NR 543 W7 Security Assessment Assignment FAQs
NR 543 W7 Security Assessment Assignment FAQs
Over the years, the use of information technology in the healthcare sector has been on the rise as one of the technological advancements. Hospitals and other healthcare facilities have been applying information technology due to the benefits that come with it. For examples, the introduction of various software and information systems have helped to substantially lower the healthcare costs and improve patient services and safety (Avgerou & Walsham, 2017). On the other hand, security threats to these information systems have also been on the rise. While some are due to accidental actions, other threats come from deliberate actions, with the perpetrators having selfish interest to achieve. As such there is always a need to address these security threats for better outcomes
The adverse effects of security threats to information systems means that they should be prevented or eliminated. However, a successful identification depends on how well an assessment has been conducted (Abouelmehdi et al., 2018). Therefore, this presentation will focus on the practice management system. As part of the presentation, a discussion on and a description of the practice management system will be explored. In addition, this presentation will also identify common security threats to the practice management systems. As earlier indicated, the potential damage that can be caused by these security threats mean that they need to be addressed or mitigated. As such, evidence-based recommendations will be given as possible solutions.
Security Assessment
Graded Assignment #4
Guidelines & Grading Rubric
Purpose
The purpose of this assignment is to
- recognize threats to information and information-system security;
- identify safeguards to protect information and information-system security; and
- develop strategies to increase safeguards to protect information and information-system security.
Due Date: Submit by Sunday 11:59 p.m. MT at the end of Week 7.
Total Points: 125
Requirements
Select a software application, preferably an information system that you currently use in your work setting, to assess security threats.
You may personally test the application as well as observe the practices of other users.
- Identify system threats.
- Examine the organization’s information-system policies for threat management, noting strengths as well as potential problem areas, with rationales.
- Propose an evidence-based solution to each threat identified. In the event that you identify more than seven threats, prioritize the top seven and propose a solution for the three threats that you deem greatest.
If you do not currently have access to an automated system, then speak with your instructor to determine a mutually agreeable alternative.
Preparing the Assignment
- Required texts may be used as additional
- APA current edition is the expected format.
- The slide presentation (excluding the title and reference slides ) should not be longer than 20 slides.
- Ideas and information from professional sources must be cited correctly.
- Grammar, spelling, punctuation, and citations are consistent with formal academic writing.
- A minimum of 3 scholarly references is required.
| Category | Points | % | Description |
| Introduction | 20 | 15 | Introduction presents the topic of security assessment and identifies the sections of the presentation. |
| Threat identification | 33 | 26.4 | Provides detailed information on the information system assessed for security, threats identified, and potential impact of each threat. |
| Evidence-based recommendations | 33 | 26.4 | Provides evidence-based recommendations to resolve each threat identified. |
| Conclusions | 21 | 17.4 | Concluding statements summarize insights gained during the assignment. |
| APA format/Speaker Notes | 6 | 4.8 | Text, title page, and reference page(s) are consistent with APA format. Presentation shows speaker notes for each slide that would permit another presenter to take over |
| References and citations | 6 | 4.8 | Ideas and information from other sources are cited correctly. |
| Mechanics of writing/Presentation quality | 7 | 5 | Rules of grammar, spelling, word usage, and punctuation are consistent with formal written work. Maximum of 20 slides excluding title and reference slides. |
| 125 | 100 | A quality assignment will meet or exceed all of the above requirements. | |
Security Assessment: Graded Assignment #4: Grading Rubric
| Assignment Criteria | Exceptional
(100%) Outstanding or highest level of performance |
Exceeds
(88%) Very good or high level of performance |
Meets
(80%) Competent or satisfactory level of performance |
Needs Improvement
(38%) Poor or failing level of performance |
Developing
(0) Unsatisfactory level of performance |
|
| Content
Possible Points = 106 Points |
|
|
|
|||
| Introduction | 20 Points | 18 Points | 16 Points | 8 Points | 0 Points | |
| Introduction presents the topic of security assessment in information systems and names the key sections of the presentation. | Introduction presents the topic of security assessment in information systems and names some key sections of the presentation. | Introduction does not present the topic of security assessment in information systems OR does not name the key sections of the presentation. | Introduction does not present the topic of security assessment in information systems AND does not name the key sections of the presentation.
|
No introduction present
|
||
| Threat identification | 33 Points | 29 Points | 26 Points | 12 Points | 0 Points | |
| Clearly identifies threats along with potential impact of each. | Identifies threats and potential impact of each. | Identifies several threats but is not consistent in identifying potential impact associated with each. | Fails to clearly identify threats AND does not identify associated threat impact. | Does not identify threats. | ||
| Evidence-based recommendations | 33 Points | 29 Points | 26 Points | 12 Points | 0 Points | |
| Evidence-based recommendations to resolve each problem are presented clearly and discussed in detail. | Evidence-based recommendations to resolve each problem are presented and discussed. | Evidence-based recommendations to resolve each problem are presented but not discussed. | Recommendations to resolve each problem are present but evidence is not clearly presented or may be of poor quality and there is no discussion | No recommendations, evidence, or discussion are presented. | ||
| Conclusions | 21 Points | 19 Points | 17 Points | 8 Points | 0 Points | |
| Concluding statements clearly summarize insights gained during the assignment. | Concluding statements summarize insights gained during the assignment. | Concluding statements include a partial summary of the insights gained during the assignment. | Concluding statements do not summarize insights gained during the assignment. | Conclusion is not present. | ||
| Content Subtotal | _____of 106 Points | |||||
| Format
Possible Points = 19 Points |
||||||
| APA format/Speaker notes | 6 Points | 5 Points | 4 Points | 2 Points | 0 Points | |
| 0–3 errors in use of APA format in title page, body of the paper, references, or appendix.
Detailed speaker notes present on each slide |
4–6 errors in use of APA format in title page, body of the presentation, references, or appendix. Detailed speaker notes present on most slides. | 7–8 errors in use of APA format in title page, body of the presentation, references, or appendix. Speaker notes, when present, are inadequate to convey key information. | 9 errors in use of APA format in title page, body of the presentation, references, or appendix. Speaker notes, largely missing and are inadequate to convey key information. | 10 or more errors in use of APA format in title page, body of the presentation, references, or appendix and no speaker notes | ||
| References and citation | 6 Points | 5 Points | 4 Points | 2 Points | 0 Points | |
| At least 3 scholarly references are provided. Texts may be used as additional references
AND Ideas and information from other sources are cited correctly. |
Only 2 scholarly references are provided AND ideas and information from other sources are cited correctly. | Only 1 scholarly reference is provided
AND there are errors in the citation of ideas and information from other sources. |
There are multiple errors in the citation of ideas and information from other sources.
|
No scholarly references are provided.
|
||
| Mechanics of writing/Presentation quality | 6 Points | 5 Points | 4 Points | 2 Points | 0 Points | |
| 0–3 errors in spelling, grammar, punctuation, and other aspects of formal academic writing.
Slide total within maximum allowable number using graphics and space well. |
4–6 errors in spelling, grammar, punctuation, and other aspects of formal academic writing.
Meets slide restriction.
Most, not all, slides use space, key words, and graphics well. |
7–8 errors in spelling, grammar, punctuation, and other aspects of formal academic writing.
OR Does not meet slide restriction.
OR
Many slides use space, key words, graphics poorly. |
9 errors in spelling, grammar, punctuation, and other aspects of formal academic writing.
AND Does not meet slide restriction AND Poor use of space, key words, and graphics on most/all slides |
10 or more errors in spelling, grammar, punctuation, and other aspects of formal academic writing.
AND Does not meet slide restriction And slides poorly done or missing important content
|
||
| Format Subtotal | _____of 19 Points | |||||
| Total Points | _____of 125 Points | |||||
Security Assessment
Graded Assignment #4
Guidelines & Grading Rubric
Purpose
The purpose of this assignment is to
- recognize threats to information and information-system security;
- identify safeguards to protect information and information-system security; and
- develop strategies to increase safeguards to protect information and information-system security.
Due Date: Submit by Sunday 11:59 p.m. MT at the end of Week 7.
Total Points: 125
Requirements
Select a software application, preferably an information system that you currently use in your work setting, to assess security threats. You may personally test the application as well as observe the practices of other users.
- Identify system threats.
- Examine the organization’s information-system policies for threat management, noting strengths as well as potential problem areas, with rationales.
- Propose an evidence-based solution to each threat identified. In the event that you identify more than seven threats, prioritize the top seven and propose a solution for the three threats that you deem greatest.
If you do not currently have access to an automated system, then speak with your instructor to determine a mutually agreeable alternative.
Preparing the Assignment
- Required texts may be used as additional
- APA current edition is the expected format.
- The slide presentation (excluding the title and reference slides ) should not be longer than 20 slides.
- Ideas and information from professional sources must be cited correctly.
- Grammar, spelling, punctuation, and citations are consistent with formal academic writing.
- A minimum of 3 scholarly references is required.
| Category | Points | % | Description |
| Introduction | 20 | 15 | Introduction presents the topic of security assessment and identifies the sections of the presentation. |
| Threat identification | 33 | 26.4 | Provides detailed information on the information system assessed for security, threats identified, and potential impact of each threat. |
| Evidence-based recommendations | 33 | 26.4 | Provides evidence-based recommendations to resolve each threat identified. |
| Conclusions | 21 | 17.4 | Concluding statements summarize insights gained during the assignment. |
| APA format/Speaker Notes | 6 | 4.8 | Text, title page, and reference page(s) are consistent with APA format. Presentation shows speaker notes for each slide that would permit another presenter to take over |
| References and citations | 6 | 4.8 | Ideas and information from other sources are cited correctly. |
| Mechanics of writing/Presentation quality | 7 | 5 | Rules of grammar, spelling, word usage, and punctuation are consistent with formal written work. Maximum of 20 slides excluding title and reference slides. |
| 125 | 100 | A quality assignment will meet or exceed all of the above requirements. | |
Security Assessment: Graded Assignment #4: Grading Rubric
| Assignment Criteria | Exceptional
(100%) Outstanding or highest level of performance |
Exceeds
(88%) Very good or high level of performance |
Meets
(80%) Competent or satisfactory level of performance |
Needs Improvement
(38%) Poor or failing level of performance |
Developing
(0) Unsatisfactory level of performance |
|
| Content
Possible Points = 106 Points |
|
|
|
|||
| Introduction | 20 Points | 18 Points | 16 Points | 8 Points | 0 Points | |
| Introduction presents the topic of security assessment in information systems and names the key sections of the presentation. | Introduction presents the topic of security assessment in information systems and names some key sections of the presentation. | Introduction does not present the topic of security assessment in information systems OR does not name the key sections of the presentation. | Introduction does not present the topic of security assessment in information systems AND does not name the key sections of the presentation.
|
No introduction present
|
||
| Threat identification | 33 Points | 29 Points | 26 Points | 12 Points | 0 Points | |
| Clearly identifies threats along with potential impact of each. | Identifies threats and potential impact of each. | Identifies several threats but is not consistent in identifying potential impact associated with each. | Fails to clearly identify threats AND does not identify associated threat impact. | Does not identify threats. | ||
| Evidence-based recommendations | 33 Points | 29 Points | 26 Points | 12 Points | 0 Points | |
| Evidence-based recommendations to resolve each problem are presented clearly and discussed in detail. | Evidence-based recommendations to resolve each problem are presented and discussed. | Evidence-based recommendations to resolve each problem are presented but not discussed. | Recommendations to resolve each problem are present but evidence is not clearly presented or may be of poor quality and there is no discussion | No recommendations, evidence, or discussion are presented. | ||
| Conclusions | 21 Points | 19 Points | 17 Points | 8 Points | 0 Points | |
| Concluding statements clearly summarize insights gained during the assignment. | Concluding statements summarize insights gained during the assignment. | Concluding statements include a partial summary of the insights gained during the assignment. | Concluding statements do not summarize insights gained during the assignment. | Conclusion is not present. | ||
| Content Subtotal | _____of 106 Points | |||||
| Format
Possible Points = 19 Points |
||||||
| APA format/Speaker notes | 6 Points | 5 Points | 4 Points | 2 Points | 0 Points | |
| 0–3 errors in use of APA format in title page, body of the paper, references, or appendix.
Detailed speaker notes present on each slide |
4–6 errors in use of APA format in title page, body of the presentation, references, or appendix. Detailed speaker notes present on most slides. | 7–8 errors in use of APA format in title page, body of the presentation, references, or appendix. Speaker notes, when present, are inadequate to convey key information. | 9 errors in use of APA format in title page, body of the presentation, references, or appendix. Speaker notes, largely missing and are inadequate to convey key information. | 10 or more errors in use of APA format in title page, body of the presentation, references, or appendix and no speaker notes | ||
| References and citation | 6 Points | 5 Points | 4 Points | 2 Points | 0 Points | |
| At least 3 scholarly references are provided. Texts may be used as additional references
AND Ideas and information from other sources are cited correctly. |
Only 2 scholarly references are provided AND ideas and information from other sources are cited correctly. | Only 1 scholarly reference is provided
AND there are errors in the citation of ideas and information from other sources. |
There are multiple errors in the citation of ideas and information from other sources.
|
No scholarly references are provided.
|
||
| Mechanics of writing/Presentation quality | 6 Points | 5 Points | 4 Points | 2 Points | 0 Points | |
| 0–3 errors in spelling, grammar, punctuation, and other aspects of formal academic writing.
Slide total within maximum allowable number using graphics and space well. |
4–6 errors in spelling, grammar, punctuation, and other aspects of formal academic writing.
Meets slide restriction.
Most, not all, slides use space, key words, and graphics well. |
7–8 errors in spelling, grammar, punctuation, and other aspects of formal academic writing.
OR Does not meet slide restriction.
OR
Many slides use space, key words, graphics poorly. |
9 errors in spelling, grammar, punctuation, and other aspects of formal academic writing.
AND Does not meet slide restriction AND Poor use of space, key words, and graphics on most/all slides |
10 or more errors in spelling, grammar, punctuation, and other aspects of formal academic writing.
AND Does not meet slide restriction And slides poorly done or missing important content
|
||
| Format Subtotal | _____of 19 Points | |||||
| Total Points | _____of 125 Points | |||||
recognize threats to information and information-system security; identify safeguards to protect information and information-system security; and develop strategies to increase safeguards to protect information and information-system security. Requirements Select a software application, preferably an information system that you currently use in your work setting, to assess security threats. You may personally test the application as well as observe the practices of other users. Identify system threats. Examine the organization’s information-system policies for threat management, noting strengths as well as potential problem areas, with rationales. Propose an evidence-based solution to each threat identified. In the event that you identify more than seven threats, prioritize the top seven and propose a solution for the three threats that you deem greatest. If you do not currently have access to an automated system, then speak with your instructor to determine a mutually agreeable alternative.
Security Assessment Assignment FAQs
Q: I was wondering if I could use a completely different computerized system for this presentation than I used for earlier assignments. The system that I used did not seem to have many security issues.
A: Yes—by all means! While the original intent of the course design was to assess different aspects of a single system throughout the course, the faculty supports selections that will make the experience the most meaningful for the individual learner.
Q: One quick question regarding this last assignment. I know you would like us to do a form of assessment on a policy regarding an information system within the organization we work for. Are we to use the name of the organization, or should we mask it to preserve privacy?
A: That is a good question. I leave that to your discretion because, at present, it is for your eyes and mine only; but, if you prefer, you can describe the type of setting instead.
Q: Are we required to specifically cite, in text and reference list, the information we gather from the policy? Meaning, if we describe something from the policy, are we required to cite the policy in the body of the paper? I am assuming yes, but I was not completely sure. The reason why I ask is if we do not specifically state the name of the organization, it may be hard to cite the policy. Unless there is a way to correctly cite it without disclosing the identity of the organization.
A: That is an absolutely excellent question. While technically the answer is “yes”, I will be very happy for you to: note that the policy is from your facility, provide a summary rather than a word-for-word restatement of the entire policy, and state what you feel is an outstanding or deficient portion, and why.


Leave a Reply
Want to join the discussion?Feel free to contribute!