Data governance and identity theft

Assignment Help Database Management System
Reference no: EM132300379

Coursework Brief

Part A: Cryptography (Dr Martin Tunnicliffe)

A small private healthcare organization has contracted you to investigate the requirements of encryption in their information systems and to develop a robust policy for its use. Write a formal report outlining your findings and presenting your recommendations.

Some topics you could address:

1. The range of documents and messages to be encrypted, e.g. Electronic Health Records (HER), Electronic Patient Records (EPR) and their security requirements.
2. The different objectives of the deployed cryptosystems, i.e. Confidentiality, Integrity, Authentication.
3. The specific cryptographic algorithms and architectures available, along with their relative advantages and drawbacks. Which will be best suited for which purposes?
4. How will the cryptographic protection of static documents (e.g. those stored on a server) differ from that of documents in transit (e.g. transferred within and between sites)?
5. Will there be issues of compatibility between the organization's cryptographic policy, and that of the NHS?
6. How will your solution scale with the possible future development of the organization?
7. How will cryptographic keys (and certificates) be created and managed?
8. How will the different levels of authorization within the organization be managed?
9. How will the effectiveness of your solution be monitored and assessed?
These are only suggestions: your report will likely not cover all of them and you may discover others of equal importance which you might want to address. (Please contact the assessor if you have any concerns.) You may draw upon the material taught in class and/or your own independent research, but make sure you cite all your information sources. Feel free to make any assumptions you feel are necessary, but state and justify these.

Suggested word-count: 2,000

Section B: Data Governance and Identity Theft

Select an identity theft story from the media or from the literature or stories you heard of or experienced. In order to contain the scope of the assignment, it is suggested you focus on two issues for the Health Information Governance.

In this section you are required to Identify and discuss the following:

• The strength and weaknesses of the approach that was adopted. Describe the symptoms of what went well or badly.
• What the theory and standards suggest you should do. Based on the course materials or other sources, describe what the theory suggests that you should do.
• Say what you would do if you had time again or if faced with the same problem of Health information governance and network security.

Section C: Network Security (Dr Eckhard Pfluegel)

Network infrastructures allowing access to biomedical information, accounting, and admissions can potentially improve patient care and lower medical costs. However, they also introduce security threats due to malware, unauthorized access and human error.

There are many network security tools available to combat these threats but these are only effective if used in accordance with a well-structured security policy, and monitored and assessed in line with established best practices.

In this section you are required to:

1. Identify and discuss the specific assets relevant to a typical healthcare network.
2. For a subset of critical assets, identify typical threats and assess vulnerabilities.
3. Building upon the above, perform a risk analysis for this typical healthcare network.
4. Design security controls mitigating the risk as identified. Discuss the strengths and weaknesses of these controls and how they complement each other in an effective secure design.
5. On the basis of this formulate an appropriate basic security policy for an organisation in charge of that network.

Feel free to make any assumptions you feel are necessary, but be sure to state and justify these.

Suggested word-count: 1,000

Report

Each section will be assessed by a separate report, but these should be combined into a single document for submission. These should include diagrams, tables etc. where appropriate. (Where these are taken from other documents, references should be cited).

Recommended structure (for each individual report)

Introduction
• Background (including technological background).
• The issues which are discussed in your report.
• A brief summary of the report structure.

Main body of report
• Do not call it that - it could be composed of several different sections.
Conclusion and Recommendations
• What lessons were learned from the exercise?
• How are the findings potentially helpful?

References
• All major sources of information should be acknowledged.
• Referencing should be in an appropriate academic style (e.g. Harvard).

