Background: You have been hired as a consultant by a hospital to help design a H

Background: You have been hired as a consultant by a hospital to help design a HIPAA training module. Objective: Your task is to design an interactive and engaging training presentation on HIPAA that is geared toward IT employees. Your challenge is to make the content captivating to avoid boredom, yet still convey the information system requirements that IT employees need to abide by. Also, conduct an effectiveness evaluation of your training based on peer feedback and quiz results.
Deliverables:
Interactive Training Presentation: Task: Develop a 7-10 minute training module about HIPAA. Ensure it’s interactive and engaging to maintain the audience’s attention.
Creativity: Avoid simple PowerPoints with basic animations. Employ your computer skills to add interactivity using tools like PowerPoint, Google Slides, or other software. Use this as an opportunity to learn new software such as Canva, Prezi, or a similar application.
Content: Originality is key. Do not use copied/pasted material from existing web sources. Proper citation is mandatory for any referenced material. Even images that are used in the presentation need to be referenced. In a real-world setting, you are not allowed to use any image you find a Google, however, for this assignment, you may with attribution.
Upload: Provide the link or file of your presentation here.
Evaluation and Feedback Document:Peer Review: Share your presentation with three classmates for their feedback. Utilize the ‘People’ function in the course to find participants.
Comprehension Quiz: Create and administer a post-session quiz to test material comprehension. Use tools like Survey Monkey. Ensure the questions are original. Do not ask questions like what HIPAA stands for, or what year it was passed. Focus on the IT-relevant content.
Analysis: Evaluate the effectiveness of your training based on peer feedback and quiz results. Focus on the impact of your presentation, and do not summarize it.If you are tasked with providing feedback, please avoid saying “Great job, it was perfect.” Provide constructive criticism to help your peers grow. There will not be any points deducted for negative feedback.
Document: Write a report detailing your evaluation and submit it under Part 2. Please include the names of your peers, as well as their responses.
Please include the quiz questions and answers
Make sure that your evaluation includes what you would do differently based on the feedback as well as if the learning module that you wrote is effective. Additional Guidance:
If you’re looking for inspiration or new software tools, consider exploring educational resources or articles on eLearning module development.
Remember, this is an opportunity to expand your skillset and explore creative methods for delivering eLearning content.
Important Notes:
Pay attention to grammar and spelling; errors will affect your grade.
Treat these documents as professional work, as if submitting them to your boss. You are being graded not just on content but also on design. For more information, please review this linkLinks to an external site..
Failure to cite sources will lead to a score of zero due to plagiarism. Remember, accidental plagiarism is still plagiarism!
Although generative AI can be used as a tool to support learning (e.g., in obtaining feedback or generating ideas), work submitted by a student should be that of the student and not the work of an AI system. If you include material generated by an AI program, it should be cited like any other reference material. Ultimately, the student bears responsibility for any inaccuracies or misinformation. If you have questions about how AI may be used to complete assignments within the scope of this academic integrity policy, please reach out to your instructor.

Use NIST SP 800-53 for all questions related to security controls. 1. Sarbanes-O

Use NIST SP 800-53 for all questions related to security controls.
1. Sarbanes-Oxley contains 11 titles that describe specific mandates and requirements for financial reporting. Which title enforces IT security controls and explain how these controls can be implemented to protect banking assets. 2. Describe the critical success factors in implementing an efficient and effective information security risk assessment program. 3. The GAO Report, Information Security Risk Assessment, identified three methods of conducting and documenting the assessment. These three methods were discussed in class. Using the information from the case study provided below identify the pertinent threats, vulnerabilities, and recommended countermeasures using one of the risk assessment methods from the GAO Report. Case Study: Recently, the Department of Veteran’s Affairs reported that an employee took a laptop computer home that contained records of millions of veterans. The computer was stolen. You were hired as an outside consultant to conduct a risk assessment and present the results to the Department’s Chief Information Security Officer so she can prepare for a Congressional testimony.
4. Based on previous discussions in class/online about FISMA security controls, answer the following questions:
a. Your IT enterprise is comprised of both host-based and network-based IDSs, application gateway firewalls, and VPN-enabled applications to support its sales department. Identify the security controls that each technology implements and explain how these controls support confidentiality, integrity, and availability. b. Identify the appropriate security controls that apply to an organization that has medical applications. Specifically, identify 5 security controls and explain (1-2 paragraphs) how these controls help mitigate the risk of inadvertent disclosure of personal information, modification of data, or the availability of data. c. You report to the CIO for a large financial institution and he/she tasked you to develop procedures to implement 5 Access Control mechanisms for the IT systems. Explain (1-2 paragraphs for each mechanism) how you would implement each control.
5. Using the Security Target for Bioscriipt, Version 2.1.3 (Bioscriipt, Version 2.1.3 see attached document in BlackBoard), identify the relevant security features for logical and physical access, and identify how these features would support best security practices (e.g., FISMA, SOX, or HIPAA). Select 5 security controls. Additionally, explain how these security functional requirements protect inadvertent disclosure of information, modification of data, and/or the availability of data.
6. Explain which NIST security controls enforce the Principle of Least Privilege. 7. Port scanning allows a user to sequentially probe a number of ports on a target system in order to see if there is a service that is listening. Explain how effective packet filtering can deter scanning probes from devices like FIN scanners.

