Your Perfect Assignment is Just a Click Away

Starting at $8.00 per Page

100% Original, Plagiarism Free, Customized to your instructions!

glass
pen
clip
papers
heaphones

NEED DISCUSSION IN 10 HOURS or LESS – Write My Paper Today

NEED DISCUSSION IN 10 HOURS or LESS – Write My Paper Today

NEED DISCUSSION IN 10 HOURS or LESS – Write My Paper Today

Choose one of the Security Risk Assessment Videos to watch

Summarize the main points of the video

Share your plan to improve your knowledge of security basic.

REPLY TO 2 OF MY CLASSMATES DISCUSSION TO THE ABOVE QUESTIONS AND EXPLAIN WHY YOU AGREE. MINIMUM OF 150 WORDS EACH

                                                           CLASSMATE POST 1

I watched the “Security 101: Security Risk Analysis” video for this week’s discussion post. A risk-management system strengthens how an organization identifies potential risks and how to prevent them from happening (Hebda et Al., 2018). The first step in managing a risk-management system is to perform a security risk analysis. In a security risk analysis, it is crucial to identify how information is stored (i.e. hard drives, CDs, mobile devices), where the information goes (i.e. providers within and outside the organization, backup hard drives), and how information is transmitted (i.e. e-mail, fax, shared network drives). Once this data is collected, the next step is to identify and document possible threats, such as hackers, natural disasters, and power outages, and weaknesses in the security controls. After assessing current security measures and calculating probabilities of potential risks, strategies are developed to prevent those threats from occurring and to correct such actions should those threats occur. (The Office of the National Coordinator for Health Information Technology, 2014)

To improve my knowledge of security basics, I will continue to watch the other videos provided by the HealthIT.gov website and explore other resources that the website has to offer. I will also review chapters in our class textbook that discuss information security in the healthcare setting.

Reference

Hebda, T. L., Czar, P., & Hunter, K. (2018). Handbook of Informatics for Nurses & Healthcare Professionals (6th ed.). Pearson Education (US). https://ambassadored.vitalsource.com/books/9780134748436

The Office of the National Coordinator for Health Information Technology. (2014, April 17). Security 101: Security risk analysis. HealthIT.gov. Retrieved October 9, 2022, from https://www.youtube.com/watch?v=hNUBMLVr9z4&t=429s

                                                                      CLASSMATE POST 2

The video Security 101: Contingency Planning discusses designing a course of action for organizations to effectively respond to an unexpected event or future event that may or may not happen. In healthcare, it is designed to help protect electronically protected health information (ePHI) (Office of the National Coordinator for Health IT, 2014). The unpredictable nature of life and business shows the need for a contingency plan which is also a requirement of the HIPAA Security Rule. The plan also outlines methods to restore data. It involves five essential elements: data backup, disaster recovery, emergency mode operation, testing and revision procedures, applications, and data criticality analysis; where the first three are a requirement for all health institutions under the HIPAA rule, while the other two are addressable (Office of the National Coordinator for Health IT, 2014). A contingency plan is crucial to improve healthcare provision and comply with HIPAA regulations.

Security information is always evolving and requires an elaborate plan to gain knowledge continuously. I plan to enroll in a short course covering security to provide the foundation for my security knowledge. It will inform me of the basics and allow more focused learning on complex issues. There are several free online courses on security that I can enroll into implement the first stage of my plan (Mohamed Shakeel et al., 2018). Secondly, I will engage in online research of journals and articles relating to security in healthcare to improve my knowledge further. Several platforms, such as HealthIT.gov, provide recent articles on healthcare security that would allow me to remain updated with trends and new information (Mohamed Shakeel et al., 2018). Next, I will assess the health Information Technology in one healthcare organization to understand the application of the knowledge learned and to gain some practical knowledge on how various elements work. I believe my plan will significantly improve my knowledge of security and privacy.

                                                                       References

Mohamed Shakeel, P., Baskar, S., Sarma Dhulipala, V. R., Mishra, S., & Jaber, M. M. (2018). Maintaining security and privacy in health care system using learning based deep-Q-networks. Journal of medical systems42(10), 1-10. https://doi.org/10.1007/s10916-018-1045-z.

Office of the National Coordinator for Health IT. (2014, April 17). Security 101: Contingency Planning [Video]. YouTube. https://www.youtube.com/watch?v=61roNgguC1k&t=384s.


"Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Order Solution Now

Our Service Charter


1. Professional & Expert Writers: Pro Assignments only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Pro Assignments are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Pro Assignments is known for the timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Pro Assignments, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.