Develop a robust policy for its use

Assignment Help Database Management System
Reference no: EM132557739 , Length: word count:4500

CI7300 Data Management and Governance - Kingston University London

Coursework Brief

Part A: Cryptography

A small private healthcare organization has contracted you to investigate the requirements of encryption in their information systems and to develop a robust policy for its use. Write a formal report outlining your findings and presenting your recommendations.

Some topics you could address:

1. The range of documents and messages to be encrypted, e.g. Electronic Health Records (HER), Electronic Patient Records (EPR) and their security requirements.
2. The different objectives of the deployed cryptosystems, i.e. Confidentiality, Integrity, Authentication.
3. The specific cryptographic algorithms and architectures available, along with their relative advantages and drawbacks. Which will be best suited for which purposes?
4. How will the cryptographic protection of static documents (e.g. those stored on a server) differ from that of documents in transit (e.g. transferred within and between sites)?
5. Will there be issues of compatibility between the organization's cryptographic policy, and that of the NHS?
6. How will your solution scale with the possible future development of the organization?
7. How will cryptographic keys (and certificates) be created and managed?
8. How will the different levels of authorization within the organization be managed?
9. How will the effectiveness of your solution be monitored and assessed?

These are only suggestions: your report will likely not cover all of themand you may discover others of equal importance whichyou might want to address. (Please contact the assessor if you have any concerns.) You may draw upon the material taught in class and/or your own independent research, but make sure you cite all your information sources. Feel free to make any assumptions you feel are necessary, but state and justify these.

Suggested word-count:2,000

Part B: Data Governance and Identity Theft

Select an identity theft story from the media or from the literature or stories you heard of or experienced.In order to contain the scope of the assignment, it is suggested you focus on two issues for the Health Information Governance.

In this Part you are required to Identify and discuss the following:

• The strength and weaknesses of the approach that was adopted. Describe the symptoms of what went well or badly.
• What the theory and standards suggest you should do. Based on the course materials or other sources, describe what the theory suggests that you should do.
• Say what you would do if you had time again or if faced with the same problem of Health information governance and network security.

Suggested word-count: 1,500

Part C: Network Security

Network infrastructures allowing access to biomedical information, accounting, and admissions can potentially improve patient care and lower medical costs. However, they also introduce security threats due to malware, unauthorized access and human error.

There are many network security tools available to combat these threats but these are only effective if used in accordance with a well-structured security policy, and monitored and assessed in line with established best practices.

In this Part you are required to:

1. Identify and discuss the specific assets relevant to a typical healthcare network.
2. For a subset of critical assets, identify typical threats and assess vulnerabilities.
3. Building upon the above, perform a risk analysis for this typical healthcare network.
4. Design security controls mitigating the risk as identified. Discuss the strengths and weaknesses of these controls and how they complement each other in an effective secure design.
5. On the basis of this formulate an appropriate basic security policy for an organisation in charge of that network.
Feel free to make any assumptions you feel are necessary, but be sure to state and justify these.

Suggested word-count: 1,000

Report

Each Part will be assessed by a separate report, but these should be combined into a single document for submission. These should include diagrams, tables etc. where appropriate. (Where these are taken from other documents, references should be cited).

Recommended structure (for each individual report)

Introduction
• Background (including technological background).
• The issues which are discussed in your report.
• A brief summary of the report structure.
Main body of report
• Do not call it that - it could be composed of several different sections.
Conclusion and Recommendations
• What lessons were learned from the exercise?
• How are the findings potentially helpful?
References
• All major sources of information should be acknowledged.
• Referencing should be in an appropriate academic style (e.g. Harvard).

Reference no: EM132557739

Questions Cloud

Element of the communication process : Imagine that you are the CEO of a cosmetics company. Your company is headquartered in Sabah, where you have more than 3,000 employees
After completing maximum-lift such as back squat : After completing a maximum-lift such as a back squat, the athlete experiences slight dizziness and spots occur in their vision.
Describe two ways you can improve gait speed : Describe two ways you can improve gait speed. List the three variables that determine projectile motion. Which one do you have the most control over and why?
What can be the right strategy for nvidia : What can be the right strategy for for NVIDIA? and what do they need to do to retain their leadership?
Develop a robust policy for its use : Information systems and to develop a robust policy for its use. Write a formal report outlining your findings and presenting your recommendations
Reformulate one of the statements based on evaluation : Choose any organization with a vision, mission, and/or goal statements. Describe all three and evaluate them using the triple bottom line
Starting point for exploring the local currencies : A good starting point for exploring the local currencies of a region is to look at a financial newspaper, such as the Financial Times.
Does cultural-evolutionary-social ideas : What motivates one's behavior in seeking out certain individuals as a mate? Does cultural, evolutionary, social ideas, etc play a part?
Describe communication patterns that occur : -Describe communication patterns that occur within the workplace

Reviews

Write a Review

Database Management System Questions & Answers

  Build a database

Build a database and produce a query report that shows 10 fields as in Table iamge using Microsoft Access

  Describe entity-relationship model

Describe the entity-relationship model. How are entities, relationships, and attributes represented in this model? What is a composite entity? Describe the approach to diagrams that uses a crow's foot.

  Normalize the relational schema to boyce

Normalize the relational schema to Boyce-Codd Normal Form-Revise the concept database design and logic database design, based on your revision.

  Express the information about fred and ann

Express the information about Fred and Ann in unary facts. Draw a conceptual schema diagram based on this choice

  Effective partnership relationship between management

Using research evidence, critically evaluate the key factors for an effective partnership relationship between management and a trade union - Critically analyse Nasser's strategy of encouraging employees to form a trade union.

  Create a table mainmenu with at least three fields

Create a table MainMenu with at least 3 fields: ID, caption, and form or report to run. Your code (for the button) will dynamically read the caption from the table and assign it to the button

  Write up a list of entities tables for your project idea

Write up a list of entities "tables" for your project idea.

  List all the functional dependencies exist in the relation

COIT20247 Database Design and Development - Map the ERD, from the sample solution, into a set of relations in at least Third Normal Form (3NF).

  Create the primary key and foreign keys

Create the primary key and foreign keys using a UML Class diagram for each table.Compare and contrast the key aspects that each system offers.

  The difference between the group by and having

Why is it best practice to not use SELECT * when writing SQL code? You may have to Google this answer.

  Under which conditions would each type of loop be more

there are 3 kinds of loops-for loop while loop and do while loop. under which circumstances would each kind of loop be

  Draw the ms visio crows feet e-r model

A county wishes to create a database to control its local libraries. Each library has a number of employees, one of whom is designated as the manager of the library and is responsible for supervising employees and the general day-to-day management..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd