Develop a solution to a business problem

Assignment Help Computer Network Security
Reference no: EM132654054

Assignment Topic

The aim of this deliverable is to apply the Cyber Security methods and techniques studied during the module to develop a solution to a business problem. The details of the business problem are as follows:

Queens medical centre is a community clinic and serves as the first point of call for any resident within the catchment area who happens to be unwell. The clinic has specialists in various areas of medicine. However, an appointment is required to schedule a consultation meeting with a specialist, which is done through a telephone call to the receptionist.

The clinic has been experiencing a high volume of calls, causing a lot of problems for residents to get access to care on time. Also, the management of Queens medical centre needs to plan to be able to respond to the rate of growth of the community population.

To address this problem, the clinic management has decided to acquire a web-based appointment and scheduling management information system (ASMIS). This will allow appointments to be booked online by prospective patients. The system will collect vital information from the patient to be able to determine which specialist is best to attend to a given case, considering the availability and workload of the specialist doctor.

The management of the clinic is concerned about the recent high rate of cybercrime and the government's policy on patient data protection. The IT team at the clinic has been tasked to install a secured ASMIS. As the Cyber Security Officer on the team that manages the clinic's IT systems, you are to advise the team on the potential cyber threats and how these can be mitigated.

So, you are to produce a report to management providing the following information:
• Details of the benefits of the ASMIS as well as the potential problems including potential cyber threats to the system.
• The report must include at least two UML diagrams.Each diagram should show aspects of the system and a threat modelling technique that can be used to identify and mitigate potential cyber threats
• A background to the UML diagrams and modelling techniques, along with justifications for their use with supporting references.
• The Cyber Security technologies that can be used to address the problem, discussing the strengths and weaknesses of the solutions with references to examples in which the technology has been employed.

Word limit - 2,000 words.

The Referencing should be Harvard

Reference no: EM132654054

Questions Cloud

Prepare a flexible budget and show variances for the year : Prepare a flexible budget and show variances for the year that passed. Indicate whether the flexible budget variances are favorable or unfavorable
How do you write cash payments : How do you write cash payments of $60,000 received for services previously provided and billed -as journal entry and T-accounts
Which is the correct entry to record compensation expense : Each option has a fair value of $1 based on an option pricing model. Which is the correct entry to record compensation expense for the year 2018
Evaluate theoretical knowledge of marketing research : Demonstrate research skills, showing initiative in consulting the academic literature and integrating fresh ideas into discourse in preparation for life-long
Develop a solution to a business problem : Details of the benefits of the ASMIS as well as the potential problems including potential cyber threats to the system - threat modelling technique
Photosynthesis : Determine the effects of light on the rate of photosynthesis. Determine the absorption spectrum of leaf pigments
How will measure and improve digital marketing performance : How you will measure and improve digital marketing performance during the campaign. What tools you will use to monitor the campaign's activity
Complete statement of comprehensive income : Complete Statement of Comprehensive Income showing expenses classified by function on the face of the Income Statement
Explain current perceptions of the flu vaccine : What are your current perceptions of the flu vaccine? Do you think these recommendations are appropriate? Explain your reasoning.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd