4-1 Practice Activity Risk and Planning for Crisis
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
405
Subject
Finance
Date
Feb 20, 2024
Type
docx
Pages
3
Uploaded by robintrottier
4-1 Practice Activity: Risk and Planning for Crisis
Security Management CJ 405
Robin Trottier
Southern New Hampshire University
July 23, 2023
Identify at least three critical assets hospitals are concerned about protecting.
Three critical assets that a hospital would be concerned about protecting would be the pharmaceutical items, patient records, and critical hospital equipment.
Describe what security issues hospitals are most concerned about and why.
Security issues that hospitals would be the most concerned about would be issues like breaches of patient or hospital data, active attacker/shooter situations as hospitals are soft targets with high population and lower means of protection, and infant abductions.
Describe potential threats and liabilities hospitals face both internally and externally.
Internal threats and liabilities
: Some internal threats that hospitals face internally are, for example, employee misconduct, breaches of sensitive data, and inadequate staff numbers. Employee misconduct is a threat because there are policies and procedures that if not followed could lead to legal issues for the hospital. If patient data is breached this could leave
the hospital in legal trouble as well. Inadequate staffing levels would be more of a liability because if there are not enough staff on duty at a hospital then there could be significant errors that take place.
External threats and liabilities
: Some external threats that hospitals face are, for example, natural disasters, the supply chain of healthcare supplies or medicine being interrupted, and attackers/assailants targeting hospitals. Natural disasters can cause massive damage to communities and then hospitals will be overrun by people that need care, when this happens
certain security measures could be overlooked causing liabilities to form. When the healthcare supply chain is stressed or interrupted this can cause threats to individuals that need specific medication or supplies to not be able to have the items that they need to survive. Active shooters/attackers are an unpredictable variable that can happen anywhere. Hospitals, however, are a prime target for these individuals as hospitals are full of people that
are unable to protect themselves, making a hospital a very soft target to be attacked.
Describe a fundamental approach to completing a risk assessment for any organization.
A fundamental approach to completing a risk assessment that would work for any organization would be to first identify the risks
, then you would analyze the risks
, after that
you would evaluate the risks
, then you would implement controls
, and finally you would monitor and review the process
. These steps will work to create a risk assessment for whatever organization that you need to provide an assessment of.
Describe how you would keep your risk assessment
current and relevant
.
To keep your risk assessment current and relevant you need to continuously monitor it which means you need to review how it is doing and update the process as needed. Depending on what kind of organization it is that you are running you could do these reviews annually or if you have an organization that has higher risks you could do it bi-annually. The item that would most likely be changed would be the employee training/education as you need to keep your employees up to date with any changed that are made to policies and procedures to to changes in the risk assessment.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
7. 41 Develop a context diagram and level-0 diagram for the hospital pharmacy system described in the following narrative. If you discover that the narrative is incomplete, make up reasonable explanations to complete the story. Supply these extra explanations along with the diagrams. The pharmacy at Mercy Hospital fills medical prescriptions for all hospital patients and distributes these medications to the nurse stations responsible for the patients’ care. Prescriptions are written by doctors and sent to the pharmacy. A pharmacy technician reviews each prescription and sends it to the appropriate pharmacy station. Prescriptions for drugs that must be formulated (made on-site) are sent to the lab station, prescriptions for off-the-shelf drugs are sent to the shelving station, and prescriptions for narcotics are sent to the secure station. At each station, a pharmacist reviews the order, checks the patient’s file to determine the appropriateness of the prescription, and fills the order…
arrow_forward
Q.Explain how the disaggregation of information could be helpful to RRC’s intention to continuously improve its services.
arrow_forward
?
arrow_forward
answer
arrow_forward
An IS auditor conducting a compliance audit of a healthcare organization operating an online system that contains sensitive health care information. Which of the following should an IS auditor first review?
() IT infrastructure and IS department organization chart
() legal and regulatory requirements regarding data privacy
() adherence to organization policies and procedures
() network diagram and firewall rules surrounding the online system
arrow_forward
step by step solution with explanation
arrow_forward
ket system
My Dispense
Academic Calendar
Clear my choice
My courses (7)
Essay Question: (LO# 2)
One of the Components of Internal Control is the control activities; which are the policies and
procedures that help ensure that necessary actions are taken to address risks to the achievement
of the entity's objectives. What are the most important control activities (Explain of each of these
control activities)?
Paragraph
B
Path: p
Which of the following is not a likely source of information to assess fraud risks?
く
&
8 A
6 7
7 V
1O
て (E
3.
Y
を
IT
K
J
H.
G
J
く
N !MS
arrow_forward
Name and describe the seven (7) common threats (Step One-Identify Threats) that CPAs in public practice should be alert to:
arrow_forward
ning Objective 1
S8-1 Defining internal control
Internal controls are designed to safeguard assets, encourage employees to follow
company policies, promote operational efficiency, and ensure accurate accounting
records.
Requirements
1. Which objective do you think is most important?
2. Which objective do you think the internal controls must accomplish for the busi-
ness to survive? Give your reason.
arrow_forward
Introduction: This week you were introduced to the occupation of epidemiology along with their methods. The methods used are determined by the natural history of the disease in question, funding, ethical challenges, and threat to community spread. Each disease has its own unique application of epidemiological methods and timelines.
Initial Post: As you are looking at the epidemiological approach to emergent public health issues, why do you think public health might make mistakes? Think about the study designs, data collection methods, sources of data, or the disease investigation process in your response.
Classmate Responses: Each discussion board you will have the requirement to respond to at least 2 classmates as specifically detailed below.
Classmate Response #1: Find a student who identified a different potential source of a mistake that a public health practitioner might make. Reflect on if this could happen with your specific public health issue.
Classmate Response #2: Find a…
arrow_forward
Preventing Cybercrime and Identity Theft
Cybercrime and identity theft have become a growing problem in all aspects of society in recent years. Locate an article about cybercrime or identity theft in an organization from one of the types we have discussed in the course (government, not-for-profit organization, healthcare organization, or college or university). Summarize the case of cybercrime or identity theft in your article. What are the risks of these types of crimes to their organization? How can auditing and internal controls help prevent a company from falling prey to cybercrime?
Then, review the examples shared by your peers. What strategies related to auditing and internal controls could you suggest for the organizations they shared?
arrow_forward
Using the following table as a guide, describe for each function
A risk (an event or action that will cause the organization to fail to meet its goals/objectives).
A control/process or use of technology that will address the risk.
Function
Risks
Controls and Technology
Logistics
Purchasing
Receiving
Inventory (Debit
??? (Credit)
SP 12-3
The following is a list of six control plans from this chapter or from Chapters 9, 10, and 11. This is followed be a list of five statements describing either the achievement of a control goal (i.e., a system success) or a system deficiency (i.e., a system failure). Match the five control goals or systems deficiencies with a control plan that would best achieve the desired goal or prevent the system deficiency. Each letter may be used only once, with one letter left over.
Control Plans
File completed and signed receiving report in receiving:
Select vendors who can provide goods with appropriate quality
Approve purchase…
arrow_forward
Overview
For this assignment, pick a health care organization of your choice. It could be a hospital, large clinic, or care facility.
Read these articles before you begin the assignment:
The COSO Framework in Emerging Technology Environments: An Effective In-Class Exercise on Internal Control. Journal of Emerging Technologies in Accounting.
COSO Internal Control - Integrated Framework: An Implementation Guide for the Healthcare Provider IndustryLinks to an external site..
Instructions
In which you:
Identify at least three of the five different 2013 framework elements that focus on internal control. Make sure that elements connected are related to financial reporting of the organization. Provide your rationale on the reasoning that the selected elements are tied to the financial reporting process in the organization. These are located in Chapter 3 in your textbook.
Design a method in AIS where it can be integrated in the health care industry that will improve the efficiency of its…
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you

Managerial Accounting
Accounting
ISBN:9781337912020
Author:Carl Warren, Ph.d. Cma William B. Tayler
Publisher:South-Western College Pub

Financial And Managerial Accounting
Accounting
ISBN:9781337902663
Author:WARREN, Carl S.
Publisher:Cengage Learning,

Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning

Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L
Related Questions
- 7. 41 Develop a context diagram and level-0 diagram for the hospital pharmacy system described in the following narrative. If you discover that the narrative is incomplete, make up reasonable explanations to complete the story. Supply these extra explanations along with the diagrams. The pharmacy at Mercy Hospital fills medical prescriptions for all hospital patients and distributes these medications to the nurse stations responsible for the patients’ care. Prescriptions are written by doctors and sent to the pharmacy. A pharmacy technician reviews each prescription and sends it to the appropriate pharmacy station. Prescriptions for drugs that must be formulated (made on-site) are sent to the lab station, prescriptions for off-the-shelf drugs are sent to the shelving station, and prescriptions for narcotics are sent to the secure station. At each station, a pharmacist reviews the order, checks the patient’s file to determine the appropriateness of the prescription, and fills the order…arrow_forwardQ.Explain how the disaggregation of information could be helpful to RRC’s intention to continuously improve its services.arrow_forward?arrow_forward
- answerarrow_forwardAn IS auditor conducting a compliance audit of a healthcare organization operating an online system that contains sensitive health care information. Which of the following should an IS auditor first review? () IT infrastructure and IS department organization chart () legal and regulatory requirements regarding data privacy () adherence to organization policies and procedures () network diagram and firewall rules surrounding the online systemarrow_forwardstep by step solution with explanationarrow_forward
- ket system My Dispense Academic Calendar Clear my choice My courses (7) Essay Question: (LO# 2) One of the Components of Internal Control is the control activities; which are the policies and procedures that help ensure that necessary actions are taken to address risks to the achievement of the entity's objectives. What are the most important control activities (Explain of each of these control activities)? Paragraph B Path: p Which of the following is not a likely source of information to assess fraud risks? く & 8 A 6 7 7 V 1O て (E 3. Y を IT K J H. G J く N !MSarrow_forwardName and describe the seven (7) common threats (Step One-Identify Threats) that CPAs in public practice should be alert to:arrow_forwardning Objective 1 S8-1 Defining internal control Internal controls are designed to safeguard assets, encourage employees to follow company policies, promote operational efficiency, and ensure accurate accounting records. Requirements 1. Which objective do you think is most important? 2. Which objective do you think the internal controls must accomplish for the busi- ness to survive? Give your reason.arrow_forward
- Introduction: This week you were introduced to the occupation of epidemiology along with their methods. The methods used are determined by the natural history of the disease in question, funding, ethical challenges, and threat to community spread. Each disease has its own unique application of epidemiological methods and timelines. Initial Post: As you are looking at the epidemiological approach to emergent public health issues, why do you think public health might make mistakes? Think about the study designs, data collection methods, sources of data, or the disease investigation process in your response. Classmate Responses: Each discussion board you will have the requirement to respond to at least 2 classmates as specifically detailed below. Classmate Response #1: Find a student who identified a different potential source of a mistake that a public health practitioner might make. Reflect on if this could happen with your specific public health issue. Classmate Response #2: Find a…arrow_forwardPreventing Cybercrime and Identity Theft Cybercrime and identity theft have become a growing problem in all aspects of society in recent years. Locate an article about cybercrime or identity theft in an organization from one of the types we have discussed in the course (government, not-for-profit organization, healthcare organization, or college or university). Summarize the case of cybercrime or identity theft in your article. What are the risks of these types of crimes to their organization? How can auditing and internal controls help prevent a company from falling prey to cybercrime? Then, review the examples shared by your peers. What strategies related to auditing and internal controls could you suggest for the organizations they shared?arrow_forwardUsing the following table as a guide, describe for each function A risk (an event or action that will cause the organization to fail to meet its goals/objectives). A control/process or use of technology that will address the risk. Function Risks Controls and Technology Logistics Purchasing Receiving Inventory (Debit ??? (Credit) SP 12-3 The following is a list of six control plans from this chapter or from Chapters 9, 10, and 11. This is followed be a list of five statements describing either the achievement of a control goal (i.e., a system success) or a system deficiency (i.e., a system failure). Match the five control goals or systems deficiencies with a control plan that would best achieve the desired goal or prevent the system deficiency. Each letter may be used only once, with one letter left over. Control Plans File completed and signed receiving report in receiving: Select vendors who can provide goods with appropriate quality Approve purchase…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Managerial AccountingAccountingISBN:9781337912020Author:Carl Warren, Ph.d. Cma William B. TaylerPublisher:South-Western College PubFinancial And Managerial AccountingAccountingISBN:9781337902663Author:WARREN, Carl S.Publisher:Cengage Learning,Accounting Information SystemsFinanceISBN:9781337552127Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan HillPublisher:Cengage Learning
- Pkg Acc Infor Systems MS VISIO CDFinanceISBN:9781133935940Author:Ulric J. GelinasPublisher:CENGAGE L

Managerial Accounting
Accounting
ISBN:9781337912020
Author:Carl Warren, Ph.d. Cma William B. Tayler
Publisher:South-Western College Pub

Financial And Managerial Accounting
Accounting
ISBN:9781337902663
Author:WARREN, Carl S.
Publisher:Cengage Learning,

Accounting Information Systems
Finance
ISBN:9781337552127
Author:Ulric J. Gelinas, Richard B. Dull, Patrick Wheeler, Mary Callahan Hill
Publisher:Cengage Learning

Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L