Discuss the epidemiologic triangle as it relates to the communicable disease you have selected.

 
Write a paper (2,000-2,500 words) in which you apply the concepts of epidemiology and nursing research to a communicable disease. Refer to “Communicable Disease Chain,” “Chain of Infection,” and the CDC website for assistance when completing this assignment.
Communicable Disease Selection
Choose one communicable disease from the options below.

Chickenpox
Tuberculosis
Influenza
Mononucleosis
Hepatitis B
HIV
Ebola
Measles
Polio
Influenza

Epidemiology Paper Requirements
Address the following:

Describe the chosen communicable disease, including causes, symptoms, mode of transmission, complications, treatment, and the demographic of interest (mortality, morbidity, incidence, and prevalence). Is this a reportable disease? If so, provide details about reporting time, whom to report to, etc.
Describe the social determinants of health and explain how those factors contribute to the development of this disease.
Discuss the epidemiologic triangle as it relates to the communicable disease you have selected. Include the host factors, agent factors (presence or absence), and environmental factors. Are there any special considerations or notifications for the community, schools, or general population?
Explain the role of the community health nurse (case finding, reporting, data collection, data analysis, and follow-up) and why demographic data are necessary to the health of the community.
Identify at least one national agency or organization that addresses the communicable disease chosen and describe how the organizations contribute to resolving or reducing the impact of disease.
Discuss a global implication of the disease. How is this addressed in other countries or cultures? Is this disease endemic to a particular area? Provide an example.

A minimum of three peer-reviewed or professional references is required.
Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.
This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion. 

Analyze the components and requirements of its information systems technology program.

 5 pages; minimum 5 academic/professional references published in last 5 yrs.  

Identify an effective health care organization that utilizes information technology.

Analyze the components and requirements of its information systems technology program.
Explain the requirements for health care information technology systems to comply with federal, state, and local laws governing patient information security.
Assess the risks and affected stakeholders in the event of a system breach or failure, and recommend approaches that can be used to safeguard confidential information.

For a resource guide on using the online library to search for references, please click here.
Please submit your assignment.
For assistance with your assignment, please use your text, Web resources, and all course materials.
Your assignment will be graded in accordance with the following criteria. Click here to view the grading rubric.

What are the main differences between bar charts and networks?

Part I (25 points)

What are the main differences between bar charts and networks?

What are the main advantages of networks over bar charts?

Why is it important to know the critical path?

What is the difference between total and free float?

Explain the difference between EST, EFT, LST, and LFT.

Part II (10 points)

Draw the activity-on-node (AON) network diagrams for the following two projects:

Part III (25 Points)

For each of the following predecessor tables:

Draw a corresponding AON network.

Compute EST and EFT for each activity and complete the table.

Compute LST and LFT for each activity and complete the table.

Find and mark the critical path.

Determine the total float and free float and complete the table.

Table A:

ActivityDurationPreceding ActivityESEFLSLFTFFF
A2020200
B4A
C6A
D9A
E5B
F7B, C
G3D, E, F

Table B:

ActivityDurationPreceding ActivityESEFLSLFTFFF
A6
B2
C8A
D5A, B
E3B
F6D, E
G5C, D
H2F, G

Table C:

ActivityDurationPreceding ActivityESEFLSLFTFFF
A5
B7A
C10A
D5A
E9A
F6B
G4B, C
H8B, C, D,
I2C, D
J5E
K8F
L9E, G
M7F, G, H
N3F, G, H, I
O6H, I
P4M, N, O
Q3K, L
R5M, N
S4J, P
T6Q
U4Q, R
V1T, U, S

PART IV (20 points)

Calculate the expected duration and the variance for each of the paths in the following network and identify the critical and near-critical paths. The optimistic times (a), most likely times (m), and pessimistic times (b) are given for each activity. Then answer the following questions (Show your calculations):  

What is the probability that this project can be completed in 32 days?

What is the probability this project can be completed by the 28th day?

For a 99% probability, what is the expected number of days for completion?

For a 1% probability, what is the expected number of days for completion?

PART V (20 points)

What does the term “accelerating” a project mean, and why would a project manager (or a contractor) accelerate a project?

A project manager may shorten the duration of a project in many ways. Mention six of these ways. Discuss each one of them briefly, mentioning its pros and cons.

Calculate the normal, least-cost, and crash duration for the following project (Table V3A). Calculate the cost associated with each duration. Indirect (overhead) costs are $100 per day.

Table V3A:

ActivityPreceding ActivityDuration (days)Cost $
NormalCrashNormalCrash
A75500640
BA65550630
CA85800935
DB10712001440
EB,C64600700
FC43500590
GD,F427001000
HE,F74650950
IG,H22300300

Project 1 Activity Immediate Predecessor E, F, H, I Project 2 Activity Immediate Predecessor F B F, G, J D. I

What is a common drawback or weakness of a vulnerability scanner?

What is a common drawback or weakness of a vulnerability scanner?

A high false-negative error rate
A high false-positive error rate
A low false-negative error rate
A low false-positive error rate

QUESTION 5

What can be used to ensure confidentiality of sensitive data?

Hashing
Digital signature
Non-repudiation
Encryption

QUESTION 6

You have identified the MAO for a system. You now want to specify the time required for a system to be recovered. What is this?

Recovery time objectives
Recovery point objectives
Maximum acceptable outage
BIA time

QUESTION 7

Which element of an incident response plan involves obtaining and preserving evidence?

Preparation
Identification
Containment
Eradication

QUESTION 8

Of the following, what is critical for any DRP?

Budget
Alternate locations
Third-party backup software
Fuel for generators

QUESTION 9

Three common controls used to protect the availability of information are:

Redundancy, backups and access controls.
Encryption, file permissions and access controls.
Access controls, logging and digital signatures.
Hashes, logging and backups.

QUESTION 10

A major disruption has forced you to move operations to an alternate location. The disruption is over and you need to begin normalizing operations. What operations should you move back tothe original location first?

Mission-essential personnel
Most critical business functions
non-mission-essential personnel
Least critical business functions

QUESTION 11

What type of control is an intrusion detection system (IDS)?

Corrective
Detective
Preventative
Recovery

QUESTION 12

Vulnerability management begins with an understanding of cybersecurity assests and their locations, which can be accomplished by:

Vulnerability scanning.
Penetration Testing.
Maintaining an asset inventory.
Using command line tools.

QUESTION 13

Attackers attempt a DoS attack on servers in your organization. The CIRT responds and mitigates the attack. What should be the last step that the CIRT will complete in response to this incident?

Document the Incident.
Contain the threat.
Report the Incident.
Attack the attacker.

QUESTION 14

You are performing a cost-benefit analysis. You want to determine if a countermeasure should be used.

Which of the following formulas should you apply?

Projected benefits – Cost of countermeasure
Loss before countermeasure – Loss after countermeasure
Loss after countermeasure – Loss before countermeasure
Cost of countermeasure – Projected benefits

QUESTION 15

A business impact analysis (BIA) includes a maximum allowable outage (MAO). The MAO is used to determine the amount of time in which a system must  be recovered. What term  is used in the DRP instead of the MAO?

Recovery action  item  (RAI)
Recovery time objective (RTO)
Critical business function (CBF)
DRP action  item (DRPAI)

QUESTION 16

What determines if an organization is governed by HIPAA?

If employees handle health-related information
If it is a federal agency
If it receives E-Rate funding
It it is registered with the Securities and Exchange commission

QUESTION 17

A major disruption has forced you to move operations to an alternate location. The disruption  is over and you need to begin normalizing  operations. You have rebuilt several servers at the primary location. What should you do?

Test the servers for three to five days before bringing them online.
Bring the servers online and turn off the alternate location servers.
Run the servers concurrently with the alternate location for three to five days.
Test the servers and then turn off the servers at the alternate location.

QUESTION 18

Mission-critical business functions are considered vital to an organization. What are they derived from?

Executive leadership
Critical success factors
Employees
Critical IT resources

QUESTION 19

Logon identifiers help ensure that users cannot deny taking a specific action such as deleting a file. What is that called?

Non-repudiation
PKI
Encryption
Digital signature

QUESTION 20

What can you use to determine the priority of countermeasures?

Best guess method
Disaster recovery plan
Threat/vulnerability matrix
Cost-benefit analysis

QUESTION 21

Which three elements of the current threat landscapes have provided increased levels of access and connectivity, and therefore increased opportunities for cybercrime?

Text messaging, Bluetooth technology and SIM cards
Web applications, botnets and primary malware
Financial gains, intellectual property and politics
Cloud computing, social media and mobile computing

QUESTION 22

You are considering an alternate location for a DRP You want to use a business location that is already running non-critical business functions as the alternate location. This location has most of the equipment needed. What type of site is this?

Hot site
Warm site
DRP site
Cold site

QUESTION 23

What management program can be implemented to ensure that the configuration of systems is not modified without formal approval?

Change management
Configuration management
Process analysis
GAP analysis

QUESTION 24

After an incident has been verified, you need to ensure that it doesn’t spread to other systems. What is this called?

Containment
Incident response
Spread avoidance
Impact and priority calculation

QUESTION 25

The number and types of layers needed for defense in depth are a function of:

Asset value, criticality, reliability of each control and degree of exposure.
Threat agents, governance, compliance and mobile device policy.
Network configuration, navigation controls, user interface and VPN traffic.
Isolation, segmentation, internal controls and external controls.

QUESTION 26

What can you do to show that the BCP will work as planned?

BCP exercises
BCP testing
BCP training
BCP planning

QUESTION 27

What type of approach does a BIA use?

Best-guess approach
Top-down approach where CBFs are examined first
Middle-tier approach
Bottom-up approach where servers or services are examined first

QUESTION 28

In an attack, the container that delivers the exploit to the target is called what?

Attack vector
Malware
Payload
Rootkit