Description
Submit a 350- to 700-word synopsis with the following element: A description of how a specific business requirement would drive the project's creation and use
IT/205
Continue working on your proposal.
Submit a 350- to 700-word synopsis with the following element:
A description of how a specific business requirement would drive the project's creation and use
Note: Riordan Manufacturing is one of the Virtual Organizations. Please see the link under Academic Resources or on this entry
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Really helpful material, saved me a great deal of time.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Acadia University Advantages of Using Artificial Intelligence Essay
I need an essay on Artificial Intelligence
Capture the following issues:
Negative effects of excessive use of Artificial I ...
Acadia University Advantages of Using Artificial Intelligence Essay
I need an essay on Artificial Intelligence
Capture the following issues:
Negative effects of excessive use of Artificial Intelligence, especially on employment
The measures that can be applied to control its use
University of South Florida A Historical Site Architecture Discussion
select a data set from the ones listed below and create a short informational report that includes at least three data vis ...
University of South Florida A Historical Site Architecture Discussion
select a data set from the ones listed below and create a short informational report that includes at least three data visualizations that you create and that you feel best communicates the data you select from your data set in a form that maximizes the impact of the data to suit a specific audience and purpose.A one-page, informative, visually interesting report that makes a point about your subject using the data in your data set. This report should incorporate at three visuals that you have created along with a discussion/analysis of the data in your figures. The text in your report shouldintroduce the topic and its importanceexplain the meaning of the visualspoint to the conclusions suggested by the data. You should think through and identify a clear audience. Your understanding of the audience informs how the data is presented, the form the visualizations take, and the point you use the data to make, as well as the overall purpose of the document.Document 2: Reflective AnalysisA short 250- to 500-word note that explains the following (use headings to identify each of the topics listed below):How and why you selected your data setHow you selected which data to visualize and why you visualized it in the form you didWho was your target audience and what was your overall goal/purposeHow you ensured that your visualizations of the data were fair, accurate, and clearThe raw data set used to create the report (with a citation for the data)
10 pages
Data Mining Project
Improving the Open University Learning Analytics dataset through normalization: The context of application for this projec ...
Data Mining Project
Improving the Open University Learning Analytics dataset through normalization: The context of application for this project is The Titanic dataset ...
IT Security plan
Utilizing the attached Project Requirements, Template and Security Baseline Document. I need a minimum 6 pages to meet the ...
IT Security plan
Utilizing the attached Project Requirements, Template and Security Baseline Document. I need a minimum 6 pages to meet the requirements of the rubric below. System Security PlanExcellentOutstandingAcceptableNeeds ImprovementNeeds Significant ImprovementMissing or UnacceptableSections 1 - 8 (System Identification)10 pointsSections 1 - 8 present a thorough and complete identification of the system (Field Office General IT Support), the responsible individuals, and the system status. Key personnel (Section 5) roster contains three or more appropriate designated officials.8.5 pointsSections 1 - 8 identify the system (Field Office General IT Support), the responsible individuals, and the system status. Information was adapted from the Case Study. Key personnel (Section 5) roster contains at least two appropriate designated officials.7 pointsSections 1 - 8 were completed using information from the Case Study. Key personnel (Section 5) roster contains at least one appropriate designated official.6 pointsEntered information for 6 or more sections. Information was incomplete or incorrect.4 pointsCompleted less than 50% of the required information for sections 1-8. (Or, inappropriate or excessive copying from other authors' work.)0 pointsInsufficient, missing, or no work submitted.Section 9: System Description / Purpose10 pointsProvided an excellent description of the Field Office General IT Support System. Integrated case study information to describe the business operations supported by the hardware, software, and networks which comprise the "General IT Support" system. Included information about the types and sensitivity of information processed by this system. Described the "smart home" and "Internet of Things" capabilities which are supported by the field office IT systems.8.5 pointsProvided an outstanding description of the Field Office General IT Support System. Integrated case study information to describe the business operations including mention of the types and sensitivity of information processed by this system. Mentioned the "smart home" and "Internet of Things" capabilities which are supported by the field office IT systems.7 pointsProvided an acceptable description of the Field Office General IT Support System. Integrated case study information to describe the business operations, mentioned the types of information processed, and the "smart home" / "Internet of Things" capabilities incorporated into the field offices.6 pointsDescribed the field office business operations supported by the Field Office General IT Support System. The description lacked details.4 pointsAttempted to describe a General IT Support System. Did not integrate information from the case study. (Or, inappropriate or excessive copying from other authors' work.)0 pointsInsufficient, missing, or no work submitted.Section 10: System Environment10 pointsProvided an excellent description of the enterprise architecture for the Field Office General IT Support System. Integrated case study information to clearly and accurately describe the hardware, software, and networks which comprise the "General IT Support" system. Included information about the devices and controllers used for the "smart home" and "Internet of Things" capabilities which are used by the field office.8.5 pointsProvided an outstanding description of the enterprise architecture for the Field Office General IT Support System. Integrated case study information to describe the hardware, software, and networks which comprise the "General IT Support" system. Included information about the devices and controllers used for the "smart home" and "Internet of Things" capabilities which are used by the field office.7 pointsProvided an acceptable description of the Field Office General IT Support System. Integrated case study information to describe the business operations, mentioned the types of information processed, and the "smart home" / "Internet of Things" capabilities incorporated into the field offices.6 pointsDescribed the field office business operations supported by the Field Office General IT Support System. The description lacked details.4 pointsAttempted to describe a General IT Support System. Did not integrate information from the case study. (Or, inappropriate or excessive copying from other authors' work.)0 pointsInsufficient, missing, or no work submitted.Section 11: System Interconnections / Information Sharing10 pointsUsed information from the case study to identify (name) 5 or more interconnected systems and networks (including the LAN/WAN network connections between the field office and the operations center). Provided an excellent description for each that included the types and sensitivity levels of information transmitted over the connection (e.g. company proprietary information, customer information, public Internet information). Named the "owning" organization and responsible ISSO.8.5 pointsUsed information from the case study to identify (name) 4 or more interconnected systems and networks (including the LAN/WAN network connections between the field office and the operations center). Provided an outstanding description for each that included the types and sensitivity levels of information transmitted over the connection (e.g. company proprietary information, customer information, public Internet information). Named the "owning" organization and responsible ISSO.7 pointsUsed information from the case study to identify (name) 3 or more interconnected systems and networks (including the LAN/WAN network connections between the field office and the operations center). Provided an acceptable description for each. Named the "owning" organization.6 pointsSection identified interconnected systems including the LAN / WAN network connections. Provided some information about the systems and networks.4 pointsSection named LAN / WAN network connections but provided no other information. (Or, inappropriate or excessive copying from other authors' work.)0 pointsInsufficient, missing, or no work submitted.Section 12: Related Laws / Regulations / Policies10 pointsProvided an excellent overview of laws, regulations, and policies which establish specific requirements for the confidentiality, integrity, and availability of the data collected, processed, and/or stored in the Field Office General IT Support System. Named and described the applicability of 5 or more federal or state laws and regulations. Identified and described at least one internal policy which applies to the use of this system.8.5 pointsProvided an outstanding overview of laws, regulations, and policies which establish specific requirements for the confidentiality, integrity, and availability of the data collected, processed, and/or stored in the Field Office General IT Support System. Named and described the applicability of 4 or more federal or state laws and regulations. Identified and described at least one internal policy which applies to the use of this system.7 pointsProvided an acceptable list of laws, regulations, and policies which establish specific requirements for the confidentiality, integrity, and availability of the data collected, processed, and/or stored in the Field Office General IT Support System. Named and described the applicability of 3 or more federal or state laws and regulations. Identified and described at least one internal policy which applies to the use of this system.6 pointsNamed and described at least three legal (laws), regulatory (regulations or "rules"), and/or policy sources for security requirements which apply to the Field Office IT General Support System.4 pointsNamed at least two laws, regulations, and/or policies as sources of security requirements for the