Explain existing and potential vulnerabilities and threats

Assignment Help Computer Network Security
Reference no: EM131380755

Assignment: Critical Thinking: Facility Network Security: Assessment and Recommendations

You are the chief information technology officer at a small outpatient health care facility in Riyadh. The medical facility employs five specialist physicians, ten certified nurses, five administrative assistants, and two technicians. There are 25 clinical rooms. Each room is equipped with a computer. In addition, five computers are used by the administrative assistants for patients' appointments and records. All of these computers are connected using a local area network. Physicians are supplied with portable devices that they can use to write e-prescriptions. These devices are connected wirelessly to the rest of the network.

As the chief information technology officer, you are charged with the task of evaluating the security status of the facility network and developing a report to recommend the directions that should be followed in the near future.

Your report should include the following materials:

• Existing and potential vulnerabilities and threats

• Suggestions and discussions of methods or tools that can be used to overcome the existing and potential security threats

• Discussion of encryption techniques that can be used for the wireless network and the selection and justification of a proper technique for this facility

• Discussion of the prevention of cyber-attacks and the proper maintenance needed to achieve this goal.

Your well-written paper should meet the following requirements:

• Be six to eight pages in length
• Contain illustrative diagrams for the considered systems
• Include at least five credible external references in addition to the textbook
• Formatted according to APA writing guidelines.

Reference no: EM131380755

Questions Cloud

Suggest ways in which a global marketer is better equipped : Suggest ways in which a global marketer is better equipped to initiate and respond to competitive moves.- Why is the assessment of internal resources critical as early as possible in developing a global strategic plan?
What is joint and several liability : What is joint and several liability? Do you think it is fair that a Defendant may have to pay for more than their ''fair share'' without any guarantee of recovery from the other Defendants
Explain why you believe this is racial discrimination : Franklin hears about people being discriminated against at the workplace and in society but rarely experiences it first hand. Cortez, on the other hand, speaks English poorly and is often subject to derogatory comments from peers and coworkers.Re..
Ways in which multi domestic and global approaches differ : Outline the basic reasons why a company does not necessarily have to be large and have years of experience to succeed in the global marketplace.
Explain existing and potential vulnerabilities and threats : Explain Existing and potential vulnerabilities and threats. Suggestions and discussions of methods or tools that can be used to overcome the existing and potential security threats.
What is corporate social responsibility : What is corporate social responsibility? Provide two examples of corporations that meet that definition of corporate social responsibility and identify what they do that makes them socially responsible
Do men and women develop personality in a different manner : Write in a clear, concise, and organized manner; demonstrate ethical scholarship in the accurate representation and attribution of sources; and display accurate spelling, grammar, and punctuation. Include citations in the text and references at th..
Motivating and leading across borders : Motivating and leading across borders:managing teams and diversity - How to motivate people
What is the process for requesting a disaster declaration : Under the Stafford Act, what is the process for requesting a disaster declaration? What are some key benefits to a county/state once a disaster declaration has been approved?

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd