Discuss information security related to the use of website

Assignment Help Computer Engineering
Reference no: EM131722220

Task

You work as a security engineer at a health center. The center recently creates a Google website for storing and updating very important documents related to staff and patients. Some doctors reported that some of patient's documents at the website are missing. You are required to assess the information security situation in this health center with a security plan that includes recommendations for improvements.The center manager requested you to analysis and evaluates the center's information security. In addition, you have to propose anew framework for monitoring and protecting the center information.

You must address at least the following in the report.

1. Identify and describe the main categories of information assets for the health sector that may be at risk and have to be protected.

2. Appraise the actual and potential threats to the vulnerabilities of the assets.

3. Evaluate the challenges in information security related to the use of website.

4. Discuss the techniques can be used for automatic monitoring and alerting of unusual activities on the website.

5. Review the recent prevention techniques to be used to protect the center information.

6. Analyse the threats and data privacy issues related to the use of public web server.

7. Develop a security plan that describes counter-measures that will manage the threats that put the center information assets at risk from a risk management perspective.

8. Develop a comprehensive information security education and awareness program. The program must include training, education, awareness and outreach must be developed to deliver a multitude of security messages to all employees according to their responsibilities.

9. Propose and explain the framework for storing, monitoring and protecting the health center information with the support of diagrams.

10. Recommendations you can make to improve the information security situation of the company.

Reference no: EM131722220

Questions Cloud

Describe major shortcoming for ytm and current yield : Describe the information that you received from the quote of the bond. You have to explain each number and symbol that appears in the bond quotation
Calculate average-cost per unit : Bramble Company's record of transactions concerning part X for the month of April was as follows. Calculate average-cost per unit
Pleasant and unpleasant experience that are valid or invalid : All unpleasant experiences are things we do not like to remember. Therefore, all things we like to remember are pleasant experiences.
What is the detailed formula of shareholders equity : Corporation Accounting Question - what is the detailed formula of shareholders equity, total contributre capital, outstanding shares, and issued & outstanding
Discuss information security related to the use of website : Evaluate the challenges in information security related to the use of website
Lean principle focuses on the improvement of process speed : The Lean principle focuses on the improvement of process speed.
Discuss the adaptations and localization of your product : Please discuss the adaptations and localization of your product/service that you will be doing to introduce it to your Least Developed Country.
Discuss the position of chief security officer : Assume you are applying for the position of Chief Security Officer and you are being interviewed by the executive board of a new e-commerce business
Determine variable element of manufacturing overhead costs : Use the high-low method to determine the variable element of manufacturing overhead costs per machine-hour

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd