SlideShare a Scribd company logo
Remote Access Security Policy
Organization: XYZ Health Care Provider:
XYZ Health Care is a provider of health services to senior
citizens. It performs its mission with a virtual force of
Registered Nurses and Nurse Practitioners. The nurses visit
their elderly patients in their homes and monitor their health.
At the end of the day, the nurses are required to connect back to
corporate networks and upload all of the patient records for the
day. Keep in mind that this organization is subjected to HIPAA
rules and its required to make the data available to its patients
and authorized patient representatives within 48 hours.
Some of the RISKS:
· Brute force user ID and password attacks
· Users or employees unaware of the risks, threats, and dangers
of the Internet and shard WI-FI or broadband Internet Access
· Multiple Access attempts and logon retries
· Unauthorized access to IT Systems, applications, and data
· Privacy data or confidential data is compromised remotely
· Data leakage occurs in violation of data classification standard
· A remote worker’s laptop is stolen
· A remote worker requires access to the patient medical records
system through the Public Internet
Scope: Control Identification and Creation of a Remote Access
Policy
Using or textbooks, internet and other resources, identify the
necessary components / sections within a security policy and
then craft the actual policy for XYZ Healthcare and address the
risks within policy that are prevalent with Remote Access.
Your submission must include the following:
1) Control Matrix: A listing of the risk and 1 or more
countermeasure to address the risk. (25 points)
2) A Section that identifies the necessary components of the
policy and why they are important: This does not refer to the
controls but more specifically sections within the policy. (You
may research the Internet or SANS for sample policies, the
sections were also discussed in class). (15 points)
3) The actual policy, when developing the policy please ensure
that it can be used at XYZ Healthcare. (60 Points)
Paper Requirements
1) APA Format (Where applicable)
2) Minimum of 3 - 5 references
3) Safe – Assignment comparison will be done
General Guidelines while creating policy paper:
Overview
Purpose
Policy statement
Complaince
Scope
Guidance / procedure
Why the policy is important?
Risk Control Matrix
Risk Control Matrix template sample:
S.No. Name of the risk what is the policy Counter
measures
What is the policy type?
Actual policy in detail
What happens if policy is not followed / failed?
References:- Mainly use SANS, HIPAA other websites as a
reference

More Related Content

Similar to Remote Access Security Policy Organization XYZ Health Care Prov.docx

Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionPrecisely
 
Cain and AbelOphcrackStart H.docx
Cain and AbelOphcrackStart H.docxCain and AbelOphcrackStart H.docx
Cain and AbelOphcrackStart H.docxRAHUL126667
 
Best_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfBest_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfJacob Li
 
CYB 610 Effective Communication/tutorialrank.com
 CYB 610 Effective Communication/tutorialrank.com CYB 610 Effective Communication/tutorialrank.com
CYB 610 Effective Communication/tutorialrank.comjonhson199
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
 
HealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUSTHealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUSTKimberly Simon MBA
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMBMeHealthCareSolutions
 
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...IT Network marcus evans
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
 
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
Homework AssignmentShort Answer Responses.1.  Describe the fiv.docxHomework AssignmentShort Answer Responses.1.  Describe the fiv.docx
Homework AssignmentShort Answer Responses.1. Describe the fiv.docxadampcarr67227
 
Cst 610 Believe Possibilities / snaptutorial.com
Cst 610  Believe Possibilities / snaptutorial.comCst 610  Believe Possibilities / snaptutorial.com
Cst 610 Believe Possibilities / snaptutorial.comDavis10a
 
Risk Assessment Famework
Risk Assessment FameworkRisk Assessment Famework
Risk Assessment Fameworklneut03
 
Maninging Risk Exposure in Meaningful Use Stage 2
Maninging Risk Exposure in Meaningful Use Stage 2Maninging Risk Exposure in Meaningful Use Stage 2
Maninging Risk Exposure in Meaningful Use Stage 2Compliancy Group
 
The Basics of Security and Risk Analysis
The Basics of Security and Risk AnalysisThe Basics of Security and Risk Analysis
The Basics of Security and Risk Analysislearfield
 
Equifax, the FTC Act, and Vulnerability Scanning
Equifax, the FTC Act, and Vulnerability ScanningEquifax, the FTC Act, and Vulnerability Scanning
Equifax, the FTC Act, and Vulnerability ScanningBlack Duck by Synopsys
 
CST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comCST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comjonhson198
 
Module 3_Lesson 7.pptx
Module 3_Lesson 7.pptxModule 3_Lesson 7.pptx
Module 3_Lesson 7.pptxcejobelle
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataPrecisely
 
Identity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersIdentity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersAndrew Ames
 

Similar to Remote Access Security Policy Organization XYZ Health Care Prov.docx (20)

Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
 
Cain and AbelOphcrackStart H.docx
Cain and AbelOphcrackStart H.docxCain and AbelOphcrackStart H.docx
Cain and AbelOphcrackStart H.docx
 
Best_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfBest_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdf
 
CYB 610 Effective Communication/tutorialrank.com
 CYB 610 Effective Communication/tutorialrank.com CYB 610 Effective Communication/tutorialrank.com
CYB 610 Effective Communication/tutorialrank.com
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 
HealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUSTHealthCare Compliance - HIPAA & HITRUST
HealthCare Compliance - HIPAA & HITRUST
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk Assessment
 
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
Homework AssignmentShort Answer Responses.1.  Describe the fiv.docxHomework AssignmentShort Answer Responses.1.  Describe the fiv.docx
Homework AssignmentShort Answer Responses.1. Describe the fiv.docx
 
Cst 610 Believe Possibilities / snaptutorial.com
Cst 610  Believe Possibilities / snaptutorial.comCst 610  Believe Possibilities / snaptutorial.com
Cst 610 Believe Possibilities / snaptutorial.com
 
Risk Assessment Famework
Risk Assessment FameworkRisk Assessment Famework
Risk Assessment Famework
 
Maninging Risk Exposure in Meaningful Use Stage 2
Maninging Risk Exposure in Meaningful Use Stage 2Maninging Risk Exposure in Meaningful Use Stage 2
Maninging Risk Exposure in Meaningful Use Stage 2
 
The Basics of Security and Risk Analysis
The Basics of Security and Risk AnalysisThe Basics of Security and Risk Analysis
The Basics of Security and Risk Analysis
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Equifax, the FTC Act, and Vulnerability Scanning
Equifax, the FTC Act, and Vulnerability ScanningEquifax, the FTC Act, and Vulnerability Scanning
Equifax, the FTC Act, and Vulnerability Scanning
 
CST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comCST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.com
 
Module 3_Lesson 7.pptx
Module 3_Lesson 7.pptxModule 3_Lesson 7.pptx
Module 3_Lesson 7.pptx
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and Data
 
Identity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersIdentity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare Providers
 

More from sodhi3

A brief description of your employment historyYour career .docx
A brief description of your employment historyYour career .docxA brief description of your employment historyYour career .docx
A brief description of your employment historyYour career .docxsodhi3
 
A budget is a plan expressed in dollar amounts that acts as a ro.docx
A budget is a plan expressed in dollar amounts that acts as a ro.docxA budget is a plan expressed in dollar amounts that acts as a ro.docx
A budget is a plan expressed in dollar amounts that acts as a ro.docxsodhi3
 
A 72-year-old male with a past medical history for hypertension, con.docx
A 72-year-old male with a past medical history for hypertension, con.docxA 72-year-old male with a past medical history for hypertension, con.docx
A 72-year-old male with a past medical history for hypertension, con.docxsodhi3
 
a able aboutaccomplishaccomplishmentachieveachieving.docx
a able aboutaccomplishaccomplishmentachieveachieving.docxa able aboutaccomplishaccomplishmentachieveachieving.docx
a able aboutaccomplishaccomplishmentachieveachieving.docxsodhi3
 
a brief explanation of the effect of Apartheid in South Africa. Prov.docx
a brief explanation of the effect of Apartheid in South Africa. Prov.docxa brief explanation of the effect of Apartheid in South Africa. Prov.docx
a brief explanation of the effect of Apartheid in South Africa. Prov.docxsodhi3
 
A 32-year-old female presents to the ED with a chief complaint of fe.docx
A 32-year-old female presents to the ED with a chief complaint of fe.docxA 32-year-old female presents to the ED with a chief complaint of fe.docx
A 32-year-old female presents to the ED with a chief complaint of fe.docxsodhi3
 