My code wont print results then im trying to print the tallest player name and a

My code wont print results then im trying to print the tallest player name and age with their height and inchest my code: import java.util.ArrayList;
import java.util.List;
import java.util.Scanner;
public class Project1 {
private static Player tallestPlayer;
public static void main(String[] args) {
try (Scanner scanner = new Scanner(System.in)) {
List players = new ArrayList<>();
System.out.println(“Enter the number of players:”);
int numPlayers = scanner.nextInt();
for (int i = 0; i < numPlayers; i++) { System.out.println("Enter player " + (i+1) + " information:"); System.out.print("Name:"); String name = scanner.next(); System.out.print("Height (feet):"); int feet = scanner.nextInt(); System.out.print("Height (inches):"); int inches = scanner.nextInt(); System.out.print("age:"); int age = scanner.nextInt(); players.add(new Player(name, new Height(feet, inches), age)); } double totalAge = 0; for (Player player : players) { totalAge += player.getAge(); } double averageAge = totalAge / players.size(); System.out.println("Average age: " + averageAge); Player tallestPlayer = players.get(0); for (int i = 1; i < players.size(); i++) { Player player = players.get(i); int totalFeet = player.getHeight().getFeets(); int totalInches = player.getHeight().toInches(); if (totalFeet > tallestPlayer.getHeight().getFeets() || (totalFeet == tallestPlayer.getHeight().getFeets() && totalInches > tallestPlayer.getHeight().toInches())) {
tallestPlayer = player;
}
}
}
System.out.println(“tallest player: ” + tallestPlayer.getName());
}
}
class Height {
private int feet;
private int inches;
public Height(int feet, int inches) {
this.feet = feet;
this.inches = inches;
}
public int toInches() {
return feet * 12 + inches;
}
public int getFeets() {
return feet;
}
@Override
public String toString() {
return feet + “‘:'” + inches;
}
}
class Player {
private String name;
private Height height;
private int age;
public Player(String name, Height height, int age) {
this.name = name;
this.height = height;
this.age = age;
}
public String getName() {
return name;
}
public Height getHeight() {
return height;
}
public int getAge() {
return age;
}
@Override
public String toString() {
return “Name: ” + name + “, Hectaight: ” + height.toString() + “, Age: ” + age;
}
}

From Unit 2, PowerPoint Presentation in part 2, run all the queries in DB Browse

From Unit 2, PowerPoint Presentation in part 2, run all the queries in DB Browser. Save each query as instructed in the following video. When finished with your assignment, submit the three following files:
The database file ( .db format)
The SQL scriipt file. ( a .sql file)
A “screenshot” file showing the results of the SQL scriipt. (a Word or PDF file)
Add a comment to name your queries according to the slide number as instructed in the following video. Begin the comment with — (two hyphens)
Example:
— Slide 19
SELECT SUM(ExtendedPrice) AS WaterSportsRevenue
FROM ORDER_ITEM
WHERE SKU IN
(SELECT SKU
FROM SKU_DATA
WHERE Department = ‘Water Sports’);
To view the results of a specific query, select the query you want to execute and then click on the execute button. This will show the output related to the selected query.
Capture a screenshot of the entire DB browser window, including the query and its output.
Combine the screenshots by copying and pasting them into a single Word document file. Afterward, submit the file in either Word or PDF format.
Guidelines
Include the following:
Include your last name in the filename (example: Unit-5 ASLab Smith.).
The database file should be in .db format.
The SQL scriipt file should be in SQL (.sql) format.
The screenshot file should be in either Word or PDF format.

