Information Security in a World of Technology

Information Security in a World of Technology

Write  an essay addressing each of the following points/questions. Be sure to  completely answer all the questions for each number item. There should  be three sections, one for each item number below, as well the  introduction (heading is the title of the essay) and conclusion  paragraphs. Separate each section in your paper with a clear heading  that allows your professor to know which item you are addressing in that  section of your paper. Support your ideas with at least three (3)  citations in your essay. Make sure to reference the citations using the  APA writing style for the essay. The cover page and reference page do  not count towards the minimum word amount. Review the rubric criteria  for this assignment.

  1. The  textbook discusses several education methods. Discuss each method with  an example of how the method could be used in the organization. Then  discuss how you will evaluate the method and learning.
  2. Healthcare  continues to be a lucrative target for hackers with weaponized  ransomware, misconfigured cloud storage buckets, and phishing emails.  Discuss how an organization can protect patients’ information through:
    • Security mechanisms
    • Administrative and Personnel Issues
    • Level of access
    • Handling and Disposal of Confidential Information
  3. You  are providing education to staff on phishing and spam emails. Using the  different educational methods discussed in Chapter 12:
    • Provide examples of how each method can be used
    • How will the method and learning be evaluated?

Assignment Expectations:

Length: 500 words per essay prompt/section (1500 total for this assignment)

Structure: Include a title page and reference page in APA style. These do not count towards the minimal word amount for this assignment. All APA Papers should include an introduction and conclusion.

References:  Use the appropriate APA style in-text citations and references for all  resources utilized to answer the questions. Include at least three (3)  scholarly sources to support your claims.

The post Information Security in a World of Technology appeared first on Infinite Essays.