Nmap Report

3. Review the Lab 5 Nmap Scan Report that accompanies this lab.

4. Using the Lab 5 Nmap Scan Report, answer the following questions:

What are the date and timestamp of the Nmap host scan?

What is the total number of loaded scripts for scanning?

A synchronize packet (SYN) stealth scan discovers all open ports on the targeted host.

How many ports are open on the targeted host for the SYN stealth scan at 13:36?

Identify hosts, operating systems, services, applications, and open ports on devices from the Zenmap GUI (Nmap) scan report.

5. Review the Lab 5 Nessus Vulnerability Scan Report that accompanies this lab.

6. Using the Lab 5 Nessus Vulnerability Scan Report, answer the following questions:

How many hosts were scanned?

What were the start and end times for each of the scans?

How many total vulnerabilities were discovered for each host?

How many of the vulnerabilities were critical, major, and minor software vulnerabilities?

7. On your local computer, open a new Internet browser window.

8. In the address box of your Internet browser, type the URL http://cve.mitre.org and press

Enter to open the Web site.

9. On the Web site, toward the top left of the screen, click the CVE List link.

10. Review the CVE List Main Page.

11. Define CVE.

12. On the right, under Items of Interest, click the Terminology link.

13. Review the definitions for vulnerability and exposure.

14. Define the terms vulnerability and exposure.

15. At the top right of the Web site, click the Search link.

  

16. In the Search box, type the words Microsoft XP 2003 Service Pack 1 and click the Search button.

17. Describe some of the results you discover.

18. After viewing the results, conduct another search and this time, type the words Cisco ASA

5505 Security + and click the Search button.

19. Describe some of the search results.

Capstone Project: Preliminary Literature Review And Action Item Checklist

Part Two- Due 1/8/2020 Please refer back to the capstone project paper for topic as this will be reflected back. This is a continuation. This assignment comprises two sections: a preliminary literature review and an action item checklist.  Preliminary Literature Review:

  1. Contains a minimum of 10 scholarly, peer-reviewed research articles.
  2. Each article needs to be thoroughly summarized. The summary must describe the relevance of the article, and how the research findings support the action you are proposing in your capstone project.
  3. Each article summary needs to include a research design and methods section.
  4. The capstone project requires a comprehensive literature review that includes a minimum of 25 articles; 10 article summaries will be written in HCA-620 and can be applied in HCA-699.

Action Item Checklist:The Action Item Checklist should include specific future steps required to complete your capstone project as well as expected completion dates.Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.This assignment uses a grading rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.You are required to submit this assignment to LopesWrite. Please refer to the directions in the Student Success Center.

Module 1

CASE 7-2: United States of America v. Park (p. 166 in the text)

Do you think that Parks should have been charged with a criminal offense when he was not directly running the warehouse where the contaminated food was stored? Should he be convicted when he did not intend to hurt anyone? Discuss why or why not. What precedent does the court rely on in this case?

For one of your posts, do a little exploring online and discuss another white-collar crime story in the news. Include one source, properly cited in APA format

Ass3 Hsa520

Assignment 3: Technology Assessment and Government Regulations

You are the senior manager of a large healthcare organization. The senior management team must select a Health Information Management System (HIMS) for the organization that will encompass several clinical and administrative departments. You will need to create and deliver a PowerPoint presentation that will persuade your CEO to purchase your chosen HIMS. Your presentation also must describe key aspects of HIMS (electronic medical record), such as implementation, interoperability, productivity, and support challenges. Use the work you did and the feedback you received from the Week 9 discussion when creating your presentation.

Create a ten to twelve (10-12) slide audio PowerPoint presentation with speaker notes (maximum of twenty [20] minutes) in which you:

  1. Justify to the CIO the need to integrate all clinical and administrative departments into a Health Information Management System in your health care organization.
  2. Select the most significant and current HIE, EHR, HIPPA, and HITECH regulations in your state. Next, determine two (2) ways these regulations could impact the integration of HIMS in your health care organization. Include three (3) potential solutions to address these regulation challenges.
  3. Propose three (3) privacy and security measures to help your organizations health care providers avoid security breaches and data loss, while better allowing them to concentrate on patient care. Next, develop an action plan to protect patient information that complies with HIE, EHR, PHI, and HIPAA legal requirements.
  4. Suggest three (3) key actions to monitor privacy and security violations that may occur after the HIMS implementation in your health care organization. Summarize in one (1) slide your key findings. Narrate each slide, using Kaltura or another device, as if you were actually presenting in front of the audience. For information on how to use Kaltura to record your presentation please view the Kaltura Help Document.
  5. Use at least three (3) current (2015-2019), quality references. Note: Wikipedia and similar websites do not qualify as quality resources. The  is a great resource to locate current, quality resources. Include your references in one slide.

Your assignment must follow these formatting requirements:

  • Format the PowerPoint presentation with headings on each slide with relevant graphics (photographs, graphs, clip art, etc.) to ensure the presentation is visually appealing and readable from 18 feet away. Check with your professor for any additional instructions.
  • Include a title slide containing the assignment title, your name, the professors full name, the course title, and the date. The title and reference slides are not included in the required number of slides.
  • Make use of your speaker notes to clarify and elaborate on the information contained in your slides.

The specific course learning outcomes associated with this assignment are:

  • Propose a Health Information Management Systems (HIMS) and a patient information protection plan for a health care organization.
  • Propose how patient centric healthcare practices and technology and a HIMS can improve healthcare.
  • Determine best practices for avoiding HIMS failures and breaches.
  • Review concepts and theories related to healthcare information technology and systems, including ethical and legal standards, strategic information system planning, and methods for ensuring the security of patient information.