A 4 years old is brought to the clinic by his parents with abdominal.docx
A 4 years old is brought to the clinic by his parents with abdominal.docxA 4 years old is brought to the clinic by his parents with abdominal.docx
A 4 years old is brought to the clinic by his parents with abdominal.docxsodhi3
 
A 19-year-old male complains of burning sometimes, when I pee.”.docx
A 19-year-old male complains of burning sometimes, when I pee.”.docxA 19-year-old male complains of burning sometimes, when I pee.”.docx
A 19-year-old male complains of burning sometimes, when I pee.”.docxsodhi3
 
A 34-year-old trauma victim, the Victor, is unconscious and on a.docx
A 34-year-old trauma victim, the Victor, is unconscious and on a.docxA 34-year-old trauma victim, the Victor, is unconscious and on a.docx
A 34-year-old trauma victim, the Victor, is unconscious and on a.docxsodhi3
 
A 27-year-old Vietnamese woman in the delivery room with very st.docx
A 27-year-old Vietnamese woman in the delivery room with very st.docxA 27-year-old Vietnamese woman in the delivery room with very st.docx
A 27-year-old Vietnamese woman in the delivery room with very st.docxsodhi3
 
A 25 year old male presents with chronic sinusitis and allergic .docx
A 25 year old male presents with chronic sinusitis and allergic .docxA 25 year old male presents with chronic sinusitis and allergic .docx
A 25 year old male presents with chronic sinusitis and allergic .docxsodhi3
 
A 500-700 word APA formatted PaperInclude 2 sources on your re.docx
A 500-700 word APA formatted PaperInclude 2 sources on your re.docxA 500-700 word APA formatted PaperInclude 2 sources on your re.docx
A 500-700 word APA formatted PaperInclude 2 sources on your re.docxsodhi3
 
A 65-year-old obese African American male patient presents to his HC.docx
A 65-year-old obese African American male patient presents to his HC.docxA 65-year-old obese African American male patient presents to his HC.docx
A 65-year-old obese African American male patient presents to his HC.docxsodhi3
 
A 5-year-old male is brought to the primary care clinic by his m.docx
A 5-year-old male is brought to the primary care clinic by his m.docxA 5-year-old male is brought to the primary care clinic by his m.docx
A 5-year-old male is brought to the primary care clinic by his m.docxsodhi3
 
92 S C I E N T I F I C A M E R I C A N R e p r i n t e d f r.docx
92 S C I E N T I F I C  A M E R I C A N R e p r i n t e d  f r.docx92 S C I E N T I F I C  A M E R I C A N R e p r i n t e d  f r.docx
92 S C I E N T I F I C A M E R I C A N R e p r i n t e d f r.docxsodhi3
 
a 100 words to respond to each question. Please be sure to add a que.docx
a 100 words to respond to each question. Please be sure to add a que.docxa 100 words to respond to each question. Please be sure to add a que.docx
a 100 words to respond to each question. Please be sure to add a que.docxsodhi3
 
A 12,000 word final dissertation for Masters in Education project. .docx
A 12,000 word final dissertation for Masters in Education project. .docxA 12,000 word final dissertation for Masters in Education project. .docx
A 12,000 word final dissertation for Masters in Education project. .docxsodhi3
 
918191ISMM1-UC 752SYSTEMS ANALYSISFall 2019 –.docx
918191ISMM1-UC 752SYSTEMS ANALYSISFall 2019 –.docx918191ISMM1-UC 752SYSTEMS ANALYSISFall 2019 –.docx
918191ISMM1-UC 752SYSTEMS ANALYSISFall 2019 –.docxsodhi3
 
915Rising Up from a Sea of DiscontentThe 1970 Koza.docx
915Rising Up from a Sea of DiscontentThe 1970 Koza.docx915Rising Up from a Sea of DiscontentThe 1970 Koza.docx
915Rising Up from a Sea of DiscontentThe 1970 Koza.docxsodhi3
 
96 Young Scholars in WritingFeminist Figures or Damsel.docx
96    Young Scholars in WritingFeminist Figures or Damsel.docx96    Young Scholars in WritingFeminist Figures or Damsel.docx
96 Young Scholars in WritingFeminist Figures or Damsel.docxsodhi3
 

More from sodhi3 (20)

A brief description of your employment historyYour career .docx
A brief description of your employment historyYour career .docxA brief description of your employment historyYour career .docx
A brief description of your employment historyYour career .docx
 
A budget is a plan expressed in dollar amounts that acts as a ro.docx
A budget is a plan expressed in dollar amounts that acts as a ro.docxA budget is a plan expressed in dollar amounts that acts as a ro.docx
A budget is a plan expressed in dollar amounts that acts as a ro.docx
 
A 72-year-old male with a past medical history for hypertension, con.docx
A 72-year-old male with a past medical history for hypertension, con.docxA 72-year-old male with a past medical history for hypertension, con.docx
A 72-year-old male with a past medical history for hypertension, con.docx
 
a able aboutaccomplishaccomplishmentachieveachieving.docx
a able aboutaccomplishaccomplishmentachieveachieving.docxa able aboutaccomplishaccomplishmentachieveachieving.docx
a able aboutaccomplishaccomplishmentachieveachieving.docx
 
a brief explanation of the effect of Apartheid in South Africa. Prov.docx
a brief explanation of the effect of Apartheid in South Africa. Prov.docxa brief explanation of the effect of Apartheid in South Africa. Prov.docx
a brief explanation of the effect of Apartheid in South Africa. Prov.docx
 
A 32-year-old female presents to the ED with a chief complaint of fe.docx
A 32-year-old female presents to the ED with a chief complaint of fe.docxA 32-year-old female presents to the ED with a chief complaint of fe.docx
A 32-year-old female presents to the ED with a chief complaint of fe.docx
 
A 4 years old is brought to the clinic by his parents with abdominal.docx
A 4 years old is brought to the clinic by his parents with abdominal.docxA 4 years old is brought to the clinic by his parents with abdominal.docx
A 4 years old is brought to the clinic by his parents with abdominal.docx
 
A 19-year-old male complains of burning sometimes, when I pee.”.docx
A 19-year-old male complains of burning sometimes, when I pee.”.docxA 19-year-old male complains of burning sometimes, when I pee.”.docx
A 19-year-old male complains of burning sometimes, when I pee.”.docx
 
A 34-year-old trauma victim, the Victor, is unconscious and on a.docx
A 34-year-old trauma victim, the Victor, is unconscious and on a.docxA 34-year-old trauma victim, the Victor, is unconscious and on a.docx
A 34-year-old trauma victim, the Victor, is unconscious and on a.docx
 
A 27-year-old Vietnamese woman in the delivery room with very st.docx
A 27-year-old Vietnamese woman in the delivery room with very st.docxA 27-year-old Vietnamese woman in the delivery room with very st.docx
A 27-year-old Vietnamese woman in the delivery room with very st.docx
 
A 25 year old male presents with chronic sinusitis and allergic .docx
A 25 year old male presents with chronic sinusitis and allergic .docxA 25 year old male presents with chronic sinusitis and allergic .docx
A 25 year old male presents with chronic sinusitis and allergic .docx
 
A 500-700 word APA formatted PaperInclude 2 sources on your re.docx
A 500-700 word APA formatted PaperInclude 2 sources on your re.docxA 500-700 word APA formatted PaperInclude 2 sources on your re.docx
A 500-700 word APA formatted PaperInclude 2 sources on your re.docx
 
A 65-year-old obese African American male patient presents to his HC.docx
A 65-year-old obese African American male patient presents to his HC.docxA 65-year-old obese African American male patient presents to his HC.docx
A 65-year-old obese African American male patient presents to his HC.docx
 
A 5-year-old male is brought to the primary care clinic by his m.docx
A 5-year-old male is brought to the primary care clinic by his m.docxA 5-year-old male is brought to the primary care clinic by his m.docx
A 5-year-old male is brought to the primary care clinic by his m.docx
 