Attachment:- Data Management and Governance.rar

Reference no: EM132300379

Questions Cloud

Develop simple scripts to manage the user and file system : ITC514 - Linux Server Administration Assignment - File Systems and Advanced Scripting, Charles Sturt University, Australia. Develop scripts to manage user
How strategy shows bezos as systematic and intuitive thinker : Bezos once said: "Amazon may break even or even lose money on the sale of its devices." The company expects to recoup the money later through the sale.
Roofing supervisor position descriptions : What are four skills gaps of roofing supervisors from the Injury and Illness Incident Report and the Roofing Supervisor Position Descriptions?
Considering several options for expanding existing capacity : A company producing custom-made teddy bears is considering several options for expanding their existing capacity.
Data governance and identity theft : CI7300 Data Management and Governance - Kingston University London - Write a formal report outlining your findings and presenting your recommendations
Develop global business strategy for fictional us-based firm : Develop a global business strategy for a fictional US-based firm desiring to expand into Europe and Asia.
Disney recent and projected global expansion strategies : Discuss Disney’s recent and projected global expansion strategies including the Shanghai park as well as other projected projects in Asia and around the world.
Recommend what amazon should do to protect its brand : Discuss whether or not Amazon has lost its identity by expanding into markets well beyond books. Recommend what Amazon should do to protect its brand.
Important to have good work ethic in leadership and service : Why is it important to have good work ethic in leadership and service and why you believe in this area?

Reviews

len2300379

5/6/2019 11:21:02 PM

Marks Breakdown (for each individual report) • Introduction 15% • Main Body of Report 50% • Conclusions/ Recommendations 20% • Report structure, organization, presentation and appropriate use of references 15%

len2300379

5/6/2019 11:20:58 PM

Each section will be assessed by a separate report, but these should be combined into a single document for submission. These should include diagrams, tables etc. where appropriate. (Where these are taken from other documents, references should be cited). Recommended structure (for each individual report) Introduction • Background (including technological background). • The issues which are discussed in your report. • A brief summary of the report structure. Main body of report • Do not call it that – it could be composed of several different sections. Conclusion and Recommendations • What lessons were learned from the exercise? • How are the findings potentially helpful? References • All major sources of information should be acknowledged. • Referencing should be in an appropriate academic style (e.g. Harvard).

len2300379

5/6/2019 11:20:45 PM

This module is assessed by coursework only. There will be two separate briefs, one covering the first week, the other covering the second. Each will be worth 50% of the total module mark. This document covers only the first week’s assessment, comprising Cryptography, Network Security and Data Governance. It consists of three separate parts

Write a Review

Database Management System Questions & Answers

  Show the number of payments received each month

Create a list that shows the order number, order date and shipped date for all cancelled orders. Use the status field to find cancelled orders.

  List name of each branch that has at least nine employees

List the name of each branch that has at least nine employees.

  Design of database systems

Write a trigger that will increment the new field numHours in the Employee table automatically whenever a record is inserted in the Works table - Create a view that shows the eids and managerids in Sales department.

  Investigate the option of implementing a database system

Investigate the option of implementing a database system. Accordingly, they hired you to design a relational database to better track and record their operation

  Set up a pricing system which will automatically work

6N8383 Database and Advanced Spreadsheet for Business Assignment - Spreadsheet Project, Dublin Institute of Technology, Ireland. Sup a pricing system

  Define precautions database administrator take for database

Discuss a total of ten (10) functions, responsibilities, and/or skill requirements of a database administrator. Describe precautions a database administrator may take for database security and protection of patient information. (A 1½ -page respons..

  Use the contents of figure 1 to work problems 1-31write the

use the contents of figure 1 to work problems 1-3.1.write the business rules that govern the relationship between agent

  How do organization like amazon manage their big data system

How do organizations like Amazon, Facebook, or Google manage their "big data" systems? Explain the challenges these organizations face with managing these large systems

  Discuss about the database security

Discuss about the database security.We will focus three topics for this conference:Inference in ordinary databases or statistical databases,database privacy (through encryption),andcloud security.

  Convenient database system

In short, there is a need for a more convenient database system. The machine on which the database is currently running is powerful enough to host the database server. The database should be accessible from four checkout stations that process rent..

  Create and format charts that display your overall grade

Select cell range A5:A8 and G5:G8, using the control feature to select G5:G8, and then click the Insert tab select the Column tab, choose the 3-D Column.Select a style from the Design tab and then format the all courses (on the chart) with the fil..

  Maintain data on the various federal agencies

The U.S. government wants to keep track of information about states, governors, cities, and mayors. In addition, it wants to maintain data on the various federal agencies and the annual grants each agency gives to the individual states.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd