Thursday, October 31, 2019

Inter-Global Medicare Entrepreneurs Essay Example | Topics and Well Written Essays - 1000 words

Inter-Global Medicare Entrepreneurs - Essay Example Following this two-tire approach to the industry, the facility’s plan will thus be fragmented to offer effective homage to both the facilities and it hopes to benefit more from strategic location of its premises. In the health care sector, access to quality care together with timely response is important. The event of seeking medical attention is usually necessitated by acute need for urgency. An effectively planned institution offers solution to all these. The firm seeks to build its facility in a highly populated area such as in the residential settlements of a city. This is an idea formed by the understanding that in the health sector, humans form the sole target. Consequently, situating a facility closer to the people makes it easier for them to reach the facility without much hustle. People will always seek medical services no matter how far the facilities may be situated. However, it is also understandable that should the facility be closer to the target market and offer effective and efficient services, then it is likely that the business will receive high demand. Emergency response is another aspect of medical service dispensation that will determine the success of any business venture in the sector. Accidents of varied forms occur in the society on a day-to-day basis; these require quick responses to help save life. Inter Global Medicare understands this quite well and is set to create a wing purposely for accidents and emergencies; this wing will be differ in its structure. It will have wider doors with free standing stretcher to help wheel clients into theatres and treatment rooms. This wing will also be deliberately situated to face the road and be accorded an ample parking lot. Strategy of placement and the design of the wing are important factors in the determination of the wing’s success; easier access and timely response will only be guaranteed if the wing conforms to the building standards of emergency rooms. The facility will have adequately qualified doctors and nurses whose services will be hired on a contract basis. A contract is more beneficial especially to a new facility such as the one in question. This is specifically so to try to cushion it against the volatilities in its operation. Should it fail to sustain the estimated postulations in its operations, then the business can very comfortably close operations without incurring unnecessary losses. The doctors and nurses hired by the firm will be highly qualified personnel whose services will guarantee the quality standards set by the institution. There are different market segments; there are is a segment is attracted to a product or service based on its prices while there is the average citizen who will

Tuesday, October 29, 2019

Compulsory education Essay Example for Free

Compulsory education Essay Everyone has their own opinions on beliefs about school. Many say school is the only way for children to go, and many are against it. John Holt wrote an inspiring story called School Is Bad for Children that has an outlook on all aspects of school and why its not for children. He elaborates on all points to argue the fact that children shouldnt have to make life harder by going to school. Holt indicates certain points, but ones that stick out are the compulsory attendance policy and how it affects the child. Also, why we shouldnt have grades and exams and lastly, teachers and their poor pedagogy. The compulsory school attendance protected the childrens right to school under the parents permission; unless the parents decide to exploit their labor. Holt states that the compulsory attendance policy commands children to go to school. If children are forced to go to school than there is a better chance they wont like going. But, if the child had the option to go to school whenever they want, there us a better chance of them going; this being because school is where children meet new friends and communicate with others. And children need communication to get through life, like any other average person. Pedagogy is the art of the education and how a teacher conducts their class. Holt believes that poor pedagogy is another reason why school is bad for children. The art and styling of a teacher determines what the child will get and take out of the class. Many students are visual learners and some are auditory. Also, students are categorized between passive learners and active learners. Passive learners do what they need to, to pass the class and dont take in any of the information that is being distributed to them. But, active learners enjoy their time in class and engage in the lesson of the day. Teachers need to take it upon themselves to make the class interesting and vibrant for all students. They always said two heads are better than one. Holt feels as if children work better in groups and collaborative work. It makes everything in their school experience and life a little easier. Letting them work together and help each other out, they can help each other fix their mistakes. He explains how children are often the best teachers of other children. Letting children judge their own work gives them a sense of how much they can handle. According to Holt, if a child is corrected too many times, he will shut down and not speak at all. Correcting a student over and over again begins to make them feel like being wrong, uncertain and confused is a crime. He feels that a child should learn on his or her own but with the help of other children his age. If the child is stuck and just can’t get the answer right and needs help then that is when we lend a helping hand. Helping a child too much can also lead to them depending on someone to give them the answer. They won’t know the right answer and they’ll wait for the teacher or the expert to give them right answer. Holt has given up ideas on why the right way isn’t always the right thing to do. He wants to correct the school curriculum. He shows that education back in the day is different than education now. Although students need education, we’re going about it all wrong. Children need to learn physically and mentally and not always with the help of an expert. Children need to work together to become more advance and progress.

Sunday, October 27, 2019

Creating an IT Infrastructure Asset List

Creating an IT Infrastructure Asset List Abstract This document was created following Lab #1 titled Creating an IT Infrastructure Asses List and Identifying Where Privacy Data Resides in the laboratory manual that accompanies Legal Issues in Information Security. The lab focuses on creating an IT assets/inventory checklist organized within the seven domains of IT infrastructure. Identifying assets and applying classifications to each asset and explaining how data classification standard is linked to customer privacy data and security controls. In addition to answering questions presented in the lab, I will also identify 1 piece of hardware, software, or firmware and provide a technical, operational, and managerial control as defined in SP 800-53 R4. Keywords: Asset List, Privacy Data, SP 800-53 R4, Data Classification Creating an IT Asset List and Identifying Where Privacy Data Resides Organizations who handle customer data are increasingly being attacked by unscrupulous actors. One of the most sought after and stolen data is the organizations private customer data. The theft of this information can be used for a variety of reasons including identity theft. The protection of this important privacy data is best implemented with a well-planned strategy focused on minimizing the risk of improper disclosure. An asset is anything that contains value to the organization. Inventory is considered part of an asset. The purpose for identifying assets and inventory is to quantify them and provide insight of threats to each asset. This is accomplished by using Risk Management. Asset Identification is more than creating a list of the hardware and software in the computer, it must include the information, or data, that is processed on those computers (Kadel, 2004). Part of the identification should not only be what the assets are, but also who in the organization is responsible for the asset. Once an organization has identified all the assets they can assign a value, and classification to the asset. It is important to keep asset and inventory documentation updated when assets are added or removed from the organization. Asset classification is a process in which each asset identified is given a classification. The organizations security policy should make mention of relevant labels for classification. The lab manual offers the following three classifications Critical, Major, and Minor. One purpose of asset classification is to label an asset so it receives an appropriate level of protection. This label needs to be defined by upper level management but the IT and security staff is then responsible for implementing the required controls. It is important that senior management make this decision. Without data classification information protection decisions are being made every day at the discretion of security, system, and database administrators (Fowler, 2003). An organizations Web site would be classified as minor in this scenario because it is required for normal business functions and operations. The e-commerce server on the other hand would be considered critical because of what the asset does and the type of data it holds. In the lab manual, the web server Linux Server #2 is responsible for hosting the web site. Its function is required for normal business functions but does not contain any information to warrant it being classified as Major and does not represent an intellectual property asset or generate revenue. The e-commerce server on the other hand does generate revenue and is considered as an intellectual property asset. It also contains a customer database subset which contains information that needs to be protected. One reason customer privacy data would be classified as critical is to meet compliance guidelines. For example, the Gramm-Leach-Biley Act (GLBA) is a law that was passed in 1999 by congress. It requires financial institutions to protect Nonpublic Personal information. One section, known as the safeguards rule required federal bank regulatory agencies to issue security standards to organizations they regulate. If an organization does not follow the law, they can be penalized. The most compelling reason to classify information is to satisfy regulatory mandates. For example, the Gramm Leach Bliley and the Health Insurance Portability and Accountability Acts mandate information protection controls for financial and medical organizations, respectively. Although information classification is not specified as a required protection measure, it is implied by special handling requirements for sensitive, medical and financial information (Fowler, 2003). Intellectual property would be considered critical because it is intellectual property. Intellectual property by its nature should be handled as critical. Assume the following example, your organization makes the best widgets, because they are the best, consumers are willing to pay extra for your widgets. This is because they perform better, and last longer than all other widgets being offered by your competitors. If the competitors had access to your widgets design and manufacturing process, your company would lose its competitive advantage over that competitor. Consumers would no longer rate your widgets as the best, and would buy competitors widgets. Loss of this intellectual property would result in your organizations loss of their competitive advantage and revenue. Some security controls for HIPAA compliance is subcategory PR.DS-5: Protections against data leaks are implanted this can be mapped to the NIST SP 800-53 Rev. 4 controls of AC-4, AC-5, AC-6, PE-19, PS-3, PS-6, SC-7, SC-8, SC-13, SC-32, and SI-4 (HHS, 2016). AC-4 as defined by the NIST SP 800-53 Rev. 4 is referred to as information flow enforcement. Flow control restrictions include, for example, keeping export-controlled information from being transmitted in the clear to the Internet, blocking outside traffic that claims to be from within the same organization (NIST, 2003). A data classification standard helps with asset classification because it sets a framework for uniformly assignment of classification. This in turn gives the organization guidance on what assets are most important and need to have the highest security controls implemented. This is also beneficial because it gives members of the organization an easy way to determine how to handle such assets. Under the SI family of the NIST 800-53 Rev 4, you could implement SI-16 known as Memory Protection. You could implement data execution prevention, and address space layout randomization. You could also implement SI-7 known as Software, Firmware, and Information Integrity. The intent of this control is to protect against unauthorized changes to software, or firmware. This should be implemented using an integrity verification tool, that reports any inconsistencies or changes that were not approved. In the IA family, you could implement Identifier Management or IA-4. In this case the organization could user role based access to the server. If your user account does not have access to the resource, you will not be able to access it. I would recommend implicating two factor authentications for all users in the Mock infrastructure. This is important because one factor authentication such as something you know is considered a weak form of authentication. A solution such as a device that generates a random token that is also used would make the customer data much more secure. I would also implement a encrypted VPN solution for users that connect over to the ASA_student switch. A VPN uses a secure tunnel and all traffic through the tunnel will be encrypted. Last, I would make modifications to the network layout, the current layout does not allow for protective isolations. For example, the web server should be positioned in a DMZ and separated from the other components of the network. An organization can use risk analysis to help mitigate risks, threats, and liabilities. A risk assessment is used to document the identity of assets, threats, and how the organization wants to mitigate the risk. The overall purpose of risk analysis is to identify the assets within a company and their value so that you can identify threats against those assets (Clark, 2014). The risk assessment is broken in to separate phases. The first phase is the identification of assets in this phase the organization identifies the assets. The second phase, focuses on identification of threats to each asset. It is important to understand that most of the threats come from the fact that weaknesses, or vulnerabilities, exist in the assets of the business (Clark, 2014). The third phase known as the impact analysis phase. The goal of impact analysis is to identify what the result of the threat occurring would be on the business (Clark, 2014). The fourth phase known as threat prioritization. In this ph ase the organization needs to prioritize the threats against each asset. You must prioritize the threats based on their impact and probability of occurring (Clark, 2014). The fifth phase, known as mitigation is the step that in most cases implements a security control to lower the risk associated with a threat. This is the phase where a control is implemented to reduce the risks, threats and liabilities. The last and final step, is evaluation of residual risk. This is looking at the remaining threats and deciding if the organization has properly mitigated the risk. It is critical to express this residual risk to management and decide if you are willing to accept that residual risk or need to implement additional solutions (Clark, 2014). True, under both HIPAA and GLBA it calls for an implementation of IT security policies, standards, procedures, and guidelines. GLBA is comprised of the Privacy Rule, Safeguard Rule, and Pretexting Rule. The safe guards rule calls for each of the regulatory agencies to establish security standards. The FTC Safeguards Rule requires financial institutions to create a written information security program (Grama , 2015). HIPAA also calls for a similar implementation of security policies. 45 C.F.R. 164.316 calls for covered entities and business associates to, implement reasonable and appropriate policies and procedures to comply with the standards, implementation specifications, or other requirements of this subpart, taking into account those factors specified in statute 164.306(b)(2). It is important to identify where privacy data resides so that proper controls can be placed on that privacy data. This is also important so that management and staff know if any changes made to places where privacy data resides, they leave the protections planned for and implemented in place. This is important for those organizations who are required to follow legislation such as the GLBA and HIPPA. I choose the workstations in the user domain indicated in B in the lab manual. The operational control I choose is AC-9 which informs the user upon successful login, the last day and time of login. This is important because it give the user information relative to the last time their credentials were used. If a user was not at work or did not logon on the last logon shown they would be aware that their credentials have been used by someone else. The one technical control I choose for this piece of hardware is AU-3 which lays out the ground work in regards to audit records. This is important because unsuccessful, and successful logins will be recorded in the audit logs. The managerial control I choose to apply, is AC-2 which involves controls on account management. This is important for workstations to control access. It also defines who should have access to different resources and monitors the use of the information system accounts. References Fowler, S. (2003, February 28). Information Classification Who, Why and How. Retrieved March 11, 2017, from https://www.sans.org/reading-room/whitepapers/auditing/information-classification-who-846 Kadel, L. A. (2004, March 24). Designing and Implementing an Effective InformationSecurity Program: Protecting the Data Assets of Individuals, Small and Large Businesses. Retrieved March 11, 2017, from https://www.sans.org/reading room/whitepapers/hsoffice/designing-implementing-effective-information-security- program-protecting-data-assets-of-1398 Grama, J. L. (2015). Legal Issues in Information Security; Second Edition. Jones and Bartlett Learning. Clark, G.E. (2014). CompTIA Security+ Certification Study Guide (exam SY0-401). Mcgraw-Hill Education. Stewart, J. M. (2014). Network Security; Firewalls and Vpns: Second Edition. Jones and Bartlett Learning.

