with the instructor, and you should receive feedback from the instructor on previously submitted work. The checkpoint deliverable ensures refinement of the final deliverables, if incorporated effectively. The final deliverable for this project is a professional report and a PowerPoint presentation. Checkpoint Purpose of the Checkpoint Expected Deliverables 1 · Understanding requirements · Clarification on project deliverables · Discussion on project concerns and progress up to this
  • 3. checkpoint · A review of the course project’s outline and schedule for completion Prepare an initial outline of issues and potential solutions and discuss with your instructor, the chief information officer (CIO). 2 · Clarification on project deliverables · Discussion on project concerns and progress up to this checkpoint · A review of the course project’s outline and schedule for completion Prepare an extended outline of issues and potential solutions and discuss with your instructor, the CIO. 3 · Clarification on project deliverables · Discussion on project concerns and progress up to this checkpoint · A review of the course project’s outline and schedule for completion Draft the report and the PowerPoint presentation to discuss with your instructor, the CIO. 4 · Clarification on project deliverables · Discussion on project concerns and progress up to this checkpoint · A review of the course project’s outline and schedule for completion Modify the report and the PowerPoint presentation based on feedback from your instructor, the CIO.DeliverablesIntroduction User identification, authentication, and authorization are essential in developing, implementing, and maintaining a framework for information system security. The basic function of an information system security framework is to ensure the confidentiality and the integrity, as well as the availability of
  • 4. systems, applications, and data. Certain information security implementation and management knowledge is required of network administrators, IT service personnel, management, and IT security practitioners, such as information security officers, security analysts, and domain administrators. Scenario You play the dual role of an IT architect and IT security specialist working for Integrated Distributors Incorporated (IDI), a multi-national organization with offices in several countries. Your instructor for this course plays the role of the chief information officer (CIO). Your peers play the role of selected technology staff. Each of the organization’s locations is operating with different information technologies and infrastructure—IT systems, applications, and databases. Various levels of IT security and access management have been implemented and embedded within their respective locations.Tasks Your goals as the IT architect and IT security specialist are to: Develop solutions to the issues that the specified location of IDI is facing. Develop plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability. Assess risks and vulnerabilities with operating IT facilities in the disparate locations where IDI now functions and develop mitigation plans and implementation methods. Analyze the strengths and weaknesses in the current systems of IDI. Address remote user and Web site user’s secure access requirements. Develop a proposed budget for the project—consider hardware, software, upgrades/replacements, and consulting services. Prepare detailed network and configuration diagrams outlining the proposed change to be able to present it to the management. Develop and submit a comprehensive report addressing the learning objectives and your solutions to the issues within the scenario. Prepare a 10- to 15-slide PowerPoint presentation that addresses
  • 5. important access control, infrastructure, and management aspects from each location. Self-Assessment Checklist I have considered an access control policy framework to define authorization and access to an IT infrastructure for compliance within the course project. I have considered the influence of the data classification standard in an IT infrastructure’s access control requirements and implementation. I have defined proper security controls within the User Domain to mitigate risk and threats caused by human nature and behavior. I have developed and implemented an effective plan to mitigate risks to an IT infrastructure’s confidentiality, integrity, and availability with sound access controls. I have developed an access control policy framework consisting of best practices for policies, standards, procedures, and guidelines to mitigate unauthorized access. I have implemented appropriate access controls for information systems within IT infrastructures. I have followed the submission requirements and necessary details for writing the report. © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 1 Running head: UNIT 4 UNIT 4 2
  • 6. Assignment Unit 4 HA405-01: Leadership And Ethics In Healthcare Running head: UNIT 4 1 UNIT 4 Assignment Unit 4 Mercy death is when action is taking to terminate a patient’s life on the request of the patient who typically is terminally ill and often is unable to end their own lives (Thiroux & Krasemann, 2015). Physician-assisted suicide also falls under mercy death with the physician supplying lethal drugs to the patient and letting them perform the action to end their own life. Currently, there are only eight states in the U.S. that have laws that allow physician-assisted suicide, which includes California, Colorado, District of Columbia, Hawaii, Montana, Oregon, Vermont, and Washington (Andriessen, Krysinska, Castelli-Dransart, Dargis, & Mishara, 2019). For this paper, I will assume the role of an administrator in the state of California, where physician-assisted suicide is legal. It is my stance that if allowed by the laws governing the state, then physician-assisted suicide is ethical and would be allowed at the facility with strict stipulations in place. The first stipulation would be that the patient would have to be terminally ill without any chances of being cured. Second, the patient would have to wait 30 days from the time they have made their decision to give them a chance to thoroughly think about the actions they
  • 7. want to take and give them time to change their minds. The patient would also have to go through a psychological and cognitive assessment to ensure that the patient can make such a decision. Once all of these stipulations have been met, the physician may provide the patient with lethal drugs to terminate their own lives. The physician would not be able to perform the actions of administering the medications directly. If the patient is unable to perform it themselves, they may designate someone to administer it for them. Legal documentation would have to be provided, showing the patients will to end their lives as well as who they have designated when appropriate. Many of us wouldn’t hesitate to end a family pet’s life to end pain and suffering; patients should hold the same determination over their own lives. References Andriessen, K., Krysinska, K., Castelli-Dransart, D. A., Dargis, L., & Mishara, B. L. (2019). Grief after euthanasia and physician-assited suicide. The Journal of Crisis Intervention and Suicide Prevention, 1–18. http://dx.doi.org/10.1027/0277- 5910/a000630 Thiroux, J. P., & Krasemann, K. W. (2015). Ethics theory and practice (11th updated). New York, NY: Pearson. Retrieved from http://purdueuniversityglobal.vitalsource.com/#/books/9781323 130162/cfi/6/2!/4/[email protected]:75.0