coursework-banner

NR 543 W7 Security Assessment Assignment FAQs SOLVED

NR 543 W7 Security Assessment Assignment FAQs SOLVED

recognize threats to information and information-system security;
identify safeguards to protect information and information-system security; and
develop strategies to increase safeguards to protect information and information-system security.

Requirements
Select a software application, preferably an information system that you currently use in your work setting, to assess security threats. You may personally test the application as well as observe the practices of other users.

Identify system threats.
Examine the organization’s information-system policies for threat management, noting s

NR 543 W7 Security Assessment Assignment FAQs SOLVED
NR 543 W7 Security Assessment Assignment FAQs SOLVED

trengths as well as potential problem areas, with rationales.
Propose an evidence-based solution to each threat identified. In the event that you identify more than seven threats, prioritize the top seven and propose a solution for the three threats that you deem greatest.
If you do not currently have access to an automated system, then speak with your instructor to determine a mutually agreeable alternative.

  • Information technology has prominently grown in healthcare sector.
  • They have helped reduce costs and improve patient safety.
  • Threats to information systems have been on the rise.
  • Threats emanate from deliberate action threats and accidental events.
  • There is a need to address the threats.
  • This presentation focuses on threats to information system used in our facility.

Over the years, the use of information technology in the healthcare sector has been on the rise as one of the technological advancements. Hospitals and other healthcare facilities have been applying information technology due to the benefits that come with it. For examples, the introduction of various software and information systems have helped to substantially lower the healthcare costs and improve patient services and safety (Avgerou & Walsham, 2017). On the other hand, security threats to these information systems have also been on the rise. While some are due to accidental actions, other threats come from deliberate actions, with the perpetrators having selfish interest to achieve. As such there is always a need to address these security threats for better outcomes

  • Successful identification of threats require assessment.
  • This presentation will explore practice management system.
  • Its description will be given
  • Its security threats will be discussed.
  • Evidence-based solution to the security threats.
  • Conclusion also forms part of the presentation.

The adverse effects of security threats to information systems means that they should be prevented or eliminated. However, a successful identification depends on how well an assessment has been conducted (Abouelmehdi et al., 2018). Therefore, this presentation will focus on the practice management system. As part of the presentation, a discussion on and a description of the practice management system will be explored. In addition, this presentation will also identify common security threats to the practice management systems. As earlier indicated, the potential damage that can be caused by these security threats mean that they need to be addressed or mitigated. As such, evidence-based recommendations will be given as possible solutions.

Click here to ORDER an A++ paper from our MASTERS and DOCTORATE WRITERS: NR 543 W7 Security Assessment Assignment FAQs SOLVED

  • The main function is to help the healthcare facility run more efficiently.

    NR 543 W7 Security Assessment Assignment FAQs SOLVED
    NR 543 W7 Security Assessment Assignment FAQs SOLVED
  • The system helps in patient information organization, billing cycle management
  • Also helps in tracking of appointment times and scheduling of appointments.
  • The result is high level patient care.
  • Consolidates every patient and healthcare professionals details.
  • Makes the navigation of important information easier.

Practice management system is one of the healthcare information system that have been designed to improve the functionality and efficiency in the healthcare systems. Therefore healthcare facility can run more effectively (Avgerou, & Walsham, 2017). To make the functionality more efficient and fast, the practice management system facilitate functions such as the billing cycle management, patient information organization, tracking of patient appointment times and scheduling of appointment times and dates. One of the major advantages of using this system is that it helps in consolidating patient and healthcare professional details hence making the navigation of the important information easier, faster and more efficiently. The end result is a high-level patient care and improved patient delivery.

Read Also: NR 543 Nursing Nomenclature and Terminologies and Using Your Knowledge Solved

  • Practice management system has various important features.
  • These features are key in making it important.
  • The major features are:

üReports.

üCentralized billing

üPatient information tracking.

Practice management system has top features that make it important in the functions it performs in the healthcare. One of the top features is reports. Through the use of this software, the healthcare professionals can effectively generate important information and reports on the patients so that they are available for use by other professionals (Finkbeiner & Finkbeiner, 2019). Such reports are key in improving patient care by offering useful and accurate information. The other feature is centralized billing. The system allows processing of payment and recording of billing history on a single platform hence improving efficiency. The other major feature is patient information tracking which is the most fundamental feature. Through this functionality, the system maintains up-to-date information on patient such as recent laboratory results, allergies, medications, family history and medical history.

  • Assessment was undertaken to identify possible threats.
  • The practice management system has been key for the organization.
  • Its use improved the efficiency of the facility.
  • Patient experience and healthcare professional’s output improved.
  • Various threats were identified.

As earlier indicated, identification of the security threats is one of the key steps in addressing the problems or threats. As such a comprehensive assessment of the practice management system used in the organization was performed. It was evident that the practice management system has been key and important for the organization. Since its implementation, the organization’s efficiency has incredibly improved. For example, patients have continuously reported improved experience with the hospital services. In addition, the professionals or staff in the facility have experienced an improved output. Therefore, the system is an integral part of the organization’s operations. However, it has been noted that there are various security threats that can compromise the system and lead to adverse outcomes such as data theft, data loss and patient information invasion (Finkbeiner & Finkbeiner, 2019).

  • Various threats were identified such as:

ü Malware attack, communication interception.

ü Network infrastructure errors or failures

üCommunication infiltration.

üDeliberate acts of theft.

üPower loss/failure.

üAccidents.

Upon assessing the practice management system used at the facility, various potential security threats to the system were noted. The potential threats include malware attack, communication interception, network infrastructure errors or failures, communication infiltration, deliberate acts of theft, both internal and external, possible power loss or failure and technological obsolescence. Therefore, these threats need to be addressed using various evidence-based strategies (Finkbeiner & Finkbeiner, 2019). The next sections will discuss the identified threats in details, presenting their possible impacts and the evidence-based strategies for mitigating them

  • Since the system needs internet connectivity, it malware attack is a threat.
  • Malware attack can come in various forms including:

üAdware

üSpyware

üTrojan horse

üWorm

üMalicious virus

Malware attacks can come because of some malicious codes resulting from the use of internet connectivity in the system. The malware can stay hidden in the system until that particular time when it is activated to lead adverse consequences.  Various malware attacks are possible, including adware, spyware, Trojan horse, worm and malicious virus. Malware may have various negative impacts. One of such impacts is information loss (Finkbeiner & Finkbeiner, 2019). When the malware invades the system, they corrupt important files containing patient information, such as appointments, and recent laboratory results. This can lead to privacy and confidentiality invasion and loss of revenue. Such attacks also lead to delays in hospital operations hence poorer patient services.