Description of the it security information related to case

Assignment Help Management Information Sys
Reference no: EM131189777 , Length: word count:2000

Introduction to Computer Security Assignment - Teamwork Report

Objectives of the assignment - The learning objectives of this assessment task are to:

Work as a team to assess the impact of social engineering attacks in various organisations and analyse the effectiveness of its countermeasures.

Improve the level of security of systems with remote control by using proper access control, authentication, privilege management and encryption methods.

Apply the appropriate use of tools to facilitate network security to prevent various types of computer and network attacks, and malicious software that exists.

Assessment Task Description-

This is a group assessment task with an individual aspect. You are required to work as a team and submit a team work report of approximately 2000 words (maximum) as well as exhibits to support findings and a list of bibliography. This report involves a comprehensive analysis of an organisation, collection of security information based on real scenarios, analysis of the results to determine feasible solutions and writing a complete report detailing a proper defence framework.

This report should consist of:

  • Description of the IT security information related to the case
  • List of major security problems
  • Analysis and presentation of solutions

Purpose and audience:

  • Purpose of the report - to inform and educate
  • Audience for the report - yourself, a family member, a friend

The Scenario: ABC Medical Group-

ABC Medical Group provides healthcare services to regional, rural and metropolitan communities at 50 clinics across Australia. ABC employing 500 personnel that comprises of a combination of allied health professionals including nurses, practitioners, administrators, technologists, etc.

ABC deploys a complex networked system that seamlessly integrates their clinics internet and Intranet. ABC IT Division is responsible for the management of the infrastructure for ABC and the information system of patient medical records, all staff records, and administrative records. Firewalls, antivirus products, intrusion detection systems and security policies are the current security controls use to protect the IT infrastructure and the sensitive records from viruses. Cyber criminals and other threats.

While IT teams have put the current security control in place to minimize the risk and impact of security breaches, they face an increasingly complex IT environment as employees adopt mobile working or use their personal smartphones and tablet computers to work on corporate data.

-Description of the IT security information related to the case

Define and discuss 8 information security related challenges that may be encountered by ABC Medical Group with current security controls, Essentially, determine any vulnerabilities which may exist now or in the future.

Description of the IT security information related to the case

-List of major security problems

1. Research, cite and list 4 security problems which may impact the privacy of patient's information related to a potential information security attack to ABC.

2. Justify your answer to the identified 4 problems and argue convincingly that these attacks can be perpetrated against ABC. Research and cite real world examples which have occurred and been published in the news or research articles.

3. Describe 4 countermeasures that you could apply to protect the patients' information from the 4 identified security problems. Research, cite and locate an array of appropriate use of hardware or digital tools to facilitate network or workstation security to prevent these 4 security problems. Note: our focus will be on the keeping patient information private.

Description of the IT security information related to the case

-Analysis and presentation of solutions

Provide a summary of an approach with recommendations for ABC to improve their privacy of information for patients. This will be used as a short outline which would be used for managers to review. Making reference to any prior beneficial researched statistics, prices and solutions you discovered will be favorable.

This template is intended to be a guide for you to complete the report for assignment. The headings and word count guide for each section has been provided to help you structure your report.

Report Title

Authors

Contents

a) Introduction (100 words)

b) Description of the IT security information related to the case (Approximately 500words)

c) List of major security problems

d) Analysis and presentation of solutions (Approximately 300 words)

e) Conclusion (100 words).

This is an assignment on computer security. It is based on a fictitious company called ABC Medical Group. The assignment has a 2000 word limit.

Reference no: EM131189777

Questions Cloud

Long-term financing needed-long-term debt financing : At year-end 2016, Wallace Landscaping’s total assets were $1.8 million and its accounts payable were $370,000. Sales, which in 2016 were $2.2 million, are expected to increase by 25% in 2017. Total assets and accounts payable are proportional to sale..
Data set on hospital admissions : Using the following data set on hospital admissions, define the service area for Hospital A, based only on quantitative factors
Should the annual stickturn be for production or ssc : What specific techniques will you explain to the Managing Director as being relevant to improve this situation?
Design of a supply chain to ensure strategic competitiveness : You are required to submit a Supply Chain Management assignment. Details of the programme assessment scheme and general information on preparing and submitting assignments.
Description of the it security information related to case : SIT182 Introduction to Computer Security Assignment - Teamwork Report. This report should consist of: Description of the IT security information related to the case, List of major security problems and Analysis and presentation of solutions
Find risk level of stock from your investors point of view : determine the risk level of the stock from your investor's point of view. Indicate key strategies that you may use in order to minimize these perceived risks.
Compare and contrast pf and traditional models of validity : Using the 4 steps outlined by Bornstein how would you assess validity for your chosen construct and selected test to assess that construct?
Show that san francisco sustainability plan is successful : The San Francisco Sustainability Plan, adopted in 1997. Which of the following are environmental indicators used to show that the San Francisco Sustainability Plan is successful?
Describe at least three ways a person can teach : Describe at least three ways a person can teach by example according to the article and provide a personal example in which you have demonstrated this concept.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd