CIS 450 AU Wk 5 Information Security in a World of Technology Discussion

User Generated

Anqrrcn

Health Medical

cis 450

Aspen University

CIS

Description

Write an essay addressing each of the following points/questions. Be sure to completely answer all the questions for each bullet point. There should be three sections, one for each item number below, as well as the introduction (heading is the title of the essay) and conclusion paragraphs. Separate each section in your paper with a clear heading that allows your professor to know which bullet you are addressing in that section of your paper. Support your ideas with at least three (3) scholarly citations using APA citations in your essay. Make sure to reference the citations using the APA writing style for the essay. The cover page and reference page do not count towards the minimum word amount. Review the rubric criteria for this assignment.

  1. The textbook discusses several education methods. Discuss each method with an example of how the method could be used in the organization. Then discuss how you will evaluate the method and learning.
  2. Healthcare continues to be a lucrative target for hackers with weaponized ransomware, misconfigured cloud storage buckets, and phishing emails. Discuss how an organization can protect patients’ information through:
    • Security mechanisms
    • Administrative and Personnel Issues
    • Level of access
    • Handling and Disposal of Confidential Information
  3. You are providing education to staff on phishing and spam emails. Using the different educational methods discussed in Chapter 12:
    • Provide examples of how each method can be used
    • How will the method and learning be evaluated?

Assignment Expectations-

Length: 1500 words total for this assignment.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hey partner! Im sending you the finished assignment. Have a look and let me know if you need any help 😃

1

Information Security in a World of Technology

STUDENT’S NAME
UNIVERSITY’S NAME
COURSE NUMBER AND NAME
PROFESSOR’S NAME
DATE

2
Information Security in a World of Technology
In today’s age, advancements in technology have revolutionized the society in all
aspects and the healthcare sector is no exception. From advanced diagnostic and treatment
tools to a convenient means of managing patient data, technology is an essential part of
today’s healthcare sector. However, this excessive dependence on technology also has its
drawbacks. Presence of patient data in online databases has increased the security risks posed
to this personal data. Under these circumstances, it is crucial to educate healthcare staff in
methods to secure confidential data from unauthorized access.
Education Methods
With constant evolution in technology, change has become a constant factor in
healthcare sector to accommodate the needs of the patients. However, this constant change in
technology can lead to frustrations within the staff as it becomes difficult to adapt to new
technologies in work settings. Hebda et al. (2019) have discussed several methods to educate
healthcare staff in the use of computer systems to ensure the successful utilization of health
information systems as well as to reduce the risk of security breaches in the system.
One of the most common methods used to educate is Instructor-Led Training (ILT).
In this method, the instructor conveys knowledge to employees within a classroom setting
which may be physical or virtual. A lecture covering all the important specifics of a given
topic is delivered to the employees. For instance, in case of a new system being implemented
in an organization, this method can be employed by gathering the target members of the staff
in a hall and briefing them about the new system and demonstrating how to use it properly.
The staff will be given time to ask any questions so that their confusions and concerns can be
answered appropriately. The session should also accommodate the difference in schedule of
the staff members (Hebda et al., 2019). The effectiveness of this method can be evaluated by

3
analyzing the pe...

Related Tags