CYB5CYA Algorithms Assignment

Assignment Help Data Structure & Algorithms
Reference no: EM132494572

CYB5CYA - Algorithms - La Trobe University

Objective:

The objective of this assignment is to identify a set of (cyber security) algorithmic requirements and apply the relevant symmetric and asymmetric key cryptography algorithms for a given application (Australian My Health Record - MHR System).

Total 100 marks for this Assignment 1:

In this assignment, you are required to complete the following three activities. Clearly state any assumptions you make. Your assumptions should be consistent with what are given the descriptions below. Upon the completion of the activities, you are required to provide a formal report documenting your findings in a single PDF file.

Format of Report:

For the purpose of this written assessment you are assumed to be a postgraduate student capable of producing a high-quality report. As such, you should attempt at your best to reflect this quality in the preparation of the written assessment. The report should contain the following five sections, but not limited to:


Section 1: Introduction - State the purpose and objectives of the report.

Section 2: Description - Attempt and write all three activities. Include your assumptions. Section 3: Recommendation - Any recommendations to improve MHR system.
Section 4: Conclusion - Summarize your findings according to the main points.

Section 5: References - Follow Harvard referencing style. Please provide in-text citations.

Three Activities (80 marks, 1000 words):

Please consider the following application scenario using Australian My Health Record (MHR) system.

A simple MHR scenario:

MHR is an initiative by Australian government that provides a secure online summary of the health information to the individuals (e.g., health professionals and patients). It can control what goes into it and who is allowed to access the MHR system. It can choose to share patients' health information with their doctors, hospitals and other healthcare providers like pharmacists. In addition to such "primary use" of the data/information for the health services, there are plans to use aggregated and anonymised health data/information for research and other purposes - this is known as "secondary use". Overall, the MHR system controls our health information securely in one place. It is really our choice - we can keep our MHR with basic information, or we can allow more information to MHR system or permanently delete the record. An MHR user is an individual who has right to use patients' health information. For example, A Doctor can do the following actions in the MHR system: Login to the system, Access patients' health information, Write prescription, Recommend patient to the specialists. The MHR system also gives our pharmacists a clearer picture of our health information.
More information about MHR can be found here: https://www.myhealthrecord.gov.au/. You can use other MHR scenarios/examples from other sources, however, please document your scenarios/examples and provide references.
Please follow the word limits that are mentioned in each activity.

Activity (1) - 350 words (30 marks) - Write any specific use case description of the MHR
system and identify the misuse cases. In this activity, you should document your findings according to following:
• Identify at least 5 use cases that can allow different users to interact with MHR system
- 5 marks

• Identify the possible misuse cases for those use cases (at least 5 misuse cases)
• Select a single use case and provide the situations (i.e., a situation is seen as interactions between actors and system) for your selected use case
• Write the description of the selected use case

Activity (2) - 400 words- Write a Brief Survey on Cryptographic Algorithms:
In this activity, you have to provide a brief report on the following:

• Understand the basic concepts of Symmetric versus Asymmetric Key Cryptography and briefly write your findings including a symmetric key algorithm and specific asymmetric key algorithm
• Write your reflections on using different cipher substitution algorithms (e.g., AtBash Substitution Cipher and Caesar Cipher Substitution) for secure communication - like, two entities (or users) can communicate and interact with MHR system through creating such a secure channel
• Write your reflections on using different encryption and decryption techniques (through secret and public keys) for secure communication in the MHR system

Activity - 250 words - A Recent Cryptographic Algorithm: In this activity, you have to provide a brief report on any relevant symmetric or asymmetric algorithm that can be applied in MHR system. Document your research and findings according to following:
• Write about your research approach to find any relevant research paper - you can use 'Google Search' or 'Google Scholar Search' to search/find your paper, and/or 'Google Dataset Search' to find the relevant dataset
• Identify any relevant algorithm from the paper that is proposed within last five years (say, from 2015 to 2020)
• How the algorithm works and briefly describe the application area in which the algorithm is applied
• Write your reflections on applying the proposed algorithm in the MHR system to solve any (and/or multiple) of the issues mentioned in Activity (2), like encryption/decryption, key exchange, secure communication, and so on

Attachment:- Algorithms Assignment.rar

Reference no: EM132494572

Questions Cloud

How a caregiver serve children that have been traumatized : How a caregiver can best serve children that have been traumatized? Please present your thoughts and feelings in dealing with children who have suffered.
Interest rates in the economy as a consequence : What is likely to happen to interest rates in the economy as a consequence? Use the loanable funds theory of interest rate to explain your answer.
What is the npv of agreeing to write the book : Assume? that, once the book is? finished, it is expected to generate royalties of $ 210 000 in the first year? (paid at the end of the? year)
What are the impacts of those transactions on the business : What sort of transactions would you encounter in that field? What are the impacts of those transactions on the business? List and describe some examples.
CYB5CYA Algorithms Assignment : CYB5CYA Algorithms Assignment help and solution, La Trobe University - assessment writing service - State the purpose and objectives of the report
Draw up separate depreciation schedules for the machinery : Draw up separate depreciation schedules for the machinery using the straight-line method, and the declining-balance method using double the straight-line
What are the pros and cons of the expanding popularity : Consider the functions of money as well as the risks inherent in traditional fiat currency. After watching the video, consider the following questions.
Discuss what policy actions might have prevented : Discuss what policy actions might have prevented or mitigated the balance of payments problem and the subsequent collapse of the peso
Calculate taxable income and tax payable : Are the individual differences listed above permanent differences or temporary differences? Explain why. Calculate Taxable Income and Tax payable

Reviews

Write a Review

Data Structure & Algorithms Questions & Answers

  Submit your programs by email the program should have as

submit your programs by email. the program should have as many comments as necessary. the top comments should explain

  Initialize accumulator variable for total rainfall to zero

Set a constant named SIZE to 12. This represents the total number of elements in the array. Initialize an accumulator variable for the total rainfall to 0.

  Will the user interface consist of one or more screens

Will the user interface consist of one or more screens? How will the user enter the status of the each maintenance task? How will that status be displayed?

  Describe different structures and areas within the brain.

Discuss in detail the thalamus, hypothalamus, endocrine and limbic systems.

  Evaluate the time complexity

Use pseudocode to describe the algorithm that puts the first four terms of a list of real numbers of arbitrary length in increasing order using the insertion.

  Describe algorithm for concatenating two singly linked lists

Describe a good algorithm for concatenating two singly linked lists L and M, with header sentinels, into a single list L ' that contains all the nodes of L foll

  Illustrate the execution of the heap-sort algorithm

Illustrate the execution of the heap-sort algorithm on the following input sequence: (2,5,16,4,10,23,39,18,26,15).

  Find the error in the code

The error Iam getting for the above code

  Compute the matrix using the specific algorithm

Consider the following algorithm, which takes as input a sequence of n integers a1, a2,...,an and produces as output a matrix M = {mij }.

  An infix expression is one in which operators are located

an infix expression is one in which operators are located between their operands. this is how we are accustomed to

  Short discussion on the concept of cryptography

The answer gives the learner with a short discussion on the concept of cryptography and the different aspects and functions that are provided through using encryption.

  Initalize the element with appropriate integer values

delcare and array of integer of size 10 and initalize the element with appropriate integer values

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd