For this discussion post, you will need to review the performance lab reports

 
For this discussion post, you will need to review the performance lab reports you completed in Weeks 2 and 6.
Please respond to the following in a post of 150 – 200 words:
For the lab from which you learned the most:
Describe the single most important lesson you learned from completing this lab.
Explain how you will apply this lesson in your current position or one you hope to obtain.
For the lab from which you learned the least:
Explain what you hoped to learn from completing this lab but didn’t learn.
Recommend how this lab could be modified or what it could be replaced with to better meet your needs.
Lab:      
7.4.2 Using OpenSSL to   Create a Public/Private Key Pair
In this lab, you will use OpenSSL to create a public/private key pair. OpenSSL is used for secure communication over the network. It works on the exchange of public keys and authentication by a private key.
Completion of 7.4.2 demonstrated the use of “openSSL” to make a “private key and public key pair.” Several instructions in the terminal program are executed as a result of this. Once the instructions are executed,   OpenSSL will encrypt the system traffic and “exchange private and public   keys.”

Respond to the following in a minimum of 175 words:  Describe security and ris

Respond to the following in a minimum of 175 words: 
Describe security and risks associated with a health care IT application.  
What are security standards and risks of not upholding the standards? 
Also reply to the responses below in 175 minimum as well.
Reply#1
 Ciara Robinson
Hello Class, 
The three major risk categories for MHealth apps are poor design, device vulnerabilities and user habits. When it comes to an app’s design, developers may not take the appropriate steps to ensure data security at all levels, including the device, the network and the data center. Cyber attacks: In the past few years, healthcare organizations have been increasingly under threat from external cyberattacks. Ransomware gangs are especially targeting healthcare groups, as well as criminals and disgruntled employees who take advantage of vulnerabilities in healthcare organizations’ digital networks. This is because it depends on the specific web application and its unique vulnerabilities. However, the most common application security threats according to the OWASP Top 10 are broken access control, cryptographic failures, and injection (including SQL injection and cross-site scripting. Here are some common information security threats and attacks: Malware: Malicious software designed to infiltrate, damage, or disrupt systems. Malware includes viruses, worms, Trojans, ransomware, and spyware. It can steal sensitive information, cause system downtime, or provide unauthorized access to attackers. 
Ignoring security rules makes it easy for hackers to attack systems and data. By being non-compliant, companies leave themselves wide open to data breaches, hacks, and cyber attacks. Security standards also allows the sharing of knowledge and best practices by helping to ensure common understanding of conditions, terms, and definitions, which can prevent costly errors. These published materials consist of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies. Some common consequences for noncompliance: Civil lawsuits and monetary damages. Fines and penalties imposed by government agencies. Criminal liability in cases of intentional or reckless violations.
Reply#2
 Kimberlee Martin
Good afternoon class,
Healthcare data security focuses on protecting the data, computers, and networks that healthcare providers and companies use. Data security in healthcare, in many ways revolves around HIPPA. There are couple of the most common risks factors associated with healthcare.
1.Use of outdated/legacy systems-outdated systems often have security vulnerabilities that can’t be patched
2. Email scams with malware-often have many employees, attackers send malware through email.
3. Internal employees, contractors, vendors, etc.- healthcare organizations often have a very diverse mix of people that work for them.
4.Unsecure of poor wireless network may healthcare organizations, such as hospitals and clinics may provide wireless access to patients and visitors.
5.Lack of strong password many organizations, employees may use weak passwords, such as these that they use for other accounts.
There are a few risks of not upholding security standards.
Data Breaches- Failure to adhere to security standards increases the risk of data breaches, leading to the unauthorized access, theft, or disclosure of sensitive information
Lawful consequences and the permissible indication of nonconformity cannot be taken lightly. Prohibited law can develop into dispute reported by patients or workers afflicted by belligerent 
Reputation Damage security incidents resulting from non-compliance can damage an organization reputation and erode customer trust and confidence.

 ***PLEASE SEE ATTACHED DOCUMENT TO COMPLETE*** · Define the best practice. · Di

 ***PLEASE SEE ATTACHED DOCUMENT TO COMPLETE***
· Define the best practice.
· Discuss the situation(s) that may arise in which you might consider implementing the best practice.
· Describe how the best practice could be implemented.
· Identify how you will determine whether the best practice has resulted in an improvement or has inversely affected collaboration.

  For this discussion post, you will need to review the performance lab reports

 
For this discussion post, you will need to review the performance lab reports you completed in Weeks 2 and 6.
Please respond to the following in a post of 150 – 200 words:
For the lab from which you learned the most:
Describe the single most important lesson you learned from completing this lab.
Explain how you will apply this lesson in your current position or one you hope to obtain.
For the lab from which you learned the least:
Explain what you hoped to learn from completing this lab but didn’t learn.
Recommend how this lab could be modified or what it could be replaced with to better meet your needs.
Lab:      
7.4.2 Using OpenSSL to   Create a Public/Private Key Pair
In this lab, you will use OpenSSL to create a public/private key pair. OpenSSL is used for secure communication over the network. It works on the exchange of public keys and authentication by a private key.
Completion of 7.4.2 demonstrated the use of “openSSL” to make a “private key and public key pair.” Several instructions in the terminal program are executed as a result of this. Once the instructions are executed,   OpenSSL will encrypt the system traffic and “exchange private and public   keys.”

Respond to the following in a minimum of 175 words:  Describe security and ris

Respond to the following in a minimum of 175 words: 
Describe security and risks associated with a health care IT application.  
What are security standards and risks of not upholding the standards? 
Also reply to the responses below in 175 minimum as well.
Reply#1
 Ciara Robinson
Hello Class, 
The three major risk categories for MHealth apps are poor design, device vulnerabilities and user habits. When it comes to an app’s design, developers may not take the appropriate steps to ensure data security at all levels, including the device, the network and the data center. Cyber attacks: In the past few years, healthcare organizations have been increasingly under threat from external cyberattacks. Ransomware gangs are especially targeting healthcare groups, as well as criminals and disgruntled employees who take advantage of vulnerabilities in healthcare organizations’ digital networks. This is because it depends on the specific web application and its unique vulnerabilities. However, the most common application security threats according to the OWASP Top 10 are broken access control, cryptographic failures, and injection (including SQL injection and cross-site scripting. Here are some common information security threats and attacks: Malware: Malicious software designed to infiltrate, damage, or disrupt systems. Malware includes viruses, worms, Trojans, ransomware, and spyware. It can steal sensitive information, cause system downtime, or provide unauthorized access to attackers. 
Ignoring security rules makes it easy for hackers to attack systems and data. By being non-compliant, companies leave themselves wide open to data breaches, hacks, and cyber attacks. Security standards also allows the sharing of knowledge and best practices by helping to ensure common understanding of conditions, terms, and definitions, which can prevent costly errors. These published materials consist of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies. Some common consequences for noncompliance: Civil lawsuits and monetary damages. Fines and penalties imposed by government agencies. Criminal liability in cases of intentional or reckless violations.
Reply#2
 Kimberlee Martin
Good afternoon class,
Healthcare data security focuses on protecting the data, computers, and networks that healthcare providers and companies use. Data security in healthcare, in many ways revolves around HIPPA. There are couple of the most common risks factors associated with healthcare.
1.Use of outdated/legacy systems-outdated systems often have security vulnerabilities that can’t be patched
2. Email scams with malware-often have many employees, attackers send malware through email.
3. Internal employees, contractors, vendors, etc.- healthcare organizations often have a very diverse mix of people that work for them.
4.Unsecure of poor wireless network may healthcare organizations, such as hospitals and clinics may provide wireless access to patients and visitors.
5.Lack of strong password many organizations, employees may use weak passwords, such as these that they use for other accounts.
There are a few risks of not upholding security standards.
Data Breaches- Failure to adhere to security standards increases the risk of data breaches, leading to the unauthorized access, theft, or disclosure of sensitive information
Lawful consequences and the permissible indication of nonconformity cannot be taken lightly. Prohibited law can develop into dispute reported by patients or workers afflicted by belligerent 
Reputation Damage security incidents resulting from non-compliance can damage an organization reputation and erode customer trust and confidence.

Lab 02 | File and Memory Management Part 1: File Management in Linux OSLinks to

Lab 02 | File and Memory Management
Part 1: File Management in Linux OSLinks to an external site.
Part 2: Memory Management in Linux OSLinks to an external site.
Paste only screenshots and answers to the questions on one document
Convert it to PDF
Turn in ONE PDF with all of your screenshots and answers to Part 1 and 2.

Discuss the Privacy issues related to the use of Biometric devices. Fully addres

Discuss the Privacy issues related to the use of Biometric devices.
Fully address the question(s) in this discussion; provide valid rationale or a citation for your choices; and respond to at least two other students’ views.
Initial post should be at least 350 words in length. Each reply post should be at least 150 words in length.

Many organizations have adopted cloud computing. In this assignment, you will re

Many organizations have adopted cloud computing. In this assignment, you will research cloud computing and explore its advantages and disadvantages. You will also consider best practices for adopting cloud computing, selecting a particular cloud computing service model, and assessing and mitigating security risks.
For your research, please consult Chapters 13 and 14 of your textbook and these articles:
“A Brief Review: Security Issues in Cloud Computing and Their Solutions.”
“Cloud Computing Security Risks: Identification and Assessment.”
“Cloud Computing – Recent Trends in Information Technology.”
Note: If you wish you may consult additional articles, but this is not required.
Requirements
Specifically, you will write a 3 page paper in which you:
Outline the planning process that needs to be in place before adopting cloud computing.

Be sure to identify the stakeholders who need to be involved and the discussions that need to take place.

Evaluate the advantages and disadvantages of cloud computing.
Describe the methodology you would use to select a cloud computing service model.
Review the security risks and mitigation activities that need to take place before adopting cloud computing.
Go to Basic Search: Strayer University Online Library to locate and integrate into the assignment at least three quality, peer-reviewed academic resources, written within the past five years.

Include your textbook as one of your resources.
Wikipedia and similar websites do not qualify as quality resources.

Discuss the Privacy issues related to the use of Biometric devices. Fully addres

Discuss the Privacy issues related to the use of Biometric devices.
Fully address the question(s) in this discussion; provide valid rationale or a citation for your choices; and respond to at least two other students’ views.
Initial post should be at least 350 words in length. Each reply post should be at least 150 words in length.