Field Office IT General Support System. (Or, inappropriate or excessive copying from other authors' work.)0 pointsInsufficient, missing, or no work submitted.Section 13: Introduction for Minimum Security Controls5 pointsProvided an excellent introduction for Section 13: Minimum Security Controls. Discussed the differences between management, operational, and technical categories of security controls. Used information from the case study and NIST SP 800-53.4 pointsProvided an outstanding introduction for Section 13: Minimum security controls. Discussed the use of management, operational, and technical categories of security controls. Used information from the case study and NIST SP 800-53.3 pointsProvided an acceptable introduction for Section 13: Minimum Security Controls. Mentioned the three categories (management, operational, technical). Used information from the case study and NIST SP 800-53.2 pointsProvided an introduction for Section 13: Minimum Security Controls. Introduction used information from the case study but lacked important details.1 pointProvided an introduction for section 13. Did not customize the introduction for the case study. (Or, inappropriate or excessive copying from other authors' work.)0 pointsInsufficient, missing, or no work submitted.Section 13 (a) Minimum Security Controls: Management Controls Category10 pointsUsed the provided security controls baseline for the case study company. Named and described each of the required control families (e.g. CA) listed under the "management controls" category (in the baseline) using information from NIST SP 800-53. For each "family" listed in the baseline under this category, identified (listed) the specific controls (e.g. CA-1) and provided a excellent description of how the controls in each family work together to mitigate threats and vulnerabilities.8.5 pointsUsed the provided security controls baseline for the case study company. Named and described each of the required control families (e.g. CA) listed under the "management controls" category (in the baseline) using information from NIST SP 800-53. For each "family" listed in the baseline under this category, identified (listed) the specific controls (e.g. CA-1) and provided an outstanding description of how the controls in each family work together to mitigate threats and vulnerabilities.7 pointsUsed the provided security controls baseline for the case study company. Named and described each of the required control families (e.g. CA) listed under the "management controls" category (in the baseline) using information from NIST SP 800-53. Provided a brief description of how the controls in each family work together to mitigate threats and vulnerabilities.6 pointsListed and described three or more management controls (from NIST SP 800-53) which should be implemented for the Field Office IT General Support System.4 pointsListed and described one or more management controls (from NIST SP 800-53) which should be implemented for the Field Office IT General Support System.0 pointsInsufficient, missing, or no work submitted.Section 13 (b) Minimum Security Controls: Operational Controls Category10 pointsUsed the provided security controls baseline for the case study company. Named and described each of the required control families (e.g. AT) listed under the "operational controls" category (in the baseline) using information from NIST SP 800-53. For each "family" listed in the baseline under this category, identified (listed) the specific controls (e.g. AT-1) and provided a excellent description of how the controls in each family work together to mitigate threats and vulnerabilities.8.5 pointsUsed the provided security controls baseline for the case study company. Named and described each of the required control families (e.g. AT) listed under the "operational controls" category (in the baseline) using information from NIST SP 800-53. For each "family" listed in the baseline under this category, identified (listed) the specific controls (e.g. AT-1) and provided an outstanding description of how the controls in each family work together to mitigate threats and vulnerabilities.7 pointsUsed the provided security controls baseline for the case study company. Named and described each of the required control families (e.g. AT) listed under the "operational controls" category (in the baseline) using information from NIST SP 800-53. Provided a brief description of how the controls in each family work together to mitigate threats and vulnerabilities.6 pointsListed and described three or more operational controls (from NIST SP 800-53) which should be implemented for the Field Office IT General Support System.4 pointsListed and described one or more operational controls (from NIST SP 800-53) which should be implemented for the Field Office IT General Support System. (Or, inappropriate or excessive copying from other authors' work.)0 pointsInsufficient, missing, or no work submitted.Section 13 (c) Minimum Security Controls: Technical Controls Category10 pointsUsed the provided security controls baseline for the case study company. Named and described each of the required control families (e.g. AC) listed under the "technical controls" category (in the baseline) using information from NIST SP 800-53. For each "family" listed in the baseline under this category, identified (listed) the specific controls (e.g. AC-1) and provided a excellent description of how the controls in each family work together to mitigate threats and vulnerabilities.8.5 pointsUsed the provided security controls baseline for the case study company. Named and described each of the required control families (e.g. AC) listed under the "technical controls" category (in the baseline) using information from NIST SP 800-53. For each "family" listed in the baseline under this category, identified (listed) the specific controls (e.g. AC-1) and provided an outstanding description of how the controls in each family work together to mitigate threats and vulnerabilities.7 pointsUsed the provided security controls baseline for the case study company. Named and described each of the required control families (e.g. AC) listed under the "technical controls" category (in the baseline) using information from NIST SP 800-53. Provided a brief description of how the controls in each family work together to mitigate threats and vulnerabilities.6 pointsListed and described three or more technical controls (from NIST SP 800-53) which should be implemented for the Field Office IT General Support System.4 pointsListed and described one or more technical controls (from NIST SP 800-53) which should be implemented for the Field Office IT General Support System. (Or, inappropriate or excessive copying from other authors' work.)0 pointsInsufficient, missing, or no work submitted.Sections 14-15: Completion & Approval Dates5 pointsIncluded both sections from the template file (14 & 15) and entered the completion date for the plan.3 pointsIncluded section 14 from the template file and entered a completion date for the plan.0 pointsN/A0 pointsN/A0 pointsN/A0 pointsInsufficient, missing, or no work submitted.ProfessionalismExcellentOutstandingAcceptableNeeds ImprovementNeeds Significant ImprovementMissing or UnacceptableExecution10 pointsWork is professional in appearance and organization (appropriate and consistent use of fonts, headings, color). No word usage, grammar, spelling, or punctuation errors. All quotations (copied text) are properly marked and cited using a professional format (APA format recommended but not required.)8.5 pointsWork is professional in appearance and organization (appropriate and consistent use of fonts, headings, color). Work contains minor errors in word usage,grammar, spelling or punctuation which do not significantly impact professional appearance. All quotations (copied text) are properly marked and cited using a professional format (APA format recommended but not required.)7 pointsWork is professional in appearance and organization (minor issues allowable but overall the work contains appropriate and consistent use of fonts, headings, color). Errors in word usage, spelling, grammar, or punctuation which detract from professional appearance of the submitted work. All quotations (copied text) are properly marked and cited using a professional format (APA format recommended but not required.)6 pointsSubmitted work has numerous errors in formatting, organization, word usage, spelling, grammar, or punctuation which detract from readability and professional appearance. Punctuation errors may include failure to properly mark quoted or copied material (an attempt to name original source is required).4 pointsSubmitted work is difficult to read / understand and has significant errors in formatting, appearance / organization, spelling, grammar, punctuation, or word usage. Significant errors in presentation of copied text (lacks proper punctuation and failed to attribute material to original source).0 pointsNo work submitted. OR, work contains significant instances of cut-and-paste without proper citing / attribution to the original work or author.Overall ScoreExcellent90 or moreOutstanding80 or moreAcceptable70 or moreNeeds Improvement56 or moreNeeds Significant Improvement36 or moreMissing or Unacceptable Work0 or more
HCI 655 Grand Canyon University HL7 and FHIR Technology Platforms Discussion
The purpose of this assignment is to research and become familiar with EHR technology platforms.In a 750-1,000 word essay, ...
HCI 655 Grand Canyon University HL7 and FHIR Technology Platforms Discussion
The purpose of this assignment is to research and become familiar with EHR technology platforms.In a 750-1,000 word essay, research and explain various EHR technology platforms. Include the following:Describe two different technology platforms used in leading EHR systems.Contrast the benefits and challenges for the EHR technology platforms you selected. Include at least two benefits and two challenges for each platform.Explain why each technology platform you selected was developed.Identify which current EHR systems use the technology platforms you selected.Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
Similar Content
Building and Implementing a Successful Cybersecurity Policy
Building and Implementing a Successful Cybersecurity Policy Write an essay on the topic, “Building and implementing a su...
i need help wa csa f es w se
helpo...
NGC Campbellsville University Effect of Technology on Children Today Essay
Their is little doubt we are living at a time when technology is advancing at a pace that some believe is too fast for hum...
ISSC 351 American Military Cyber Security Computer Investigator Report
Assignment 5:As a computer investigator for your local sheriff's department, you have been asked to go with a detective to...
CS 436 CSUSM Data Getting Into the Wrong Hands Through Networking Research Paper
Research paper on different ways our data can be used from inputting our information into application, our names, phone nu...
CSC 201 NVCC Local Variables & Data Structures Project
CSC 201 Computer Science I Programming 1
Please make sure to only implement what is asked for. You may not add any instanc...
Ecommerce Marketing
The pricing strategy is an important in marketing and advertising the e-commerce products. This can be achieved through pr...
DIGITAL COMPUTER FUNDAMENTALS test
1. (a) Convert the following : (b) Write the procedure for converting decimal integer number to its Binary equivalent. (10...
Sniffer Tools Wps Office 1
Ethereal is a packet analyzer that has a graphical side. The advantage of using Ethereal is that it is compatible with mos...
Related Tags
Book Guides
Brave New World
by Aldous Huxley
The House of the Seven Gables
by Nathaniel Hawthorne
A Passage to India
by E. M. Forster
The Aftermath
by Rhidian Brook
You Are a Badass
by Jen Sincero
The Life-Changing Magic of Tidying Up
by Marie Kondo
The Turn of the Screw
by Henry James
The Fault in Our Stars
by John Green
The Odyssey
by Homer
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Acadia University Advantages of Using Artificial Intelligence Essay
I need an essay on Artificial Intelligence
Capture the following issues:
Negative effects of excessive use of Artificial I ...
Acadia University Advantages of Using Artificial Intelligence Essay
I need an essay on Artificial Intelligence
Capture the following issues:
Negative effects of excessive use of Artificial Intelligence, especially on employment
The measures that can be applied to control its use
University of South Florida A Historical Site Architecture Discussion
select a data set from the ones listed below and create a short informational report that includes at least three data vis ...
University of South Florida A Historical Site Architecture Discussion
select a data set from the ones listed below and create a short informational report that includes at least three data visualizations that you create and that you feel best communicates the data you select from your data set in a form that maximizes the impact of the data to suit a specific audience and purpose.A one-page, informative, visually interesting report that makes a point about your subject using the data in your data set. This report should incorporate at three visuals that you have created along with a discussion/analysis of the data in your figures. The text in your report shouldintroduce the topic and its importanceexplain the meaning of the visualspoint to the conclusions suggested by the data. You should think through and identify a clear audience. Your understanding of the audience informs how the data is presented, the form the visualizations take, and the point you use the data to make, as well as the overall purpose of the document.Document 2: Reflective AnalysisA short 250- to 500-word note that explains the following (use headings to identify each of the topics listed below):How and why you selected your data setHow you selected which data to visualize and why you visualized it in the form you didWho was your target audience and what was your overall goal/purposeHow you ensured that your visualizations of the data were fair, accurate, and clearThe raw data set used to create the report (with a citation for the data)
10 pages
Data Mining Project
Improving the Open University Learning Analytics dataset through normalization: The context of application for this projec ...
Data Mining Project
Improving the Open University Learning Analytics dataset through normalization: The context of application for this project is The Titanic dataset ...
IT Security plan
Utilizing the attached Project Requirements, Template and Security Baseline Document. I need a minimum 6 pages to meet the ...
IT Security plan
Utilizing the attached Project Requirements, Template and Security Baseline Document. I need a minimum 6 pages to meet the requirements of the rubric below. System Security PlanExcellentOutstandingAcceptableNeeds ImprovementNeeds Significant ImprovementMissing or UnacceptableSections 1 - 8 (System Identification)10 pointsSections 1 - 8 present a thorough and complete identification of the system (Field Office General IT Support), the responsible individuals, and the system status. Key personnel (Section 5) roster contains three or more appropriate designated officials.8.5 pointsSections 1 - 8 identify the system (Field Office General IT Support), the responsible individuals, and the system status. Information was adapted from the Case Study. Key personnel (Section 5) roster contains at least two appropriate designated officials.7 pointsSections 1 - 8 were completed using information from the Case Study. Key personnel (Section 5) roster contains at least one appropriate designated official.6 pointsEntered information for 6 or more sections. Information was incomplete or incorrect.4 pointsCompleted less than 50% of the required information for sections 1-8. (Or, inappropriate or excessive copying from other authors' work.)0 pointsInsufficient, missing, or no work submitted.Section 9: System Description / Purpose10 pointsProvided an excellent description of the Field Office General IT Support System. Integrated case study information to describe the business operations supported by the hardware, software, and networks which comprise the "General IT Support" system. Included information about the types and sensitivity of information processed by this system. Described the "smart home" and "Internet of Things" capabilities which are supported by the field office IT systems.8.5 pointsProvided an outstanding description of the Field Office General IT Support System. Integrated case study information to describe the business operations including mention of the types and sensitivity of information processed by this system. Mentioned the "smart home" and "Internet of Things" capabilities which are supported by the field office IT systems.7 pointsProvided an acceptable description of the Field Office General IT Support System. Integrated case study information to describe the business operations, mentioned the types of information processed, and the "smart home" / "Internet of Things" capabilities incorporated into the field offices.6 pointsDescribed the field office business operations supported by the Field Office General IT Support System. The description lacked details.4 pointsAttempted to describe a General IT Support System. Did not integrate information from the case study. (Or, inappropriate or excessive copying from other authors' work.)0 pointsInsufficient, missing, or no work submitted.Section 10: System Environment10 pointsProvided an excellent description of the enterprise architecture for the Field Office General IT Support System. Integrated case study information to clearly and accurately describe the hardware, software, and networks which comprise the "General IT Support" system. Included information about the devices and controllers used for the "smart home" and "Internet of Things" capabilities which are used by the field office.8.5 pointsProvided an outstanding description of the enterprise architecture for the Field Office General IT Support System. Integrated case study information to describe the hardware, software, and networks which comprise the "General IT Support" system. Included information about the devices and controllers used for the "smart home" and "Internet of Things" capabilities which are used by the field office.7 pointsProvided an acceptable description of the Field Office General IT Support System. Integrated case study information to describe the business operations, mentioned the types of information processed, and the "smart home" / "Internet of Things" capabilities incorporated into the field offices.6 pointsDescribed the field office business operations supported by the Field Office General IT Support System. The description lacked details.4 pointsAttempted to describe a General IT Support System. Did not integrate information from the case study. (Or, inappropriate or excessive copying from other authors' work.)0 pointsInsufficient, missing, or no work submitted.Section 11: System Interconnections / Information Sharing10 pointsUsed information from the case study to identify (name) 5 or more interconnected systems and networks (including the LAN/WAN network connections between the field office and the operations center). Provided an excellent description for each that included the types and sensitivity levels of information transmitted over the connection (e.g. company proprietary information, customer information, public Internet information). Named the "owning" organization and responsible ISSO.8.5 pointsUsed information from the case study to identify (name) 4 or more interconnected systems and networks (including the LAN/WAN network connections between the field office and the operations center). Provided an outstanding description for each that included the types and sensitivity levels of information transmitted over the connection (e.g. company proprietary information, customer information, public Internet information). Named the "owning" organization and responsible ISSO.7 pointsUsed information from the case study to identify (name) 3 or more interconnected systems and networks (including the LAN/WAN network connections between the field office and the operations center). Provided an acceptable description for each. Named the "owning" organization.6 pointsSection identified interconnected systems including the LAN / WAN network connections. Provided some information about the systems and networks.4 pointsSection named LAN / WAN network connections but provided no other information. (Or, inappropriate or excessive copying from other authors' work.)0 pointsInsufficient, missing, or no work submitted.Section 12: Related Laws / Regulations / Policies10 pointsProvided an excellent overview of laws, regulations, and policies which establish specific requirements for the confidentiality, integrity, and availability of the data collected, processed, and/or stored in the Field Office General IT Support System. Named and described the applicability of 5 or more federal or state laws and regulations. Identified and described at least one internal policy which applies to the use of this system.8.5 pointsProvided an outstanding overview of laws, regulations, and policies which establish specific requirements for the confidentiality, integrity, and availability of the data collected, processed, and/or stored in the Field Office General IT Support System. Named and described the applicability of 4 or more federal or state laws and regulations. Identified and described at least one internal policy which applies to the use of this system.7 pointsProvided an acceptable list of laws, regulations, and policies which establish specific requirements for the confidentiality, integrity, and availability of the data collected, processed, and/or stored in the Field Office General IT Support System. Named and described the applicability of 3 or more federal or state laws and regulations. Identified and described at least one internal policy which applies to the use of this system.6 pointsNamed and described at least three legal (laws), regulatory (regulations or "rules"), and/or policy sources for security requirements which apply to the Field Office IT General Support System.4 pointsNamed at least two laws, regulations, and/or policies as sources of security requirements for the Field Office IT General Support System. (Or, inappropriate or excessive copying from other authors' work.)0 pointsInsufficient, missing, or no work submitted.Section 13: Introduction for Minimum Security Controls5 pointsProvided an excellent introduction for Section 13: Minimum Security Controls. Discussed the differences between management, operational, and technical categories of security controls. Used information from the case study and NIST SP 800-53.4 pointsProvided an outstanding introduction for Section 13: Minimum security controls. Discussed the use of management, operational, and technical categories of security controls. Used information from the case study and NIST SP 800-53.3 pointsProvided an acceptable introduction for Section 13: Minimum Security Controls. Mentioned the three categories (management, operational, technical). Used information from the case study and NIST SP 800-53.2 pointsProvided an introduction for Section 13: Minimum Security Controls. Introduction used information from the case study but lacked important details.1 pointProvided an introduction for section 13. Did not customize the introduction for the case study. (Or, inappropriate or excessive copying from other authors' work.)0 pointsInsufficient, missing, or no work submitted.Section 13 (a) Minimum Security Controls: Management Controls Category10 pointsUsed the provided security controls baseline for the case study company. Named and described each of the required control families (e.g. CA) listed under the "management controls" category (in the baseline) using information from NIST SP 800-53. For each "family" listed in the baseline under this category, identified (listed) the specific controls (e.g. CA-1) and provided a excellent description of how the controls in each family work together to mitigate threats and vulnerabilities.8.5 pointsUsed the provided security controls baseline for the case study company. Named and described each of the required control families (e.g. CA) listed under the "management controls" category (in the baseline) using information from NIST SP 800-53. For each "family" listed in the baseline under this category, identified (listed) the specific controls (e.g. CA-1) and provided an outstanding description of how the controls in each family work together to mitigate threats and vulnerabilities.7 pointsUsed the provided security controls baseline for the case study company. Named and described each of the required control families (e.g. CA) listed under the "management controls" category (in the baseline) using information from NIST SP 800-53. Provided a brief description of how the controls in each family work together to mitigate threats and vulnerabilities.6 pointsListed and described three or more management controls (from NIST SP 800-53) which should be implemented for the Field Office IT General Support System.4 pointsListed and described one or more management controls (from NIST SP 800-53) which should be implemented for the Field Office IT General Support System.0 pointsInsufficient, missing, or no work submitted.Section 13 (b) Minimum Security Controls: Operational Controls Category10 pointsUsed the provided security controls baseline for the case study company. Named and described each of the required control families (e.g. AT) listed under the "operational controls" category (in the baseline) using information from NIST SP 800-53. For each "family" listed in the baseline under this category, identified (listed) the specific controls (e.g. AT-1) and provided a excellent description of how the controls in each family work together to mitigate threats and vulnerabilities.8.5 pointsUsed the provided security controls baseline for the case study company. Named and described each of the required control families (e.g. AT) listed under the "operational controls" category (in the baseline) using information from NIST SP 800-53. For each "family" listed in the baseline under this category, identified (listed) the specific controls (e.g. AT-1) and provided an outstanding description of how the controls in each family work together to mitigate threats and vulnerabilities.7 pointsUsed the provided security controls baseline for the case study company. Named and described each of the required control families (e.g. AT) listed under the "operational controls" category (in the baseline) using information from NIST SP 800-53. Provided a brief description of how the controls in each family work together to mitigate threats and vulnerabilities.6 pointsListed and described three or more operational controls (from NIST SP 800-53) which should be implemented for the Field Office IT General Support System.4 pointsListed and described one or more operational controls (from NIST SP 800-53) which should be implemented for the Field Office IT General Support System. (Or, inappropriate or excessive copying from other authors' work.)0 pointsInsufficient, missing, or no work submitted.Section 13 (c) Minimum Security Controls: Technical Controls Category10 pointsUsed the provided security controls baseline for the case study company. Named and described each of the required control families (e.g. AC) listed under the "technical controls" category (in the baseline) using information from NIST SP 800-53. For each "family" listed in the baseline under this category, identified (listed) the specific controls (e.g. AC-1) and provided a excellent description of how the controls in each family work together to mitigate threats and vulnerabilities.8.5 pointsUsed the provided security controls baseline for the case study company. Named and described each of the required control families (e.g. AC) listed under the "technical controls" category (in the baseline) using information from NIST SP 800-53. For each "family" listed in the baseline under this category, identified (listed) the specific controls (e.g. AC-1) and provided an outstanding description of how the controls in each family work together to mitigate threats and vulnerabilities.7 pointsUsed the provided security controls baseline for the case study company. Named and described each of the required control families (e.g. AC) listed under the "technical controls" category (in the baseline) using information from NIST SP 800-53. Provided a brief description of how the controls in each family work together to mitigate threats and vulnerabilities.6 pointsListed and described three or more technical controls (from NIST SP 800-53) which should be implemented for the Field Office IT General Support System.4 pointsListed and described one or more technical controls (from NIST SP 800-53) which should be implemented for the Field Office IT General Support System. (Or, inappropriate or excessive copying from other authors' work.)0 pointsInsufficient, missing, or no work submitted.Sections 14-15: Completion & Approval Dates5 pointsIncluded both sections from the template file (14 & 15) and entered the completion date for the plan.3 pointsIncluded section 14 from the template file and entered a completion date for the plan.0 pointsN/A0 pointsN/A0 pointsN/A0 pointsInsufficient, missing, or no work submitted.ProfessionalismExcellentOutstandingAcceptableNeeds ImprovementNeeds Significant ImprovementMissing or UnacceptableExecution10 pointsWork is professional in appearance and organization (appropriate and consistent use of fonts, headings, color). No word usage, grammar, spelling, or punctuation errors. All quotations (copied text) are properly marked and cited using a professional format (APA format recommended but not required.)8.5 pointsWork is professional in appearance and organization (appropriate and consistent use of fonts, headings, color). Work contains minor errors in word usage,grammar, spelling or punctuation which do not significantly impact professional appearance. All quotations (copied text) are properly marked and cited using a professional format (APA format recommended but not required.)7 pointsWork is professional in appearance and organization (minor issues allowable but overall the work contains appropriate and consistent use of fonts, headings, color). Errors in word usage, spelling, grammar, or punctuation which detract from professional appearance of the submitted work. All quotations (copied text) are properly marked and cited using a professional format (APA format recommended but not required.)6 pointsSubmitted work has numerous errors in formatting, organization, word usage, spelling, grammar, or punctuation which detract from readability and professional appearance. Punctuation errors may include failure to properly mark quoted or copied material (an attempt to name original source is required).4 pointsSubmitted work is difficult to read / understand and has significant errors in formatting, appearance / organization, spelling, grammar, punctuation, or word usage. Significant errors in presentation of copied text (lacks proper punctuation and failed to attribute material to original source).0 pointsNo work submitted. OR, work contains significant instances of cut-and-paste without proper citing / attribution to the original work or author.Overall ScoreExcellent90 or moreOutstanding80 or moreAcceptable70 or moreNeeds Improvement56 or moreNeeds Significant Improvement36 or moreMissing or Unacceptable Work0 or more
HCI 655 Grand Canyon University HL7 and FHIR Technology Platforms Discussion
The purpose of this assignment is to research and become familiar with EHR technology platforms.In a 750-1,000 word essay, ...
HCI 655 Grand Canyon University HL7 and FHIR Technology Platforms Discussion
The purpose of this assignment is to research and become familiar with EHR technology platforms.In a 750-1,000 word essay, research and explain various EHR technology platforms. Include the following:Describe two different technology platforms used in leading EHR systems.Contrast the benefits and challenges for the EHR technology platforms you selected. Include at least two benefits and two challenges for each platform.Explain why each technology platform you selected was developed.Identify which current EHR systems use the technology platforms you selected.Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
Earn money selling
your Study Documents