Facility network security

Assignment Help Computer Network Security
Reference no: EM13726874

Facility Network Security: Assessment and Recommendations

You are the chief information technology officer at a small outpatient health care facility in Riyadh. The medical facility employs five specialist physicians, ten certified nurses, five administrative assistants, and two technicians. There are 25 clinical rooms, each equipped with a computer. In addition, five computers are used by the administrative assistants for patient appointments and records. All of these computers are connected using a local area network. Physicians are supplied with portable devices that they can use to write e-prescriptions. These devices are connected wirelessly to the rest of the network.

As the chief information technology officer, you are charged with the task of evaluating the security status of the facility network and developing a report to recommend the directions that should be followed in the near future.

The report should include:

  • Existing and potential vulnerabilities and threats
  • Suggestions and discussions of methods or tools that can be used to overcome the existing and potential security threats
  • Discussion of encryption techniques that can be used for the wireless network and the selection and justification of a proper technique for this facility
  • Discussion of the prevention of cyber-attacks and the proper maintenance needed to achieve this goal.

Reference no: EM13726874

Questions Cloud

What will the dividend be six years from now : Atlas Mines has adopted a policy of increasing the annual dividend on its common stock at a constant rate of 2.75 percent annually. The firm just paid an annual dividend of $1.67. What will the dividend be six years from now?
Explain the general and specific factors found in the case : Case Study-Waste Management, Conduct an external environmental analysis of this case. List and explain the general and specific factors found in the case, and provide an example for each type
How will you make the work of art : Description- describe what you see- imagine that the person you are describing it to is not there or is blind. How will you make the work of art visible through verbal description?
What is the composition of gdp by percentage : What is Country A's GDP, what is the composition of GDP by percentage, what is the GDP per capita and how does this relate to Keynesian economics?
Facility network security : Discussion of encryption techniques that can be used for the wireless network and the selection and justification of a proper technique for this facility, Discussion of the prevention of cyber-attacks and the proper maintenance needed to achieve th..
Develop a paper which includes any ethical concerns : Develop a paper which includes an assessment of any ethical concerns for your intended research topic as well as a brief review of the IRB Application
What is the marginal product of the second worker : What is the marginal product of the second worker and what is the marginal revenue product of the fourth worker?
Why did the corporation request removal : Case study: Dole Food Co. v. Patrickson, Why did the corporation request removal
Case study on brand partiy perception : Case study on Brand partiy perception on the German automotive market

Reviews

Write a Review

Computer Network Security Questions & Answers

  What category information is collected by the site

Information has many facets: value, confidentiality, integrity, privacy, legality, and so on. All information is not the same and hence its protection requirements may vary.

  What is the entropy of the plaintext message

A foreign navy has implemented a secure communications system in which submarine commanders transmit a single 5-letter message every day. The messages may only use capital (English) letters, and all messages are equally probable.

  Cybersecurity research paper

Identifying and explaining how the breach occurred and identifying and discussing known or suspected losses of confidentiality, integrity, and availability for information and/or information systems

  Question about communication

Communication is valuable; a main part of this is the ability to provide management the information they required, when they require it.

  Groups of people involved with computer security

What are the many groups of people who are involved with computer security? Name the groups and elaborate on their functions.

  Encrypt the plaintext by using vigenere cipher

Encrypt the following Plaintext using Vigenere cipher: Plaintext: stocks market is falling Key : one. Is Vigenere cipher monoalphabetic or polyalphabetic? Why?

  Explain why you were unable to complete this part

Modify the attached code to include a exportToJSON method within the Cave object. This method should output the JSON version of our Cave, which should be identical to the JSON within Cave.dat for that particular Cave.

  Access control models

Compare and contrast access control models. Select an access control model that best prevents unauthorized access for each of the five scenarios given below

  Determine plaintext and key from affine cipher

Below are given of ciphertext, from Affine cipher. Determine the plaintext and key. Give a clearly written description of the steps you followed to decrypt each ciphertext.

  Appraise the individual and organizational consequences of

1.compare and contrast the mis in place in two distinctly different organizations.2.compare each organizations use of

  Find the sequence obtained by applying successively the

1 encrypt the message buy now using the knapsack cipher based on the sequence obtained from the super-increasing

  Illustrate that signature verification will succeed

If Bob receives M and S, describe process Bob will use to verify signature. Illustrate that in this case signature verification will succeed.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd