Develop a solution to a business problem

Assignment Help Computer Network Security
Reference no: EM132654054

Assignment Topic

The aim of this deliverable is to apply the Cyber Security methods and techniques studied during the module to develop a solution to a business problem. The details of the business problem are as follows:

Queens medical centre is a community clinic and serves as the first point of call for any resident within the catchment area who happens to be unwell. The clinic has specialists in various areas of medicine. However, an appointment is required to schedule a consultation meeting with a specialist, which is done through a telephone call to the receptionist.

The clinic has been experiencing a high volume of calls, causing a lot of problems for residents to get access to care on time. Also, the management of Queens medical centre needs to plan to be able to respond to the rate of growth of the community population.

To address this problem, the clinic management has decided to acquire a web-based appointment and scheduling management information system (ASMIS). This will allow appointments to be booked online by prospective patients. The system will collect vital information from the patient to be able to determine which specialist is best to attend to a given case, considering the availability and workload of the specialist doctor.

The management of the clinic is concerned about the recent high rate of cybercrime and the government's policy on patient data protection. The IT team at the clinic has been tasked to install a secured ASMIS. As the Cyber Security Officer on the team that manages the clinic's IT systems, you are to advise the team on the potential cyber threats and how these can be mitigated.

So, you are to produce a report to management providing the following information:
• Details of the benefits of the ASMIS as well as the potential problems including potential cyber threats to the system.
• The report must include at least two UML diagrams.Each diagram should show aspects of the system and a threat modelling technique that can be used to identify and mitigate potential cyber threats
• A background to the UML diagrams and modelling techniques, along with justifications for their use with supporting references.
• The Cyber Security technologies that can be used to address the problem, discussing the strengths and weaknesses of the solutions with references to examples in which the technology has been employed.

Word limit - 2,000 words.

The Referencing should be Harvard

Reference no: EM132654054

Questions Cloud

Prepare a flexible budget and show variances for the year : Prepare a flexible budget and show variances for the year that passed. Indicate whether the flexible budget variances are favorable or unfavorable
How do you write cash payments : How do you write cash payments of $60,000 received for services previously provided and billed -as journal entry and T-accounts
Which is the correct entry to record compensation expense : Each option has a fair value of $1 based on an option pricing model. Which is the correct entry to record compensation expense for the year 2018
Evaluate theoretical knowledge of marketing research : Demonstrate research skills, showing initiative in consulting the academic literature and integrating fresh ideas into discourse in preparation for life-long
Develop a solution to a business problem : Details of the benefits of the ASMIS as well as the potential problems including potential cyber threats to the system - threat modelling technique
Photosynthesis : Determine the effects of light on the rate of photosynthesis. Determine the absorption spectrum of leaf pigments
How will measure and improve digital marketing performance : How you will measure and improve digital marketing performance during the campaign. What tools you will use to monitor the campaign's activity
Complete statement of comprehensive income : Complete Statement of Comprehensive Income showing expenses classified by function on the face of the Income Statement
Explain current perceptions of the flu vaccine : What are your current perceptions of the flu vaccine? Do you think these recommendations are appropriate? Explain your reasoning.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Give opinion of most important ways that believe encryption

Give your opinion of the two most important ways that you believe encryption could assist in addressing some of the current challenges facing organizations today, and explain why these solutions are so important. Justify your answer.

  Describe common concepts in information security

Describe common concepts in information security, privacy and the law. You will learn how to present and justify risk analysis for assets in an organizational setting and will relate those findings to the basic security principles of confidentiali..

  Why are anti-social engineering and dumpster diving safeguar

Attackers are becoming more ingenious in their attack methods every day. A part of this evolving methodology is the physical aspect of security. Please respond to all of the following prompts: 1. Why are anti-social engineering and dumpster diving sa..

  Security risk to acknowledge using macros

Write down 200- to 300-word response which answers the following question: Based on article by Lenning (2005), what is main security risk which users must acknowledge when using macros?

  Basic encryption and platform security

Read and summarize "Big iron lessons, Part 5: Introduction to cryptography, from Egypt through Enigma"

  Make an incident-response policy that covers the

gem infosys a small software company has decided to better secure its computer systems after a malware attack shut down

  Identify a recently announced security vulnerability

Identify a recently announced security vulnerability and write a profile of the threat - determine what the risk to an organisation is, you need to know

  What is access control

What is Access Control? What is SSO and what are some of parts and types of Access Control?

  Analyze the types of digital criminals and hackers.

Analyze the types of digital criminals and hackers.Summarize white-collar crimes and criminal tools.

  Routing protocol is a convention

An ad hoc routing protocol is a convention, or standard, that controls how nodes decide which way to route packets between computing devices in a mobile ad-hoc network. give a list of some ad-hoc network routing protocols.

  Improving critical infrastructure cybersecurity

Analyze the way in which CIP has or has not advanced between the releases of the DHS' NIPP and the NIST's Framework for Improving Critical Infrastructure Cybersecurity. Justify your response.

  Describe the mutual authentication procedure

COIS23001 - Network Security - What makes a brute-force attack both particularly difficult and potentially easy on a wireless network using AES/CCMP encryption and 802.1x authentication? Hint: What do you need to know in order to attempt the attac..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd