(ENDING OF PREVIOUS WK)Securing and protecting information in a system will the primary role of maintaining a healthy information system environment characterized by high levels of security (Whitman & Mattord, 2011). For instance, it will make it somewhat easier for Inova hospital to adopt new IT technologies related improved data access and security, such as virtualization and the cloud. of information can also facilitate the implementation of highly-secure smart card foundations in organizations, particularly in a manner that improves risk management and more importantly compliance with new regulatory or legislation requirements. In the case of Inova, minimization of confidentiality and integrity attacks on the organizations web-based EHR would be the important role played by securing and protecting information when it comes to the realization of a healthy network environment.
To meet the information security needs raised in the paper, there are several systems and devices that can provide security services. For example, or systems like AES (Advanced Encryption Standard) can be used to protect some of the data stored in the organizations database. However, the most appropriate cryptographic technique ought to be chosen for . Its also important to include heuristics and analytical tools to help eliminate the problem of accidental disclosure of information by the authorized users or abnormal patterns of system behavior that might arise within Inova Fairfax Hospitals web based HER system. These tools include highly granular data integrity devices like TripWire, honeypots or honeynets. Other systems include an antivirus that cannot be easily disabled (Al-Ahmad & Mohammad, 2013).
Its impossible to disregard the importance of information system security, but the building block of a good security approach ought to be founded on the existence of a good data security strategy and effective implementation. An organization like Inova ought to mitigate risks in order to prevent any incidences of data manipulation or loss, which affect its reputation, and hence its ability to offer high quality services to consumers.
NOTE: This is part three of a three-part assignment. In this final version it is expected that adjustments will be made based on the feedback provided in Weeks 2 and 3. Be sure that the entire paper is cohesive and flows from section to section accordingly.
Using the paper in Weeks 2 and 3 add an additional 3-to 4-pages describing the importance of policies and standards for maintaining information systems security.
- Include a discussion of the role employees–and others working for the organization–play in this effort.
- Examine the different levels of security and how an organization can provide the proper level of effort to meet each information security need and how this relates to what is in an organization’s information security policy.
- Describe how the organization’s policies and standards would be administered to meet the key requirements of accepted industry standards.
- Discuss how organizations manage the different levels of security required for differing levels of personnel.