The first project involves modifying the attached lexical analyzer and the compi

The first project involves modifying the attached lexical analyzer and the compilation listing generator code. You need to make the following modifications to the lexical analyzer, scanner.l:
1. The following reserved words should be added: else, elsif, endfold, endif, fold, if, left, real, right, then Each reserved words should be a separate token. The token name should be the same as the lexeme, but in all upper case.
2. Two additional logical operators should be added. The lexeme for the first should be | and its token should be OROP. The second logical operator added should be ! and its token should be NOTOP.
3. Five relational operators should be added. They are =, <>, >, >= and <=. All of the lexemes should be represented by the single token RELOP. 4. One additional lexeme should be added for the ADDOP token. It is binary operator – that is the subtraction operator. 5. One additional lexeme should be added for the MULOP token. It is/ that is the division operator. 6. A new token REMOP should be added for the remainder operator. Its lexeme should be %. 7. A new token EXPOP should be added for the exponentiation operator. Its lexeme should be ^. 8. A new token NEGOP should be added for the unary minus operator. Its lexeme should be ~. 9. A second type of comment should be added that begins with -- and ends with the end of line. As with the existing comment, no token should be returned. 10. The definition for the identifiers should be modified so that underscores can be included, however, no more than two consecutive underscores are permitted, but leading and trailing underscores should not be permitted. 11. One additional type of integer literal should be added, which are hexadecimal integers. The begin with the # character followed by one of more decimal digits, or the letter A-F, in either upper or lower case. 12. A real literal token should be added. It should begin with a sequence of zero or more digits following by a decimal point followed by one or more additional digits. It may optionally end with an exponent. If present, the exponent should begin with an e or E, followed by an optional plus or minus sign followed by one or more digits. 13. The definition for the character literals should be modified so that five additional escape characters are also allowed: 'b', 't', 'n', 'b' and 'f'.

Prompt: In response to your peers, select one of the situations described by a p

Prompt: In response to your peers, select one of the situations described by a peer and think about a way that you could increase the overall security measures of the situation. Use a systems thinking approach, and think outside of the box!
PEER POST # 1
Symmetric encryption requires less computational complexity, it uses one key to encrypt and decrypt and the key is shorter in length as compared to asymmetric encryption. This makes symmetric encryption the most efficient and reliable option for large transfers of data such as emails, files, securing communication through closed systems and VPN’s. It’s also widely compatible with most hardware and software. Asymmetric encryption utilizes two keys, one public to encrypt and the other private to decrypt. This can slow down efficiency due to the use of more than one key but is considered more secure for that very reason. Asymmetric encryption is best suited for applications such as block chain transactions, banking, digital signatures and authentication. However, it is more practical to use both, the data or message can be encrypted with symmetric encryption while the session key or signature can be encrypted with asymmetric. PEER POST # 2
Symmetric encryption utilizes a single key for process of decryption and encryption. Symmetric encryption is said to be faster for both encryption and decryption as only one key is utilized, this allows for this process to be both fast and efficient. A situation where this is most appropriately used is when sending data over a secure network within a corporation. This allows for larger amounts of data to be transmitted not only faster but also strong security as they within their own network. Asymmetric encryption utilizes two keys, one for the process of decryption, and one for the process of encryption. With speed in mind asymmetric encryption is obviously slower and not as efficient. Asymmetric encryption does however offer greater security as it has both a public key for encryption and a private key for decryption. This would more appropriately be used when sending an email or signing a document as it assists the the verification of identity.

Prompt: In your responses to your peers, provide feedback on their explanations.

Prompt: In your responses to your peers, provide feedback on their explanations. Your feedback should be constructive and should address the following:
How do their posts help clarify the concepts for you?
What in their posts causes confusion for you?
What other information could your peers have included in their responses?
PEER POST # 1
Most banks will fall into multiple categories of digital business models. Traditionally banks will use the omnichannel model to provide access to its services through multiple means, such as online, in-person, over the phone, and through a mobile app. However they also cover other models such as becoming ecosystem drivers by offering services for major life events. The customer relationship management process for a financial institution is based on building the trust of their clients. Financial institutions must analyze both the speed at which users can receive their data, and they level of security that is perceived by those users. This could be seen through the actions of users or by things like user surveys. I think that financial institutions should pay close attention to analytics, but not be trapped in them. Analytics don’t always tell the full story, so financial institutions need to remain flexible in their processes so they can tailor their business model to fit with changing circumstances. PEER POST # 2
Banks and financial companies are taking full advantage of advancing technologies to improve their business models. By switching to an all online model they are able to immediately respond to customer requests and provide better services. With insurance companies all the information you need is included in the app and it is relatively easy to file claims on your phone, at least from my experience. Customer relations are a little different than how they used to be. Companies are able to tailor there products to more diverse audiences, in my banking app you can customize and change what is on the homepage so each person can pick and choose what is important to them instead of just having a basic layout. In my opinion the most important business processes involve adaptability and transparency. In todays society people want to know about the ethics and direction that a company has before making decisions. Personally I will never use Bank of America because they have a history of not taking care of customers and constant data breaches. Since we are able to see companies shortcomings extremely easy they need to prove they can keep up and treat employees correctly. Frequent reviews and innovations will allow companies to stay with the pace of the digital world and will help them provide good value that will keep customers returning.

Prompt: For your response posts, address the following: 1. Compare and contrast

Prompt: For your response posts, address the following:
1. Compare and contrast your answers to further everyone’s understanding of technology and the lens of history.
PEER POST # 1
Technology is increasingly prominent in shaping society in today’s rapidly evolving world. However, to truly understand the impact of technology on our lives, it’s essential to examine it through the lens of history. Tracing the historical roots of technological advancements and their societal implications can give us valuable insights into the complex relationship between technology and society.
A compelling example of how history enriches our understanding of technology’s role in society is the current debate surrounding privacy concerns in the era of digital surveillance. One recent news event that echoes historical parallels is the controversy surrounding government surveillance programs, such as the NSA’s mass collection of digital communications data.
A relevant historical counterpart to this issue can be found in the widespread surveillance practices employed by governments during the Cold War era, exemplified by programs like COINTELPRO in the United States. By examining past surveillance and its impact on society, we can draw parallels to contemporary debates and understand how technological advancements have amplified both the benefits and risks of surveillance.
News Link: https://www.eff.org/nsa-spying
Looking through the history lens helps us connect and analyze current and historical events by providing context and perspective. By understanding the historical evolution of technology and its societal implications, we can identify recurring patterns, anticipate potential consequences, and make more informed decisions about the role of technology in our lives.
Analyzing the relationship between history, culture, and technology has profound implications for various disciplines, professions, and personal experiences. In academia, studying this relationship fosters interdisciplinary approaches that bridge the gap between technology and the humanities, enabling scholars to explore the cultural, ethical, and social dimensions of technological innovation.
In professional settings, such as technology development or policy-making, an understanding of history and culture helps practitioners anticipate the societal impact of their work, mitigate potential risks, and design more inclusive and ethical solutions. Moreover, for individuals navigating the digital age, historical insights provide a deeper understanding of the forces shaping their technological landscape, empowering them to evaluate new technologies and advocate for positive societal change critically.
PEER POST # 2
Analyzing the role of technology through a historical lens can greatly enhance my understanding of its impact on society. By looking back at how technologies have developed and been adopted in the past, we can gain insights into the patterns and trends that shape our current technological landscape. Understanding the historical context of technological advancements can also help us appreciate the significance of these innovations and the challenges they have overcome.
One current event involving technology with a historical counterpart is the rise of cryptocurrencies, such as Bitcoin, and its impact on financial systems. The concept of digital currencies has historical roots in early attempts to create digital cash, such as eCash and DigiCash in the 1990s. By examining these past efforts, we can better understand the challenges and opportunities facing cryptocurrencies today, such as regulatory issues, security concerns, and adoption barriers.
Analyzing the relationship between history, culture, and technology can profoundly influence my cybersecurity and social engineering discipline. By understanding the historical context of security breaches and cyberattacks, I can better anticipate future threats and develop more effective security strategies. Additionally, considering the cultural implications of technology can help me design more user-friendly and culturally sensitive security solutions.