Name of Centre: Richmond and Hillcroft Community College Learner achievement (please circle) NB: All learner achievement is provisional until confirmed at the AVA Awards Board. Level Achieved: L3...

1 answer below »
Need task 1 and task 2 completed please follow the assignment brief


Name of Centre: Richmond and Hillcroft Community College Learner achievement (please circle) NB: All learner achievement is provisional until confirmed at the AVA Awards Board. Level Achieved: L3 Achievement (Level 3 units only) P M D Resubmission? Y N Title of Access to HE Diploma: Computing Unit title(s): Cybersecurity Unit code(s): CBB308 Learner: Tutor/Assessor: Judy May Assignment Brief and Feedback form (Graded unit with single assignment) 2 Description of Assignment: Your assessor will provide guidance as to how to present evidence for this unit. All tasks must be completed. Task 1 (AC 1.1, 2.1, 3.1) – Written Assignment You have been employed by Aslan Ltd as a security analyst to ensure data and network security in their new medical data centre. The data centre stores medical records for access by researchers as well as storing patient’s data for central access by hospital staff. All retrieval of data will be via the Aslan network. In addition to this, staff at the centre will be able to compile research reports on request and supervise guest access in person. Aslan Ltd have asked you to create a Cybersecurity plan for the medical data centre which will need to contain: · A brief introduction of your plan · A summary of relevant cyber security legislation (at least 3 key areas) (3.1) · A section to explain and identify the types of internal and external risks to business IT systems from disregarding legislation and cyber security attacks (3.1) (1.1) · A section to explain the procedures required to secure business systems against cyberattacks this include the use of data (internal and external) and protection of hardware and software (2.1) · Specific measures to protect the IT system against threats (3.1) · A response and recovery plan (3.1) · A staff training policy which explains how to educate employees of the risks (3.1) Task 2 (AC 4.1) – Practical Skills Test For Aslan Ltd you will demonstrate that you will be able to use cyber security techniques to protect a business Provide evidence of the setup and use of at least 3 of the following which can protect data: · Backup (of software) · Encryption · System Updates · Anti-malware · Anti-virus · Wireless security · Complete Cisco Firewall Settings activity Date set: 11/05/21 Date for draft submission (if applicable): Date for final submission: 21/06/21 Extension date (if agreed): Signed by Tutor/Assessor to agree extension: Date submitted: Internal Moderation: Yes / No Date: Signed by internal moderator: ON TIME/LATE Learner declaration:  The explanations and evaluations in this work have been developed and written by me.  I have not submitted material copied from the Internet, text books or other sources in place of my own thinking and writing.  When I have referred to the work of others I have done so to discuss, comment on or argue their ideas.  I have kept quotation and paraphrasing to an absolute minimum and only to support points I have made.  I understand that referencing the names of authors whose ideas I have used without including my own interpretation of those ideas, does not meet the assessment criteria and cannot attract the Pass, Merit or Distinction grades.  I have not copied the work of my peers. Learner comments: (please use this space to comment on any aspect of the assignment when handing in your work) Signature: Date: TO THE LEARNER: Please attach this assignment brief to any written work you are handing in for assessment, or submit the brief as instructed. YOUR WORK CANNOT BE ASSESSED UNLESS YOU HAVE SIGNED AND SUBMITTED THIS FORM Level 3 Unit title: Cybersecurity Learning outcomes Assessment criteria This is what you will learn on the unit. This is what you must be able to demonstrate that you can do in your assignment in order to achieve the unit. The learner will: The learner can: Understand the types of security risks to business IT systems. Explain the types of security threats to business IT systems including internal and external risks. Understand how to secure Business IT systems against security threats. Explain the procedures required to secure business systems against cyberattacks. Know how to develop a Cyber security plan for a business Develop a detailed cyber security plan for a business including: · A summary of relevant cyber security legislation · Identifying the risks for the business · Measures to protect IT systems against threats · Development of a response and recovery plan · Explaining how to educate employees of the risks Be able to use cyber security techniques to protect a business Apply at least 3 techniques to protect data. Level 3 units only: Learners achieve a Pass if they meet all Level 3 Assessment Criteria for a unit. You will achieve a Merit or Distinction by meeting the following Grade Descriptors. Your tutor will give you feedback for all three grades. Grade Descriptor Merit The learner, learner’s work or performance Distinction (Choose one or more relevant grade components) GD1 Understanding of the subject · demonstrates a very good grasp of the relevant knowledge base · is generally informed by the major conventions and practices of the area of study · demonstrates very good understanding of the different perspectives or approaches associated with the area of study. · demonstrates an excellent grasp of the relevant knowledge base · is consistently informed by the major conventions and practices of the area of study · demonstrates excellent understanding of the different perspectives or approaches associated with the area of study GD3. Application of Skills generally applies appropriate (selected or given) a. skills b. techniques c. methods with very good · confidence · consistency · accuracy · efficiency consistently applies appropriate (selected or given) a. skills b. techniques c. methods with excellent · confidence · consistency · accuracy · efficiency Grade Descriptor Merit (Choose one or more relevant grade components) Distinction (Choose one or more relevant grade components) GD7: Quality taken as a whole, demonstrates a very good response to the demands of the brief/assignment taken as a whole, demonstrates an excellent response to the demands of the brief/assignment Grade Guidance: Learners must carefully read the guidance below which is linked to the components above MERIT: GD1To achieve Merit you will have acquired a good understanding of the knowledge base facts, models, perspectives, practices and conventions in relation to Cybersecurity with evident references to support this GD3: To achieve the higher grade of Merit, you should complete the tasks efficiently and accurately paying attention to detail and with little or no prompts from the assessor. To gain Merit you will follow instructions directly and also identify your own ability to autonomously access help resources using provided online resources. During the practical demonstration you will have a good level of preparation and be able to respond to questions about your work confidently. GD7: To achieve the higher grade of Merit, your work should be complete and accomplished in a logical organised manner. To gain Merit the report will be supported by clearly annotated evidence and referencing to a good amount of external research. The report will be technically accurate and demonstrate good quality written/oral communication. Documentation will be organised to a good degree and clear. DISTINCTION: GD1 To gain a Distinction you will also need to have acquired an excellent understanding of the knowledge base facts, models, perspectives, practices and conventions in relation to Cybersecurity with references to support this. GD3: To gain a Distinction you will follow instructions independently and carry out your own research to extend the provided resources to enable you to complete this assignment. During the practical demonstration you will have excellent levels of preparation and be able to respond to questions about your work with a great degree of clarity and articulation demonstrating your understanding of the subject. GD7: To gain a Distinction the report will be supported by clearly annotated evidence and extended referencing to substantial external research. The report will be highly accurate and demonstrate excellent presentation and high quality written/oral communication. Documentation will be well organised and clear to an external reader. Part A: Feedback on credit level AC no Credit achieved (L3) Location of evidence Tutor/Assessor comments on assessment criteria (the assessor may also indicate on the work itself where each AC is met) 1.1 2.1 3.1 4.1 Level achieved Tutor/Assessor’s signature: Date: Resubmission (if applicable) If any of the assessment criteria for this assignment have not been met at Level 3, a resubmission may be permitted. Resubmission must follow the QAA guidelines and be permitted only once. Requirements for resubmission/new Task set: Date Set: Date due: Date Submitted: Feedback on resubmission: Level achieved after resubmission: Tutor/Assessor’s signature: Date: Part B: Feedback on grading (Applicable only if all assessment criteria achieved at Level 3) Grade Descriptor Tutor/Assessor comments against grade descriptors Grade indicator (P/M/D) Please enter the final grade on page 1 based on this grade profile e.g. PPM=P GD1 Understanding of subject GD3. Application of Skills GD7: Quality Tutor/Assessor’s reason for final grade decision (if applicable): Areas for development (how will the learner be able to use and improve on what they have learnt on this unit and the skills that they have used in their further studies?)
Answered 1 days AfterJun 22, 2021

