Assignment: Framework Decisions

Assignment: Basic Nursing Training
April 19, 2022
Assignment: Foundation in Hematology
April 19, 2022

Assignment: Framework Decisions

Assignment: Framework Decisions

Assignment: Framework Decisions
ORDER NOW FOR ORIGINAL AN ORIGINAL PAPER ASSIGNMENT: Assignment: Framework Decisions
Assignment: Framework Decisions

The RN to BSN program at Grand Canyon University meets the requirements for clinical competencies as defined by the Commission on Collegiate Nursing Education (CCNE) and the American Association of Colleges of Nursing (AACN), using nontraditional experiences for practicing nurses. These experiences come in the form of direct and indirect care experiences in which licensed nursing students engage in learning within the context of their hospital organization, specific care discipline, and local communities.

Note: The teaching plan proposal developed in this assignment will be used to develop your Community Teaching Plan: Community Presentation due in Topic 5. You are strongly encouraged to begin working on your presentation once you have received and submitted this proposal.

Managing and Using Information Systems:

A Strategic Approach – Sixth Edition

Keri Pearlson, Carol Saunders, and Dennis Galletta

© Copyright 2016 John Wiley & Sons, Inc.
Chapter 7 Security
Opening Case

• What are some important lessons from the opening case?

• How long did the theft take? How did the theft likely occur?

• How long did it take Office of Personnel Management (OPM) to detect the theft?

• How damaging are the early reports of the data theft for the OPM?

© 2016 John Wi ley & Sons, Inc. 3
How Long Does it Take?

• How long do you think it usually takes for someone to discover a security compromise in a system after the evidence shows up? A. Several seconds B. Several minutes C. Several hours

D. Several days E. Several months

A Mandiant study revealed that the median for 2014 was 205 days! That’s almost 7 months! The record is 2,982 which is 11 years!

© 2016 John Wi ley & Sons, Inc. 4
Timeline of a Breach – Fantasy

• Hollywood has a fairly consistent script: • 0: Crooks get password and locate the file • Minute 1: Crooks start downloading data and

destroying the original • Minute 2: Officials sense the breach • Minute 3: Officials try to block the breach • Minute 4: Crooks’ download completes • Minute 5: Officials lose all data

Source: http://www.verizonbusiness.com/resources/reports/rp_2010-DBIR-combined-reports_en_xg.pdf

© 2016 John Wi ley & Sons, Inc. 5

http://www.verizonbusiness.com/resources/reports/rp_2010-DBIR-combined-reports_en_xg.pdf
Timeline of a Breach – Reality

Source: http://www.verizonbusiness.com/resources/reports/rp_2010-DBIR-combined-reports_en_xg.pdf

© 2016 John Wi ley & Sons, Inc. 6

http://www.verizonbusiness.com/resources/reports/rp_2010-DBIR-combined-reports_en_xg.pdf
IT Security Decision Framework Decision Who is

Responsible Why? Otherwise?

Information Security Strategy

Business Leaders They know business strategies

Security is an afterthought and patched on

Information Security Infrastructure

IT Leaders Technical knowledge is needed

Incorrect infrastructure decisions

Information Security Policy

Shared: IT and Business Leaders

Trade-offs need to be handled correctly

You must proofread your paper. But do not strictly rely on your computer’s spell-checker and grammar-checker; failure to do so indicates a lack of effort on your part and you can expect your grade to suffer accordingly. Papers with numerous misspelled words and grammatical mistakes will be penalized. Read over your paper – in silence and then aloud – before handing it in and make corrections as necessary. Often it is advantageous to have a friend proofread your paper for obvious errors. Handwritten corrections are preferable to uncorrected mistakes.

Use a standard 10 to 12 point (10 to 12 characters per inch) typeface. Smaller or compressed type and papers with small margins or single-spacing are hard to read. It is better to let your essay run over the recommended number of pages than to try to compress it into fewer pages.

Likewise, large type, large margins, large indentations, triple-spacing, increased leading (space between lines), increased kerning (space between letters), and any other such attempts at “padding” to increase the length of a paper are unacceptable, wasteful of trees, and will not fool your professor.

The paper must be neatly formatted, double-spaced with a one-inch margin on the top, bottom, and sides of each page. When submitting hard copy, be sure to use white paper and print out using dark ink. If it is hard to read your essay, it will also be hard to follow your argument.