Describe the background information of the security problem in the context of the environment where the security problem is situated, and demonstrate the need for a solution.

Secure messaging service (SMS) for healthcare providers

Project Plan:                                                                                                                                Describe the project plan, scope, goals, and objectives. The proposed security solution to solve the problem of secure HIPAA and HITECH compliant communication is to implement a SMS. The scope of this project will include the selection, configuration, and implementation of Secure Messaging Service, it does not include a deep dive into the upgrades requirements for AFW IT infrastructure.

The ultimate goal of the project is to provide secure and efficient communication solution for AFW to provides medical services to veterans that is compliant with HIPAA and HITECH. In order to achieve this goal, the requirements to be compliant with HIPAA and HITECH will be dissected into tailored requirements that will help in the selection of the SMS provider. A project Integrated Master Schedule will be developed to track project cost and schedule.

Write a report of the security problem under investigation by doing the following:

A. Describe the security problem under investigation for your proposed project.

1. Justify why the identified security problem under investigation was chosen, including a description of the severity of the problem.

2. Describe the background information of the security problem in the context of the environment where the security problem is situated, and demonstrate the need for a solution.

a. Provide documentation related to the background information that demonstrates the need for a solution.

3. Summarize each root cause of the problem in the identified environment where the security problem is situated, including any supporting evidence, if applicable.

B. Summarize each internal and external project stakeholder role by including each of the following:
individual stakeholder implementation involvement and associated individual needs
how the security problem affects each stakeholder
stakeholder influence on the projects’ objectives and outcomes

C. Describe the existing and additionally collected data used to support decision-making throughout the project.

D. Explain the functional and detailed requirements to carry out the proposed project.
1. Describe the industry-standard methodology guiding the solution’s design and development.
2. Describe the project launch, including all phases of the rollout, the criteria used to determine the conclusion of implementation, and the project management strategy for implementation.
3. Describe the likelihood of all implementation risks and their impact on the project.

E. Describe the training approach, including the audience, delivery, content, and duration.

F. Describe the required resources necessary to execute each project phase and provide sources for all costs.

G. Describe all final project deliverables associated with the design and development of the technology solution.
1. Estimate the projected timeline, including each of the following:
• each milestone and its duration
• start and end dates
• resources assigned to each task

H. Describe the evaluation framework that will be used to assess the success of the project, including the project outcomes.
1. Describe the formative and summative test plans for the solution, including all required procedures and tools.
2. Describe the minimal acceptance criteria and key performance indicators for project acceptance as they align with your formative and summative test plans.
3. Justify the test cases and scenarios in the environment of the security problem being addressed.
4. Explain how you will analyze your results.

Describe the background information of the security problem in the context of the environment where the security problem is situated, and demonstrate the need for a solution.
Scroll to top