Answer To: Name of Centre: Richmond and Hillcroft Community College Learner achievement (please circle) NB: All...

Neha answered on Jun 23 2021
152 Votes
Task 1
Introduction
English report we will discuss about the cyber security issues and the new plan for the healthcare department. Every day in the healthcare department seems more hectic as compared with the previous one with the visiting patients, demanding physicians’ schedules, coordinating with the insurance companies, emergen
cy calls for medical billing and also handle the logistics and the record management. With the help of this report we will try to discuss the plan for cyber security and how it can be handled. We will discuss about the different risk which are present in this department and also the training policy for the employees.
Cyber Security Legislation
There is different legislation which are present cyber security for the healthcare. The first one is the stark Law. The initial motivator for starting the stark law was to prevent physician from self-referral. The primary concern was that the physicians were ordering unnecessary testing and they were referring patients to the testing centres with which they were having the financial relationship. The bill was intended to keep the cost of the health services down and it created the issue before the Internet and electronic medical record system was extensive to use. The stark law says that the healthcare facility cannot provide any services or the goods to the physician practice without charging the fair market value.
Another one was health insurance portability and the accountability act which was signed in 1996 by the former United States President Bill Clinton. The intention of this act was to protect the personally identifiable information and also to prevent the theft and fraud while it will allow the individuals to request the copy for their medical records. The final rule over the security standards was added to this act. The security rule was designed to give a compliment for the privacy route, and it was explaining how the electronic protected health information system can be managed and maintained.
The implementation of the electronic health records is fantastic for the interoperability but the speed at which the Healthcare is forced for implementing this system work creating the corners which needed to be cut. There are many health systems which are not able to afford this record and the security was not an agenda for the things to implement. There were time restrictions which resulted in the more imperative manner for electronic health record as compared to the appropriate method for implementing it with all the security controls. Another legislation is FDA which states that when they are having the non-binding agreements which are updating the plan needs to be submitted to the FDA to get the review. The presence and updates in the cyber security are one of the best defences which can be used by the healthcare specially when we are having the critical vulnerabilities like the blue keep and eternally blue which becomes commonplace.
Internal and external risks
The email can be used as the primary remove with which we can help communication in the healthcare organization. The information of different types can we create it forward transacted, maintenance and sent within the email system. The mailbox has the storage capacity which generally tends to grow with the individual storage for different types of the...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here