Friday, October 25, 2019

Freedom Summer comparisons with Era of Reconstruction :: essays research papers

Freedom Summer comparisons with Era of Reconstruction   Ã‚  Ã‚  Ã‚  Ã‚  With the end of the Civil war, many blacks felt that they would start reaping the benefits that had been denied from them for years. Being able to vote, own land, have a voice in political affairs were all goals that they felt were reachable. The era of Reconstruction was the â€Å"miracle† they had been searching for. But the South wasn’t going down without a fight and blacks would have to wait at least 100 years for Freedom Summer to arrive to receive the â€Å"miracle† they wanted. 100 years it took for equality to become more than just a word but a way of life for blacks. But they did enjoy some privileges that weren’t available to them.   Ã‚  Ã‚  Ã‚  Ã‚  Voting is one thing that was still around when Freedom Summer came; and when I say around I mean available. Let me explain†¦ during the Reconstruction era blacks were able to vote. But most of them didn’t due to a number of factors. A couple of these being: poll taxes, literacy tests, grandfather clauses, etc. And if that weren’t enough you still had the Klan that would destroy any black polling booth and/or shoot, intimidate, and kill any black person trying to vote; especially in Mississippi. In the months leading to Freedom Summer the same thing was going on except the rules had changed. These new rules, to keep the black community from voting, were the same as the old except very vague. In document 2 it details these new requirements to become a registered voter. Some of these requirements included being able to read and write a section of the new Constitution, are able to demonstrate a reasonable understanding of citizenship, make a sworn w ritten application for registration. So as you can see just like in Reconstruction, the voting power shifts back to the white race. Even if every black could read and write, who’s to say what a â€Å"reasonable† understanding of citizenship is.   Ã‚  Ã‚  Ã‚  Ã‚  Civil rights is another aspect that didn’t change. During Reconstruction, blacks were often seen not heard. It was usually the white man’s word over the black man’s word. Even if there was a crowd of people that saw what happened, unless they were black, they sided with the white man. But if these actions involved a white man getting hurt or killed for supporting the black community, that’s when the government stepped in to put and end to it.

Thursday, October 24, 2019

How does Technology affect Privacy? Essay

The emergence of science and technology generates a platform for global communication. Users of technology forget that the platforms generated to offer communication expose their private information. One simple search through social media sites pulls out detailed information of a person for observation. Online fraudulent activities continue to grow as malicious attackers use fake accounts to steal from unsuspecting victims. Technology simplifies business by providing organizations with e-commerce platforms to perform business. E-commerce gives convenience to the business and the buyer as they spend less but still provide quality services to their clients. The privacy of buyers decreases as malicious attackers hack into the sites (Schlag, 2013). A stranger can simply read an email if the owner of the email account forgets to logout. Subsequently, the user can access personal information of the user from the personal information profile. Other forms of technology such as secret cameras also affect the privacy of individuals. Someone might spy shoppers using cameras without the shoppers realizing that the privacy is exposed. Technology companies trace people through computers chips embedded in cars and clothes. The use of digital records in hospitals leaves private information of patients exposed to anyone who has access to the records. Credit card records and mobile phone bills leave personal information on receipts generated for confirmation purposes (Schlag, 2013). Any person who sees this information could use it to display confidential information. The use of technology should have regulations that detail the exposure people get while encountering different technological devices. Technology does affect the privacy of individuals as it makes it easier for anyone to access personal information of people in contact with the technological device. References Schlag, C. (2013). The New Privacy Battle: How the Expanding Use of Drones Continues to Erode Our Concept of Privacy and Privacy Rights. Journal of Technology, Law and Policy, 13(1), 1-22.

Wednesday, October 23, 2019

History of Chess

The precursors of chess originated in India during the Gupta Empire,[2][3][4][5] where its early form in the 6th century was known as chatura? ga, which translates as â€Å"four divisions (of the military)†: infantry, cavalry, elephantry, and chariotry, represented by the pieces that would evolve into the modern pawn, knight, bishop, and rook, respectively. [6] Chess was introduced to Persia from India and became a part of the princely or courtly education of Persian nobility. 7] In Sassanid Persia around 600 the name became chatrang, which subsequently evolved to shatranj, due to Arab Muslim’s lack of ch and ng native sounds,[8] and the rules were developed further. Players started calling â€Å"Shah! † (Persian for â€Å"King! â€Å") when attacking the opponent's king, and â€Å"Shah Mat! † (Persian for â€Å"the king is helpless† – see checkmate) when the king was attacked and could not escape from attack.These exclamations persisted in chess as it traveled to other lands. The game was taken up by the Muslim world after the Islamic conquest of Persia, with the pieces largely keeping their Persian names. The Moors of North Africa rendered Persian â€Å"shatranj† as sha? erej, which gave rise to the Spanish acedrex, axedrez and ajedrez; in Portuguese it became xadrez, and in Greek zatrikion, but in the rest of Europe it was replaced by versions of the Persian shah (â€Å"king†).Thus, the game came to be called ludus scacchorum or scacc(h)i in Latin, scacchi in Italian, escacs in Catalan, echecs in French (Old French eschecs); schaken in Dutch, Schach in German, szachy in Polish, sahs in Latvian, skak in Danish, sjakk in Norwegian, schack in Swedish, sakki in Finnish, sah in South Slavic languages, sakk in Hungarian and sah in Romanian; there are two theories about why this change happened: 1. From the exclamation â€Å"check† or â€Å"checkmate† as it was pronounced in various languages. 2.From the first chessmen known of in Western Europe (except Iberia and Greece) being ornamental chess kings brought in as curios by Muslim traders. The Mongols call the game shatar, and in Ethiopia it is called senterej, both evidently derived from shatranj. Chess spread directly from the Middle East to Russia, where chess became known as (shakhmaty, treated as a plural). The game reached Western Europe and Russia by at least three routes, the earliest being in the 9th century. By the year 1000 it had spread throughout Europe. [9] Introduced into the IberianPeninsula by the Moors in the 10th century, it was described in a famous 13th century manuscript covering shatranj, backgammon and dice named the Libro de los juegos. Chess spread throughout the world and many variants of the game soon began taking shape. [10] Buddhist pilgrims, Silk Road traders and others carried it to the Far East where it was transformed and assimilated into a game often played on the intersection of the li nes of the board rather than within the squares. [10][11] Chaturanga reached Europe through Persia, the Byzantine empire and the expanding Arabian empire. 12] Muslims carried chess to North Africa, Sicily, and Iberia by the 10th century. [10] The game was developed extensively in Europe, and by the late 15th century, it had survived a series of prohibitions and Christian Church sanctions to almost take the shape of the modern game. [13] Modern history saw reliable reference works,[14] competitive chess tournaments[15] and exciting new variants which added to the game's popularity,[15] further bolstered by reliable timing mechanisms (first introduced in 1861), effective rules[15] and charismatic players. [16]