+1 (951) 902-6107 info@platinumressays.com

Nurses need to understand their influence on healthcare policy

  • a day ago
  • 11

Purpose of Assignment:

Nurses need to understand their influence on healthcare policy and the importance of engaging in legislation that impacts healthcare and nursing practice.

Course Competency:

· Debate current healthcare policy as it relates to nursing practice.

Scenario:

You are a nursing member of a healthcare organization on a policy subcommittee. The subcommittee has been asked to prepare an advocacy policy brief on a current policy that can be presented for facility adoption. As an active nurse advocate, it is important your voice is heard on a matter important to you as this is your chance to influence policy.

Instructions:

Prepare a policy brief. Identify and support your stance by addressing the following:

1. Explain your selected healthcare policy.

2. Address the background of the problem requiring the policy.

3. Address how the policy is relevant to your nursing practice or area of interest.

4. Identify if this policy impacts practice at the local, state and/or national level.

5. Evaluate how this policy could impact health care and further explain how this policy would influence nursing practice.

6. Provide evidence to support your stance on how you can implement the current policy.

7. Explain ways you can assist in implementing this policy as a nurse advocate.

Resources:

· For additional assistance on writing a policy brief, please read the Library Answer to: 

What is a policy brief?

· For additional assistance finding policies related to nursing, please visit the 
GovTrack website .

Insecure SCADA Protocols

A.  Describe the policies adopted as a result of your implemented project.

1.  Summarize how the solution improves cybersecurity decision-making.

B.  Describe how your solution meets the following cybersecurity assurance criteria:

•   promotes automation in cybersecurity

•   improves and modernizes security

•   implements industry-standard security tools and infrastructure or environment

C.  Explain how your solution addresses the following data collection and implementation elements:

•   collects digital evidence, including data for analysis or forensics

•   implements confidentiality, integrity, and availability

D.   Explain how your solution investigates and mitigates cybersecurity  incidents or crimes within the environment where the solution was  implemented.

E.  Describe the cybersecurity plans, standards, or procedures that were developed for the solution.

1.   Explain how the solution is aligned with cybersecurity initiatives or  regulatory compliance in the environment where the solution was  implemented.

2.  Summarize the applications, tools, installation guides, or user guides you developed in conjunction with the solution.

F.   Discuss the post-implementation environment, including the new systems  implemented, new processes developed, or network diagrams created  demonstrating the new infrastructure.

1.  Describe how the solution improved the security posture and efficiency of the organization.

2.   Analyze the new data (e.g., new reports, logs, processes in place)  collected, including how the solution will affect business processes.

3.   Describe the summative evaluation plan from Task 2, including the test  results and a plan of action to correct any weaknesses or deficiencies.

4.  Discuss post-implementation risks, including their likelihood, organizational impact, and mitigation.

5.  Explain how the security solution meets each of the project stakeholders' needs, including a description of the stakeholder needs as identified in Task 2.

G.  Describe the post-implementation maintenance plan for the solution.

H.  Provide one original artifact (e.g., security policy, procedure, network diagram) of the completed project.

I.  Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

DDN1: Capstone Topic Approval and Release Forms

Cybersecurity Graduate Capstone

Topic Approval Form

The purpose of this document is to help you clearly state the research question for this capstone project, as well as your project’s scope and timeline, to ensure these align with your degree emphasis. While you may not have a complete and realistic overview of your project at this time, the acceptability of your project for the purposes of this course cannot be accurately assessed without clearly defining each of these areas. Many students use a project they have already completed within the past two years. If you choose a finished project, you will write the proposal as if the project is not yet complete. Then, when you report on your project, use your complete after-implementation report.

If you have not yet started your project, this document can help ensure the scope is in the acceptable range for this capstone. An instructor must approve this form before you submit your capstone for evaluation. The task will not be evaluated without an instructor’s signature. The instructor may ask for additional information before approving the form.

Capstone Project Name: Evaluating Compensating Controls for Insecure SCADA Protocols

Project Topic: Assessing the security risks of legacy SCADA protocols and proposed mitigations

Summary of the Problem: Supervisory Control and Data Acquisition, otherwise known as SCADA, systems are the primary source of technology that manages sensitive and critical infrastructure such as power generation, oil/gas operations, water treatment, and many manufacturing applications. It is extremely common to see the use of legacy and insecure communication protocols such as Modbus and DNP3. When initially designed, security was not taken in to consideration so commonly lack authentication, encryption, and data integrity verification. If these protocols were used freely in modern systems, they would be prone to man-in-the-middle attacks, tampering, and even unintended command execution. Being a multibillion-dollar industry, this could be a prime target vector for malicious threat actors. Risk rapidly increases as interconnectedness and remote access become more and more prevalent. Across the U.S., there have been countless incidents involving SCADA systems including the Colonial Pipeline Ransomware Attack, Bowman Dam, and several water sector intrusions. It is extremely paramount that proper security measures are in place to mitigate, as much as possible, the possibility of disrupting our critical infrastructure.

Outline of a Technology-Supported Security Solution: Using network segmentation with the Purdue Model as a framework, deployment of industrial firewalls capable of deep packet inspection (NGFWs), intrusion detection systems, continuous monitoring, and implementing VPN solutions for remote access.

Context: Explain why the situation or question would benefit from your security solution. The dated protocols are an absolute requirement for some of these SCADA systems to functions correctly. The implementation of a new technology often isn’t immediately possible so compensating controls must be put in place to optimize the strength of cybersecurity. Since systems must be run and technology can’t be altered, defense in depth is best practice.

Stakeholders: Identify the project stakeholders. Stakeholders include SCADA operators, SCADA owners, SCADA engineers, IT, incident response teams, C-suite personnel, and risk management

Project Plan: Describe the project plan, scope, goals, and objectives. Project plan: Describe SCADA systems and where they are used, identify security weaknesses, risks associated with the weaknesses, introduce technologies and strategical compensating controls, describe defense in depth/how it reduces attack surface/status of residual risk

Methodology: Outline the project approach. Research current accepted strategies/best practices and examine case studies where failures have occurred. Use threat modeling to assess attack vectors specifically in ICS systems.

Implementation Plan: Identify the project phases. Collect data on SCADA protocols, identify vulnerabilities and impact to the CIA triad, threat model, discuss the most practical defense strategy, evaluate how well the mitigations reduce risk, document findings

Project Outcomes: List the key anticipated project outcomes and deliverables in 500 words or less. Expected outcomes from this capstone include a detailed analysis of security risks from SCADA/ICS systems, threat modeling with an emphasis on SCADA systems, best practice mitigation strategies, residual risk within specific SCADA systems, failures of the past, and a framework of what can be done by current systems without needing to completely replace technology/infrastructure

Sources: Include a list for all references and citations that support the summaries above and are used in-text and as outside sources. NIST SP 800-82, CISA ICS Advisories, MITRE ATT&CK framework for ICS systems, case studies relevant to SCADA systems, previous SCADA attacks

2

Compensating Controls for Insecure SCADA Protocols

A.  Describe the security problem under investigation.

1.   Explain the importance of the security problem, including background  information and the environment in which the problem exists.

2.   Provide documentation related to the security problem demonstrating  the need for a solution, referencing applicable white papers or  articles.

3.  Summarize each  root cause of the problem in the identified environment where the  security problem is situated, including supporting evidence, if  applicable.

B.  Summarize each internal and external project stakeholder role by including each of the following:

•   individual stakeholder implementation involvement and associated individual needs

•   how the security problem affects the stakeholder

•   stakeholder influence on the projects’ objectives and outcomes

C.   Describe the historical data used to support decision-making  throughout the project (e.g., vulnerability scans, penetration testing,  testing or validation scenarios, audit results, etc.).

D.  Provide a detailed explanation of the project requirements to implement the solution.

1.  Describe the industry-standard methodologies guiding the solution’s design and development.

2.  Describe the project launch, including all phases  of the rollout, the criteria used to determine the conclusion of  implementation, and the project management methodology for  implementation.

3.  Describe the likelihood of all implementation risks and their impact on the project.

E.  Describe the training approach, including the audience, delivery, content, and duration.

F.  Describe the required resources necessary to execute each project phase, and provide sources for all costs.

G.  Describe all final project deliverables associated with the design and development of the technology solution.

1.  Estimate the projected timeline, including each of the following:

•   each milestone and its duration

•   start and end dates

•   resources assigned to each task

H.  Detail the project evaluation approach that will be used to assess the project, addressing the following:

1.  Describe the formative and summative test plans for the solution, including all required procedures and tools.

2.   Describe the minimal acceptance criteria and key performance  indicators for project acceptance as they align with your formative and  summative test plans.

3.  Justify the test cases and scenarios in the environment of the security problem being addressed.

4.  Explain how you will analyze your results.

I.  Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

DDN1: Capstone Topic Approval and Release Forms

Cybersecurity Graduate Capstone

Topic Approval Form

The purpose of this document is to help you clearly state the research question for this capstone project, as well as your project’s scope and timeline, to ensure these align with your degree emphasis. While you may not have a complete and realistic overview of your project at this time, the acceptability of your project for the purposes of this course cannot be accurately assessed without clearly defining each of these areas. Many students use a project they have already completed within the past two years. If you choose a finished project, you will write the proposal as if the project is not yet complete. Then, when you report on your project, use your complete after-implementation report.

If you have not yet started your project, this document can help ensure the scope is in the acceptable range for this capstone. An instructor must approve this form before you submit your capstone for evaluation. The task will not be evaluated without an instructor’s signature. The instructor may ask for additional information before approving the form.

Capstone Project Name: Evaluating Compensating Controls for Insecure SCADA Protocols

Project Topic: Assessing the security risks of legacy SCADA protocols and proposed mitigations

Summary of the Problem: Supervisory Control and Data Acquisition, otherwise known as SCADA, systems are the primary source of technology that manages sensitive and critical infrastructure such as power generation, oil/gas operations, water treatment, and many manufacturing applications. It is extremely common to see the use of legacy and insecure communication protocols such as Modbus and DNP3. When initially designed, security was not taken in to consideration so commonly lack authentication, encryption, and data integrity verification. If these protocols were used freely in modern systems, they would be prone to man-in-the-middle attacks, tampering, and even unintended command execution. Being a multibillion-dollar industry, this could be a prime target vector for malicious threat actors. Risk rapidly increases as interconnectedness and remote access become more and more prevalent. Across the U.S., there have been countless incidents involving SCADA systems including the Colonial Pipeline Ransomware Attack, Bowman Dam, and several water sector intrusions. It is extremely paramount that proper security measures are in place to mitigate, as much as possible, the possibility of disrupting our critical infrastructure.

Outline of a Technology-Supported Security Solution: Using network segmentation with the Purdue Model as a framework, deployment of industrial firewalls capable of deep packet inspection (NGFWs), intrusion detection systems, continuous monitoring, and implementing VPN solutions for remote access.

Context: Explain why the situation or question would benefit from your security solution. The dated protocols are an absolute requirement for some of these SCADA systems to functions correctly. The implementation of a new technology often isn’t immediately possible so compensating controls must be put in place to optimize the strength of cybersecurity. Since systems must be run and technology can’t be altered, defense in depth is best practice.

Stakeholders: Identify the project stakeholders. Stakeholders include SCADA operators, SCADA owners, SCADA engineers, IT, incident response teams, C-suite personnel, and risk management

Project Plan: Describe the project plan, scope, goals, and objectives. Project plan: Describe SCADA systems and where they are used, identify security weaknesses, risks associated with the weaknesses, introduce technologies and strategical compensating controls, describe defense in depth/how it reduces attack surface/status of residual risk

Methodology: Outline the project approach. Research current accepted strategies/best practices and examine case studies where failures have occurred. Use threat modeling to assess attack vectors specifically in ICS systems.

Implementation Plan: Identify the project phases. Collect data on SCADA protocols, identify vulnerabilities and impact to the CIA triad, threat model, discuss the most practical defense strategy, evaluate how well the mitigations reduce risk, document findings

Project Outcomes: List the key anticipated project outcomes and deliverables in 500 words or less. Expected outcomes from this capstone include a detailed analysis of security risks from SCADA/ICS systems, threat modeling with an emphasis on SCADA systems, best practice mitigation strategies, residual risk within specific SCADA systems, failures of the past, and a framework of what can be done by current systems without needing to completely replace technology/infrastructure

Sources: Include a list for all references and citations that support the summaries above and are used in-text and as outside sources. NIST SP 800-82, CISA ICS Advisories, MITRE ATT&CK framework for ICS systems, case studies relevant to SCADA systems, previous SCADA attacks

2

Nursing

Present your analysis using the critical appraisal tool and the individual evidence tool in Appendix E1 and Appendix E2. Blank forms are provided in a template for the submission.

    Criminal Law

    300 words and 2 references

     

    Read the following scenario and and answer its questions: 

    Michelle has been angry with Charles for a very long time. She had threatened to kill Charles on a couple of occasions. One day, Michelle sees Charles standing on a street corner waiting to cross the street. There are several people standing around Charles, also waiting to cross. Michelle pulls out a gun and fires at Charles. The bullet grazes Charles' arm, injuring him. However, the same bullet strikes and kills Rachel, who was unknown to Michelle. 

    1) Considering the ideas and concepts covered this week, what crime or crimes has Michelle committed? Explain your reasoning, especially with regard to actus rea, mens rea and corpus delicti.

    2) Assume you are Michelle's defense attorney, what might be some valid defenses that would assert on her behalf? Justify your reasons why. 

      Unit 1 EDU 657 Discussion 2

       

      Unit 1: Discussion Question 2

      Discussion Questions: Post your initial responses to the discussion forum by Wednesday 11:59 p.m. and respond to the discussion of others by Saturday 11:59 p.m.

      • Unit 1: Discussion Question 2 (10 points)
        • Prompt: Discuss the theme of ‘Compliance’ v. Commitment in terms of continuous school improvement:
          • Why do some schools skip the first three components of the Framework mentioned in the text? How does that affect school improvement? How might schools benefit from being committed to continuous improvement relative to testing results – but also in leadership decisions in general? Be specific.
        • Requirements: Initial posts should be 250-300 words. Each response to a classmate must be at least 100 words. Three responses to classmates are required
        • Type: Threaded format

        Education Unit 1 EDU 657 Reading Assignments/ Discussion 1

         

        Unit 1: Discussion Question 1

        Discussion Questions: Post your initial responses to the discussion forum by Wednesday 11:59 p.m. and respond to the discussion of others by Saturday 11:59 p.m.

        Unit 1: Discussion Question 1 (10 points)

        • Prompt: Upon reviewing the Framework figures in Chapters 1 and 2 of your Bernhardt text, use the following prompt in your discussion:
          • Choose a theme that you believe your current situation (i.e. school) does well in addressing continuous school improvement; share that strength and why you believe it is being done well.
          • Choose a theme that you initially believe will be an area of challenge or may be missing in your current school setting; share that area of relative weakness and why it should receive more attention.
        • Requirements: Initial posts should be 250-300 words. Each response to a classmate must be at least 100 words. Three responses to classmates are required
        • Type: Threaded format

        file:///C:/Users/kcurry/Downloads/Wk%201%20Data-based%20decision-making%20for%20school%20improvement%20%20Research%20insights%20and%20gaps.pdf

          AD Week 2 Assignment 2

          This hands-on activity will familiarize you with the process of comparing bullets to each other using a comparison microscope.  The following instructions (below) will guide you through the steps to complete this assignment. 

          Firearms Comparison Exercise – INSTRUCTIONS (Read First)

          Crime Scene – Bullet Images

          Suspect Firearm #1

          Suspect Firearm #2

          Suspect Firearm #3

          ADVANCED CRIMINALISTICS – FSC 620

          FIREARMS COMPARISON EXERCISE

          CRIME SCENE BULLET

          ADVANCED CRIMINALISTICS – FSC 620

          FIREARMS COMPARISON EXERCISE

          CRIME SCENE BULLET

          ADVANCED CRIMINALISTICS – FSC 620

          FIREARMS COMPARISON EXERCISE

          CRIME SCENE BULLET

          ,

          ADVANCED CRIMINALISTICS – FSC 620

          FIREARMS COMPARISON EXERCISE

          SUSPECT FIREARM #1 (SMITH & WESSON 9MM)

          ADVANCED CRIMINALISTICS – FSC 620

          FIREARMS COMPARISON EXERCISE

          SUSPECT FIREARM #1 (SMITH & WESSON 9MM)

          ADVANCED CRIMINALISTICS – FSC 620

          FIREARMS COMPARISON EXERCISE

          SUSPECT FIREARM #1 (SMITH & WESSON 9MM)

          ,

          ADVANCED CRIMINALISTICS – FSC 620

          FIREARMS COMPARISON EXERCISE

          SUSPECT FIREARM #2 (RUGER 9MM)

          ADVANCED CRIMINALISTICS – FSC 620

          FIREARMS COMPARISON EXERCISE

          SUSPECT FIREARM #2 (RUGER 9MM)

          ADVANCED CRIMINALISTICS – FSC 620

          FIREARMS COMPARISON EXERCISE

          SUSPECT FIREARM #2 (RUGER 9MM)

          ,

          ADVANCED CRIMINALISTICS – FSC 620

          FIREARMS COMPARISON EXERCISE

          SUSPECT FIREARM #3 (BERETTA 9MM)

          ADVANCED CRIMINALISTICS – FSC 620

          FIREARMS COMPARISON EXERCISE

          SUSPECT FIREARM #3 (BERETTA 9MM)

          ADVANCED CRIMINALISTICS – FSC 620

          FIREARMS COMPARISON EXERCISE

          SUSPECT FIREARM #3 (BERETTA 9MM)

          Platinum Essays