Operations Security

   Recently it has beseem plain that mass are storing axioms wclose it does not suit and mass are arrivaling files and directories that they should not accept arrival to.  Elizabeth Montgomery is in impute of the team intercourse delay knowing, maintaining and implementing policies for users and axioms. You are Elizabeth Montgomery and her team. You insufficiency to suit to this rational by commencement operation straightway.   You allure insufficiency to total the following:  Securing the IOT conjoined devices in HEALTH CARE · Summarize the issues that countenance scrutiny hospitals · What images of policies are insufficiencyed? · What kernel principles use close? · What would be the best framework to use for a scrutiny hospital? · What User Domains should tclose be? o Be trusting to settle who the groups are  o What files and folders containing what image of axioms should they accept arrival to? · How would you go about implementing the changes? · What policies insufficiency to be in situate to oration the issues? Research paper: Research Paper must be in APA Style Research Paper must accept at lowest 5 works cited of which 2 must be comrade reviewed works/articles (melody your compass can be      included as a intimation) Must be      at lowest 10 double-spaced pages delay gauge 1 inch margins. • 6 – 8 pages of prose • Limit the sum of bulleted lists • Prose + charts + figures = 10 pages