92 S C I E N T I F I C A M E R I C A N R e p r i n t e d f r.docx
92 S C I E N T I F I C  A M E R I C A N R e p r i n t e d  f r.docx92 S C I E N T I F I C  A M E R I C A N R e p r i n t e d  f r.docx
92 S C I E N T I F I C A M E R I C A N R e p r i n t e d f r.docx
 
a 100 words to respond to each question. Please be sure to add a que.docx
a 100 words to respond to each question. Please be sure to add a que.docxa 100 words to respond to each question. Please be sure to add a que.docx
a 100 words to respond to each question. Please be sure to add a que.docx
 
A 12,000 word final dissertation for Masters in Education project. .docx
A 12,000 word final dissertation for Masters in Education project. .docxA 12,000 word final dissertation for Masters in Education project. .docx
A 12,000 word final dissertation for Masters in Education project. .docx
 
918191ISMM1-UC 752SYSTEMS ANALYSISFall 2019 –.docx
918191ISMM1-UC 752SYSTEMS ANALYSISFall 2019 –.docx918191ISMM1-UC 752SYSTEMS ANALYSISFall 2019 –.docx
918191ISMM1-UC 752SYSTEMS ANALYSISFall 2019 –.docx
 
915Rising Up from a Sea of DiscontentThe 1970 Koza.docx
915Rising Up from a Sea of DiscontentThe 1970 Koza.docx915Rising Up from a Sea of DiscontentThe 1970 Koza.docx
915Rising Up from a Sea of DiscontentThe 1970 Koza.docx
 
96 Young Scholars in WritingFeminist Figures or Damsel.docx
96    Young Scholars in WritingFeminist Figures or Damsel.docx96    Young Scholars in WritingFeminist Figures or Damsel.docx
96 Young Scholars in WritingFeminist Figures or Damsel.docx
 

Recently uploaded

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaasiemaillard
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxssuserbdd3e8
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptxJosvitaDsouza2
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...AzmatAli747758
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsparmarsneha2
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxRaedMohamed3
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...EugeneSaldivar
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)rosedainty
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXMIRIAMSALINAS13
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativePeter Windle
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...Nguyen Thanh Tu Collection
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchVikramjit Singh
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxDenish Jangid
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...Denish Jangid
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfjoachimlavalley1
 

Recently uploaded (20)

aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 

Remote Access Security Policy Organization XYZ Health Care Prov.docx

  • 1. Remote Access Security Policy Organization: XYZ Health Care Provider: XYZ Health Care is a provider of health services to senior citizens. It performs its mission with a virtual force of Registered Nurses and Nurse Practitioners. The nurses visit their elderly patients in their homes and monitor their health. At the end of the day, the nurses are required to connect back to corporate networks and upload all of the patient records for the day. Keep in mind that this organization is subjected to HIPAA rules and its required to make the data available to its patients and authorized patient representatives within 48 hours. Some of the RISKS: · Brute force user ID and password attacks · Users or employees unaware of the risks, threats, and dangers of the Internet and shard WI-FI or broadband Internet Access · Multiple Access attempts and logon retries · Unauthorized access to IT Systems, applications, and data · Privacy data or confidential data is compromised remotely · Data leakage occurs in violation of data classification standard · A remote worker’s laptop is stolen · A remote worker requires access to the patient medical records system through the Public Internet Scope: Control Identification and Creation of a Remote Access Policy
  • 2. Using or textbooks, internet and other resources, identify the necessary components / sections within a security policy and then craft the actual policy for XYZ Healthcare and address the risks within policy that are prevalent with Remote Access. Your submission must include the following: 1) Control Matrix: A listing of the risk and 1 or more countermeasure to address the risk. (25 points) 2) A Section that identifies the necessary components of the policy and why they are important: This does not refer to the controls but more specifically sections within the policy. (You may research the Internet or SANS for sample policies, the sections were also discussed in class). (15 points) 3) The actual policy, when developing the policy please ensure that it can be used at XYZ Healthcare. (60 Points) Paper Requirements 1) APA Format (Where applicable) 2) Minimum of 3 - 5 references 3) Safe – Assignment comparison will be done General Guidelines while creating policy paper: Overview Purpose Policy statement Complaince Scope Guidance / procedure Why the policy is important?
  • 3. Risk Control Matrix Risk Control Matrix template sample: S.No. Name of the risk what is the policy Counter measures What is the policy type? Actual policy in detail What happens if policy is not followed / failed? References:- Mainly use SANS, HIPAA other websites as a reference