How will the cryptographic protection of static documents

Assignment Help Database Management System
Reference no: EM132553532

CI7300 Data Management and Governance - Kingston University London

Coursework Brief

Part A: Cryptography

A small private healthcare organization has contracted you to investigate the requirements of encryption in their information systems and to develop a robust policy for its use. Write a formal report outlining your findings and presenting your recommendations.

Some topics you could address:

1. The range of documents and messages to be encrypted, e.g. Electronic Health Records (HER), Electronic Patient Records (EPR) and their security requirements.
2. The different objectives of the deployed cryptosystems, i.e. Confidentiality, Integrity, Authentication.
3. The specific cryptographic algorithms and architectures available, along with their relative advantages and drawbacks. Which will be best suited for which purposes?
4. How will the cryptographic protection of static documents (e.g. those stored on a server) differ from that of documents in transit (e.g. transferred within and between sites)?
5. Will there be issues of compatibility between the organization's cryptographic policy, and that of the NHS?
6. How will your solution scale with the possible future development of the organization?
7. How will cryptographic keys (and certificates) be created and managed?
8. How will the different levels of authorization within the organization be managed?
9. How will the effectiveness of your solution be monitored and assessed?

These are only suggestions: your report will likely not cover all of themand you may discover others of equal importance whichyou might want to address. (Please contact the assessor if you have any concerns.) You may draw upon the material taught in class and/or your own independent research, but make sure you cite all your information sources. Feel free to make any assumptions you feel are necessary, but state and justify these.

Suggested word-count:2,000

Part B: Data Governance and Identity Theft

Select an identity theft story from the media or from the literature or stories you heard of or experienced.In order to contain the scope of the assignment, it is suggested you focus on two issues for the Health Information Governance.

In this Part you are required to Identify and discuss the following:

• The strength and weaknesses of the approach that was adopted. Describe the symptoms of what went well or badly.
• What the theory and standards suggest you should do. Based on the course materials or other sources, describe what the theory suggests that you should do.
• Say what you would do if you had time again or if faced with the same problem of Health information governance and network security.

Suggested word-count: 1,500

Part C: Network Security

Network infrastructures allowing access to biomedical information, accounting, and admissions can potentially improve patient care and lower medical costs. However, they also introduce security threats due to malware, unauthorized access and human error.

There are many network security tools available to combat these threats but these are only effective if used in accordance with a well-structured security policy, and monitored and assessed in line with established best practices.

In this Part you are required to:

1. Identify and discuss the specific assets relevant to a typical healthcare network.
2. For a subset of critical assets, identify typical threats and assess vulnerabilities.
3. Building upon the above, perform a risk analysis for this typical healthcare network.
4. Design security controls mitigating the risk as identified. Discuss the strengths and weaknesses of these controls and how they complement each other in an effective secure design.
5. On the basis of this formulate an appropriate basic security policy for an organisation in charge of that network.
Feel free to make any assumptions you feel are necessary, but be sure to state and justify these.

Suggested word-count: 1,000

Report

Each Part will be assessed by a separate report, but these should be combined into a single document for submission. These should include diagrams, tables etc. where appropriate. (Where these are taken from other documents, references should be cited).

Recommended structure (for each individual report)

Introduction
• Background (including technological background).
• The issues which are discussed in your report.
• A brief summary of the report structure.
Main body of report
• Do not call it that - it could be composed of several different sections.
Conclusion and Recommendations
• What lessons were learned from the exercise?
• How are the findings potentially helpful?
References
• All major sources of information should be acknowledged.
• Referencing should be in an appropriate academic style (e.g. Harvard).

Reference no: EM132553532

Questions Cloud

Which statements is true regarding the definition of a fund : Which statements is true regarding the definition of a fund? Resources, related liabilities, and residual equities or balances and changes therein are segregate
Strategic leadership in organizations : How do you or other leaders in your organization communicate the core values? Should this approach be used in education and human services environments?
Why you would recommend the given drug therapy plan : Explain your diagnosis for the patient, including your rationale for the diagnosis. Describe an appropriate drug therapy plan based on the patient's history.
What are the net cash flows for each year : Discounted Payback, Profitability Index, and Modified Internal Rate of Return (MIRR) if the required rate of return is 10%. Should you invest in this asset? Why
How will the cryptographic protection of static documents : How will the cryptographic protection of static documents and How will the different levels of authorization within the organization be managed
White elephant within project management : The authors referred to a "white elephant" within project management. Description of project time and cost estimates and how your WBS impacts those estimates.
Determine the molality of the hcl : Determine the molality of the HCl, the solution has a density of 1.20g/mL
What is the relative humidity : What is the relative humidity %(HR) at the exit of the dryer.Total pression everywhere is 101.3 kPa.
How much energy is required to vaporize : How much energy is required to vaporize 48.7 g of dichloromethane (Ch2Cl2) at its boiling point, if its DHvap is 31.6 kJ/mol?

Reviews

Write a Review

Database Management System Questions & Answers

  Discuss the drawbacks of using database marketing

Discuss the benefits and drawbacks of using database marketing. Articulate reasons why you would implement or exclude the use of database marketing.

  What looping structure is being used

What variables are used this module? What are their data types?

  Write down sql dml statements which address the given

write sql dml statements that address the following requirements 1 update the employees table and give all employees

  Identify why health care delivery systems might be affected

Finally compare and contrast health informatics and health information systems.

  Write an organizational policy

Write an organizational policy or personal policy, if not in the job force to correct the IT-related ethical issue that you described in Paper B1, where you mapped key organizational or personal issues and identified how these digital ethical issu..

  How low coupling and high cohesion enables modular design

Briefly explain how low coupling and high cohesion enables modular design. What is the main difference between a framework and a toolkit?

  Design program that will serve as database for keeping track

You are to design a program that will serve as a database for keeping track of video games and various statistics for the games. This application will allow for the storing of the name of a video game.

  Create and populate a relational database with three tables

Create and populate a relational database with three tables - Write queries with relational algebra such as union, intersect, and difference

  Create an erd that can be implemented for a medical clinic

A patient can make many appointments with one or more doctors in the clinic, and a doctor can accept appointments with many patients.

  Find out what actual operations were performed by surgeon

Find out what actual operations were performed by the surgeon 103. List the surgeon code, the code of the actual operation and the date the operation was performed.

  Distinguishing characteristics of sql and nosql

Define SQL and No SQL.? Outline the distinguishing characteristics of SQL and NoSQL? List and explain the family members of NoSQL database?

  I describe the application that you would like to design

i. describe the application that you would like to design. this should include the purpose of the application and an

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd