Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Introduction to Computer Security Assignment - Teamwork Report

Objectives of the assignment - The learning objectives of this assessment task are to:

Work as a team to assess the impact of social engineering attacks in various organisations and analyse the effectiveness of its countermeasures.

Improve the level of security of systems with remote control by using proper access control, authentication, privilege management and encryption methods.

Apply the appropriate use of tools to facilitate network security to prevent various types of computer and network attacks, and malicious software that exists.

Assessment Task Description-

This is a group assessment task with an individual aspect. You are required to work as a team and submit a team work report of approximately 2000 words (maximum) as well as exhibits to support findings and a list of bibliography. This report involves a comprehensive analysis of an organisation, collection of security information based on real scenarios, analysis of the results to determine feasible solutions and writing a complete report detailing a proper defence framework.

This report should consist of:

  • Description of the IT security information related to the case
  • List of major security problems
  • Analysis and presentation of solutions

Purpose and audience:

  • Purpose of the report - to inform and educate
  • Audience for the report - yourself, a family member, a friend

The Scenario: ABC Medical Group-

ABC Medical Group provides healthcare services to regional, rural and metropolitan communities at 50 clinics across Australia. ABC employing 500 personnel that comprises of a combination of allied health professionals including nurses, practitioners, administrators, technologists, etc.

ABC deploys a complex networked system that seamlessly integrates their clinics internet and Intranet. ABC IT Division is responsible for the management of the infrastructure for ABC and the information system of patient medical records, all staff records, and administrative records. Firewalls, antivirus products, intrusion detection systems and security policies are the current security controls use to protect the IT infrastructure and the sensitive records from viruses. Cyber criminals and other threats.

While IT teams have put the current security control in place to minimize the risk and impact of security breaches, they face an increasingly complex IT environment as employees adopt mobile working or use their personal smartphones and tablet computers to work on corporate data.

-Description of the IT security information related to the case

Define and discuss 8 information security related challenges that may be encountered by ABC Medical Group with current security controls, Essentially, determine any vulnerabilities which may exist now or in the future.

Description of the IT security information related to the case

-List of major security problems

1. Research, cite and list 4 security problems which may impact the privacy of patient's information related to a potential information security attack to ABC.

2. Justify your answer to the identified 4 problems and argue convincingly that these attacks can be perpetrated against ABC. Research and cite real world examples which have occurred and been published in the news or research articles.

3. Describe 4 countermeasures that you could apply to protect the patients' information from the 4 identified security problems. Research, cite and locate an array of appropriate use of hardware or digital tools to facilitate network or workstation security to prevent these 4 security problems. Note: our focus will be on the keeping patient information private.

Description of the IT security information related to the case

-Analysis and presentation of solutions

Provide a summary of an approach with recommendations for ABC to improve their privacy of information for patients. This will be used as a short outline which would be used for managers to review. Making reference to any prior beneficial researched statistics, prices and solutions you discovered will be favorable.

This template is intended to be a guide for you to complete the report for assignment. The headings and word count guide for each section has been provided to help you structure your report.

Report Title

Authors

Contents

a) Introduction (100 words)

b) Description of the IT security information related to the case (Approximately 500words)

c) List of major security problems

d) Analysis and presentation of solutions (Approximately 300 words)

e) Conclusion (100 words).

This is an assignment on computer security. It is based on a fictitious company called ABC Medical Group. The assignment has a 2000 word limit.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M91945863
  • Price:- $75

Guranteed 36 Hours Delivery, In Price:- $75

Have any Question?


Related Questions in Management Information System

Make a power point presentation on conflict resolutionthese

Make a Power Point Presentation on Conflict Resolution. These conflicts can be work related or personal conflicts. Prepare 5 slides and make sure each slide has one academic reference. For each slide, you are only to use ...

Assessment instructionsbriefly detail the appropriate

Assessment Instructions Briefly detail the appropriate business requirements, IT goals, and parameters for your selected organization, and then analyze the security framework and cryptography strategies, physical network ...

Taskyour team task is to address two network security

Task: Your team task is to address two network security problems that this organization's network faces and use scholarly research to help document the findings. Preparing your paper: Your team makes up the nature of Sou ...

Review the key barriers to his implementation found in

Review the key barriers to HIS implementation found in Chapter 7 of Essentials of Health Information Systems and Technology. Discuss the key benefits and value of HIS, and of technology investments and implementations. W ...

Communication and team decision makingpart 1 sharpening the

Communication and Team Decision Making Part 1: Sharpening the Team Mind: Communication and Collective Intelligence A. What are some of the possible biases and points of error that may arise in team communication systems? ...

Differentiate between the browser object model and the

Differentiate between the browser object model and the document object (DOM) model. Recommend three (3) DOM methods that you believe are essential to an effective and efficient Website. List and describe three (3) DOM ob ...

Software quality is a difficult term to define it means

Software quality is a difficult term to define. It means many things to many different people. Do different software programs have different definitions for quality? How would you measure quality?

Case 4 reviews the therac-25 case study and the medical

Case 4 reviews the Therac-25 case study and the medical linear accelerator that occurred between 1985 and 1988. To answer the questions, you should perform additional research, or use your own critical analysis. Please s ...

Case building shared services at rr Case : Building Shared Services at RR Communications

Case : Building Shared Services at RR Communications Discussion Questions 1. List the advantages of a single customer service center for RR Communications. 2. Devise an implementation strategy that would guarantee the su ...

The records are ordered by the date of entry into the union

The records are ordered by the date of entry into the union. The first three lines of the file are: Delaware, DE, 12/7/1787, 1954, 941875 Pennsylvania, PA, 12/12/1787, 44817, 12856989 New Jersey, NJ, 12/18/1787, 7417, 89 ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As