Related security requirements

Assignment Help Basic Computer Science
Reference no: EM132691605

Case Study:

You are a consultant working with a dental office that has just merged with another dental practice. The original office housed three dentists, two dental assistants, and one receptionist in one location. With the merger, there are now five offices in different parts of the city, 15 dentists, 12 dental assistants, and five receptionists. Four of the dentists work in the offices but also are mobile in that they provide dental checkups to elderly patients in their homes or at the senior citizen centers, and to school children in the three inner-city elementary schools. The mobile dentists need to be able to send and receive patient records while they are out of the office. All the dentists and dental assistants must have real-time access to all patient records and daily schedules. The lead dentist has reminded you that they are required to meet HIPAA requirements for protecting patient information. You, as a telecommunications specialist, have been asked to design the telecommunications network to support this new multi-location practice. Others on the team will develop the applications and databases. Your task is to identify the requirements and design a network solution that will meet those requirements.

Analyze the given case and provide a clear set of solutions for the network solution.

Identify the information that is to be protected and the related security requirements.

Identify the network components, security hardware, devices and equipment that would be involved in meeting the needs of the stationary offices and the mobile dentists.

Unit 2 1: Analyze the Business Problem

Analyze the given case and provide a clear set of solutions for the network solution.

Identify the information that is to be protected and the related security requirements.

Identify the network components, security hardware, devices and equipment that would be involved in meeting the needs of the stationary offices and the mobile dentists.

Reference no: EM132691605

Questions Cloud

Advice on providing constructive peer reviews : Review the problem statement and provide feedback using the Learning Resource ‘Advice on providing constructive peer reviews - Advice on providing constructive
Explain consequences of the growth of ai : Provide two positive and two negative examples that are consequences of the growth of AI. Explain your rationale or criteria for your conclusions.
Organizations have problems patching vulnerabilities : What are some of the reasons why organizations have problems patching vulnerabilities
Functional areas of a business organization to collaborate : 1) It is intended to focus the attention on three key issues for business organizations in general, and operations management in particular. Those issues are
Related security requirements : Identify the information that is to be protected and the related security requirements.
Analyze the leader actions through the lens : Analyze the leader's actions through the lens of the motivational theories and argue that the leader's actions were appropriate or inappropriate in the context
Determine the asset turnover ratio : A company reports the following: Sales $2,250,000 and Average total assets 1,500,000. Determine the asset turnover ratio
Main objectives of supply chain management : What are the main objectives of Supply Chain Management? Explain how SCM contributes/Value ads in achieving the competitive position of a company
Determine the times interest earned ratio : Acme Company reports the following: Income before income tax $250,000. Determine the times interest earned ratio

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What information system security is

What information system security is? What Mapping Microsoft Windows and applications into a typical IT infrastructure is?

  National framework for protecting critical infrastructure

Chapter 1 provided a high-level overview of the need for a national framework for protecting critical infrastructure.

  Information governance reference model diagram

In order to interpret the Information Governance Reference Model (IGRM) diagram. It is recommended that we start from the outside of the diagram.

  Visual logic flowchat and psuedocode help

Visual Logic flowchat and psuedocode help

  Prepare your advice for this company

What are the critical points, other than cost, that you need to consider in order to prepare your advice for this company? Your report to SoftArc should be about 2 pages

  Significant invention which shaped society today

Pondering history of technology development, decide what you think was the most significant invention previous to the 1600s which has shaped society today. Explain your decision.

  How will the software impact the production environment

Evaluate and select a security tool for recommendation that you learned about in the iLabs modules or the EC-Council text books.

  Payment card industry data security standard

How Enterprise Risk Management (ERM) is being leveraged to comply with one regulatory standard, Payment Card Industry Data Security Standard

  Organization in terms of implementing security policy

What are the three domains of the IT risk framework? Why is the policy framework important to your organization in terms of implementing security policy?

  Cryptography-confidentiality-integrity authentication

Cryptography provides confidentiality, integrity authentication and nonrepudiation for sensitive information while it is stored, traveling across network

  Whatever happened to object-oriented databases

Whatever Happened to Object-Oriented Databases?", do you agree with the position that an object-oriented database is a niche market?

  Example of an invalid seating order

Provide a seating order that conforms to the above rules. An example of an invalid seating order is:

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd