CI7300 Data Management and Governance Assignment

Assignment Help Database Management System
Reference no: EM132508280 , Length: word count:6500

CI7300 Data Management and Governance - Kingston University London

Coursework Brief

Part A: Cryptography

A small private healthcare organization has contracted you to investigate the requirements of encryption in their information systems and to develop a robust policy for its use. Write a formal report outlining your findings and presenting your recommendations.

Some topics you could address:

1. The range of documents and messages to be encrypted, e.g. Electronic Health Records (HER), Electronic Patient Records (EPR) and their security requirements.
2. The different objectives of the deployed cryptosystems, i.e. Confidentiality, Integrity, Authentication.
3. The specific cryptographic algorithms and architectures available, along with their relative advantages and drawbacks. Which will be best suited for which purposes?
4. How will the cryptographic protection of static documents (e.g. those stored on a server) differ from that of documents in transit (e.g. transferred within and between sites)?
5. Will there be issues of compatibility between the organization's cryptographic policy, and that of the NHS?
6. How will your solution scale with the possible future development of the organization?
7. How will cryptographic keys (and certificates) be created and managed?
8. How will the different levels of authorization within the organization be managed?
9. How will the effectiveness of your solution be monitored and assessed?
These are only suggestions: your report will likely not cover all of themand you may discover others of equal importance whichyou might want to address. (Please contact the assessor if you have any concerns.) You may draw upon the material taught in class and/or your own independent research, but make sure you cite all your information sources. Feel free to make any assumptions you feel are necessary, but state and justify these.

Suggested word-count:2,000

Part B: Data Governance and Identity Theft

Select an identity theft story from the media or from the literature or stories you heard of or experienced.In order to contain the scope of the assignment, it is suggested you focus on two issues for the Health Information Governance.

In this Part you are required to Identify and discuss the following:

• The strength and weaknesses of the approach that was adopted. Describe the symptoms of what went well or badly.
• What the theory and standards suggest you should do. Based on the course materials or other sources, describe what the theory suggests that you should do.
• Say what you would do if you had time again or if faced with the same problem of Health information governance and network security.

Suggested word-count: 1,500

Part C: Network Security

Network infrastructures allowing access to biomedical information, accounting, and admissions can potentially improve patient care and lower medical costs. However, they also introduce security threats due to malware, unauthorized access and human error.

There are many network security tools available to combat these threats but these are only effective if used in accordance with a well-structured security policy, and monitored and assessed in line with established best practices.

In this Part you are required to:

1. Identify and discuss the specific assets relevant to a typical healthcare network.
2. For a subset of critical assets, identify typical threats and assess vulnerabilities.
3. Building upon the above, perform a risk analysis for this typical healthcare network.
4. Design security controls mitigating the risk as identified. Discuss the strengths and weaknesses of these controls and how they complement each other in an effective secure design.
5. On the basis of this formulate an appropriate basic security policy for an organisation in charge of that network.
Feel free to make any assumptions you feel are necessary, but be sure to state and justify these.

Suggested word-count: 1,000

Report

Each Part will be assessed by a separate report, but these should be combined into a single document for submission. These should include diagrams, tables etc. where appropriate. (Where these are taken from other documents, references should be cited).

Recommended structure (for each individual report)

Introduction
• Background (including technological background).
• The issues which are discussed in your report.
• A brief summary of the report structure.
Main body of report
• Do not call it that - it could be composed of several different sections.
Conclusion and Recommendations
• What lessons were learned from the exercise?
• How are the findings potentially helpful?
References
• All major sources of information should be acknowledged.
• Referencing should be in an appropriate academic style (e.g. Harvard).

Coursework : Database Design & Development

System Requirements

Delphi require a database to support their key activities in a campaign, this includes the recording of:
• Staff details and their involvement in campaigns
• Client details including contacts for particular campaigns
• Campaign details
• Meeting details
• Advert and placement details
Details of the contents of actual documentation produced during a campaign is part of the campaign documentation and is not regarded as relevant information for the database which is essentially concerned with recording the information necessary to track the progress of a campaign.

Design and Development Requirements

Conceptual Design Stage
Design a class diagram that will capture the data and links capable of supporting the requirements outlined above. The figures provide some sample data to give you additional information on the kind of data you will need to store. The model needs to capture the data requirements in order for the system to work. You also need to develop a list of constraints and a list of assumptions.

Relational Design Stage
The class diagram will then be adapted into a relational model. A relational model consists of relations with attributes and their data types, primary and foreign keys.

Implementation Stage
The final stage will be to implement your design, using Oracle.
• Convert your relational model into an SQL database.
• Populate your database with some sample data
• Test your database. You will need to consider testing the database to ensure that the database meets the information requirements of the system. You need to create and run SQL queries that produce the information required.

The report will require the following chapters:

Chapter 1: Introduction - one page description of the aims and objectives of the report.

Chapter 2: The Class Diagram with constraints and assumptions.

Chapter 3: A discussion of the major design decisions taken in construction of the class diagram and a discussion of any design decisions taken in converting the class diagram into a relational model.

Chapter 4: The Relational Model.

Chapter 5: Implementation. Provide a listing of the SQL table definitions.

Chapter 6: Six queries that demonstrate that your database meets the requirements of the system.

Chapter 7: Conclusion. A critical evaluation of your final product and a review of the entire exercise.

Note: 3250 words each

Attachment:- Data Management and Governance.rar

Reference no: EM132508280

Questions Cloud

When elemental potassium reacts with water : When elemental potassium reacts with water, potassium hydroxide and hydrogen gas are formed. balance the equation for this reaction.
Human sexuality and sexual orientation : ANY topic loosely related to human sexuality, sexual orientation, LGBTQ or women's issues, human reproduction, sexual heath, contraception, labor and delivery,
What are the differences between leadership and followership : Based on the behaviors of an effective leader found in this chapter, how will you assist your new colleagues? What are the differences between leadership.
What are the mole fractions for gas : If this gas mixture is contained in a 5.00 L flask with a temperature of 42.0°C, what are the mole fractions for each gas?
CI7300 Data Management and Governance Assignment : CI7300 Data Management and Governance Assignment Help and Solution, Kingston University London - Assessment Writing Service
How research uses hypothesis testing : Provide two different examples of how research uses hypothesis testing, and describe the criteria for rejecting the null hypothesis.
What are restriction enzymes : What is electrophoresis? What are restriction enzymes? What is a molecular marker? What is its purpose?
Journalize the april transactions : Journalize the April transactions. Frontier Park was started on April 1 by M. Preston. The selected events and transactions occurred during April
How does the selected practice problem impact nurses : From a global/nationwide perspective, how does the selected practice problem impact nurses, nursing care, healthcare organizations, and the quality of care.

Reviews

Write a Review

Database Management System Questions & Answers

  Describe the content user access methods and sources of data

Find an example of an actual data warehouse. For this example, describe the content, purpose, user access methods, and sources of data.

  What is a classification model

What is a classification model? As the classification model serves two vital functions in data mining: predictive and descriptive model. Explain the models'.

  List the relational notation for each normal form

List the relational notation for each normal form (e.g. Invoice (abc, def, ghi): When your done creating the ERD in Visio submit your completed Visio file to me for grading via the upload link.

  What is normalization

When is a table in 1NF?

  Develop a context diagram and system level data flow diagram

Develop a Context Diagram and a System Level Data Flow Diagram , make sure you properly identify all the components. Develop an ERD as well making sure you properly label the Entity name.

  Database containing student info

Create a database containing student info (name, age, ect.).Find a way to allow the user to search the database using a students name and allowing them to delete that students information.Use binary input/output to take the input from the user for th..

  Objectivesto analyse and comprehend a provided er diagram

objectivesto analyse and comprehend a provided er diagram and database schemato implement a database based on the

  Database administrator for a local department store

Imagine that you have been hired as the database administrator for a local department store. The department store has recently expanded by opening five (5) stores within your local region.

  Design an entity relationship diagram to model the scenario

Database Systems and Administration (ECM38IS) - design and research issues related to Database Management Systems - Evaluate the role of conceptual modeling

  Use javascript to ensure that an entry has been made

When the database is set up it should be populated with the data that you have chosen. Display this data as part of your documentation. Each table should have from 3 to 6 records initially.

  Identify potential sales and department store transactions

Identify the potential sales and department store transactions that can be stored within the database. Design a database solution and the potential business rules that could be used to house the sales transactions of the department store

  Write a paper describing project management lifecycle

Write a paper describing Project management lifecycle and Systems Delivery lifecycle.Your paper must contain two well-formed paragraphs (a topic sentence supported by three to four additional sentences).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd