Expert answer:Comments: The paper flowed much better, but the wording throughout the whole paper appears to be by other people. You may cut and paste from other sources, but you need to appropriately credit the authors either through direct quotes or paraphrasing. Look up how to properly credit direct quotes vs paraphrasing. If you do not apply the proper credit it is plagiarism, which comes with serious consequences. In addition, your paper may not be just direct quotes. The paper must be 75-80% in your own words, and it appears that the paper is mostly direct quotes, which is also considered plagiarism.Keeping the format and the information, rewrite using your own words.*****Paper attached
profcomm_r1_draft_team3proj4_3to5_johnson.docx
Unformatted Attachment Preview
Running Head: SCH KMS VIRTUAL SECURITY
IS THIS PAGE LEFT BLANK FOR A REASON – POSSIBLE A
COVER PAGE THAT NEEDS FILLING OUT???
SCH KMS Virtual Security
1
Superior Health Care Key Management Plan
The projects purpose address security concerns associated with data flow and information
access to Personal/Protecting Identifiable Information (PII). Superior Health Care Key
Management Plan (KMP) web-based Electronic Health Records Management (ERM) system
cybersecurity posture. Protecting (Erika McCallister, 2010, pp. 2-59) the confidentiality,
integrity and availability of networking transmissions, including traversing data, is paramount to
the sustainability of organizational operations. We start to address this concern with some
understanding of the key components of SHC’s KMP.
Components (Rename to anything you want)
NEED A LEAD IN STATEMENT (while keeping in mind that this section is to, in some way,
address the security concerns you mentioned above.)
The components of the SHC Key Management System (KMS) includes:
•
a client/server web-based Electronic Health Records Management (ERM) Information
Technology (IT) system.
•
rhe SHC Key Management System (KMS) healthcare business process facilitating
client/server synchronization data flow communications transmitting Personal/Protecting
Identifiable Information utilizing virtual platforms, and includes
•
healthcare security software and solutions for the Electronic Health Records
Management (ERM) system.
The Electronic Health Records Management (ERM) system provides solutions for data-at-rest
and data-in-transit of Health Records (HR), Medical Record (EMR), financial management and
patient/physical interactions.
SCH KMS Virtual Security
2
Apache Hadoop Client/Server Synchronizationfr
The Apache Hadoop (Apache, 2017) is an open-source web-based client/server software
with capabilities of p-synchronizing extensive amounts of information. Functionally utilized for
its distributed computing processing, the library framework ensures that the cloud-based
infrastructure-as-a-service delivers systems reliability and information availability within a
scalable environment. The Apache Hadoop hosting virtual environments require access controls
either role based or identity-based capabilities enhancing virtualization. The scalable open
software complements Superior Health Care key management plans web-based Electronic Health
Records Management (ERM) system while adhering to Health Insurance Portability and
Accountability Act (HIPPA) requirements. The Apache Hadoop provides speed and efficiency
while securing logical components needed within virtual environments.
SHC Key Management System (KMS)
The SHC Key Management System (KMS) designs information security parameters
incorporating tools and technologies that effectively and efficiently protect Personal/Protect
Identifiable Information (PII). The functional management system applies Common Access
Cards (CAC) and cryptographic algorithms to secure electronic health records accessed,
transmitted and/or stored by way of mobile device communications. Benefits to the SHC Key
Management System ensures confidentiality of information, the integrity of transmitting
information as a process and availability of data through preferred linked services. Security
Assertion Markup Language (SAML) will provide secure authentication tokens as a viable
process functioning at the enterprise levels of security implementations to control access to
information.
SCH KMS Virtual Security
3
Health Care Key Management Plan Functional Analysis and Design
Cybersecurity-as-a-service (NIST, 2014, pp. 1-41) compliments information technology
industry national standards for securing traversing data within critical infrastructures. Network
hardening through OS-level virtualization allows the distributed file system reduce the threat,
risk, and vulnerabilities associated with client and server services. The risk of data breeches
proliferates networking infrastructures making application continuity and service availability
have become paramount security parameters when operating the virtual network. Automated
access controls (Tatu Ylonen, 2015, p. 5) through network security utilities such as applying
secure shell protocol (SSH). Implementing access control techniques, strategies and processes
also ensure that server virtualization increases the security and privacy of personally identifiable
information, a HIPAA compliance requirement.
Health Care Key Management Plan Access Control
Administrative controls such as lease privileges restrict access to confidential data.
Protecting the PKI public/private keys and certificate environment from external threats affecting
internal processes requires monitoring and limiting undesirable network traffic. User
authentication and authorization processes significantly reduce networking interrupting related to
data breaches, the spread of malware or the infection of Trojans. Hardware security strategies
include installing and configuring intrusion detection systems, intrusion prevention systems, and
firewalls. Vulnerabilities associated with virtual environment includes unethical penetration and
breach of data, both create significant interruptions. VR machines fail when the host server
becomes compromised by vulnerabilities.
SCH KMS Virtual Security
4
Public key infrastructure (PKI) Securing Data Exchange
Benefits and features of this project include utilizing Electronic Med Records (ERM)
Web and Database development, a cost-effective solution for building a multi-tier network
topology while maximizes efficiency while reducing operational expenditures. Operations
include a cost-effective solution in which one physical machine will facilitate operational
functions for a virtualized network. Benefits of installing a virtualized database with SHC
network would provide e unlimited virtual machines within a limitless environment.
Virtual networks enable distributed security features enforcing security policies. Mobile
cloud computing expands networking capabilities, increase access to data storage and frees
memory while increasing operational speeds. Cloud computing facilitates data-sharing
applications, enhanced collaboration through remote-access and facilitates data in transit. The
main restriction includes processing operational resources and transmitting large data to devices
with minimal memory.
Encrypted Data Flow Requirements
Data-at-rest and data-in-transit encryption using asymmetric and symmetric encryption
and strong authentication with a lightweight automated directory access protocol processes. Key
escrow server access controls ensures PKI public/private keys and certificate containers issues
and identify real users. Description of each security concept includes SHC Key Management
System (KMS) encrypting traversing data with industry standards such as the Rivest, Shamir and
Adleman (RSA) algorithm, advanced encryption standard with 128-bit keys (AES-128) and hash
functions supporting digital signatures. Public key Infrastructure (PKI) enhanced with RSA
token or symmetric master keys identify and authenticate digital signatures and hashed keys.
SCH KMS Virtual Security
5
Public Key Infrastructure (PKI) in Cloud Computing
The benefits and features of implementing the ERM system and its security component
supporting Key Management Plan (KMP) designed to meet SHC healthcare’s cybersecurity
mission and forward facing posture. The Health Insurance Portability and Accountability Act of
1996 HIPPA compliant. System design specifications include network virtualization
incorporating data-in-transit encryption using asymmetric and symmetric encryption and strong
authentication.
The system design specifications for a data-in-transit protection model requires
enterprise-level security to ensure confidentiality of Personally Identifiable Information (PII).
Automating security and application sharing within a distributed network ensures web-developed
applications such as Electronic Med Records (ERM) Web and Database development
accompanies a Public Key Infrastructure (PKI). Implementing a Public Key Infrastructure (PKI)
within a cloud-based environment is the framework chosen for data in transit security. Security
policies using asymmetric encryption, escrowed keys and Crypto period for all PKI
public/private keys and certificates increase confidentiality, integrity, and availability of data in
transit.
Conclusion
Health Insurance Portability and Accountability Act (HIPAA) is a predominant security
rule implementations in the operational environment of SHC Key Management System (KMS).
Network administrators may also consider utilizing encryption methods and strategies associated
with networking security within the platform virtualization software packages as an effectively
accomplishes data security, configuring Data Recovery Agent (DRA) and identifying
Encrypting File System (EFS). SHC Key Management System (KMS) public key infrastructure
SCH KMS Virtual Security
6
(PKI) and advancing security measurement also provides industrial competitiveness through
innovation in technology.
References
Apache. (2017, November 19th). What Is Apache Hadoop? Retrieved from Apache Hadoop:
http://hadoop.apache.org/
Erika McCallister, T. G. (2010). NIST Special Publication 800-122 Guide to Protecting the
Confidentiality of Personally Identifiable Information (PII). Gaithersburg, MD: National
Institute of Standards and Technology.
NIST. (2014). Framework for Improving Critical Infrastructure Cybersecurity. Gaithersburg,
MD: National Institute of Standards and Technology.
STAFF, V. (2015, November 4th). The Virtues of Network Virtualization. Retrieved from
VMmare: https://www.vmware.com/ciovantage/article/the-virtues-of-networkvirtualization
Tatu Ylonen, P. T. (2015). Security of Interactive and Automated Access Management Using
Secure Shell (SSH). Gaithersburg, MD: National Institute of Standards and Technology.
Retrieved from National Institute of Standards and Technology.
…
Purchase answer to see full
attachment
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more