Description of the it security information related to case

Assignment Help Management Information Sys
Reference no: EM131189777 , Length: word count:2000

Introduction to Computer Security Assignment - Teamwork Report

Objectives of the assignment - The learning objectives of this assessment task are to:

Work as a team to assess the impact of social engineering attacks in various organisations and analyse the effectiveness of its countermeasures.

Improve the level of security of systems with remote control by using proper access control, authentication, privilege management and encryption methods.

Apply the appropriate use of tools to facilitate network security to prevent various types of computer and network attacks, and malicious software that exists.

Assessment Task Description-

This is a group assessment task with an individual aspect. You are required to work as a team and submit a team work report of approximately 2000 words (maximum) as well as exhibits to support findings and a list of bibliography. This report involves a comprehensive analysis of an organisation, collection of security information based on real scenarios, analysis of the results to determine feasible solutions and writing a complete report detailing a proper defence framework.

This report should consist of:

  • Description of the IT security information related to the case
  • List of major security problems
  • Analysis and presentation of solutions

Purpose and audience:

  • Purpose of the report - to inform and educate
  • Audience for the report - yourself, a family member, a friend

The Scenario: ABC Medical Group-

ABC Medical Group provides healthcare services to regional, rural and metropolitan communities at 50 clinics across Australia. ABC employing 500 personnel that comprises of a combination of allied health professionals including nurses, practitioners, administrators, technologists, etc.

ABC deploys a complex networked system that seamlessly integrates their clinics internet and Intranet. ABC IT Division is responsible for the management of the infrastructure for ABC and the information system of patient medical records, all staff records, and administrative records. Firewalls, antivirus products, intrusion detection systems and security policies are the current security controls use to protect the IT infrastructure and the sensitive records from viruses. Cyber criminals and other threats.

While IT teams have put the current security control in place to minimize the risk and impact of security breaches, they face an increasingly complex IT environment as employees adopt mobile working or use their personal smartphones and tablet computers to work on corporate data.

-Description of the IT security information related to the case

Define and discuss 8 information security related challenges that may be encountered by ABC Medical Group with current security controls, Essentially, determine any vulnerabilities which may exist now or in the future.

Description of the IT security information related to the case

-List of major security problems

1. Research, cite and list 4 security problems which may impact the privacy of patient's information related to a potential information security attack to ABC.

2. Justify your answer to the identified 4 problems and argue convincingly that these attacks can be perpetrated against ABC. Research and cite real world examples which have occurred and been published in the news or research articles.

3. Describe 4 countermeasures that you could apply to protect the patients' information from the 4 identified security problems. Research, cite and locate an array of appropriate use of hardware or digital tools to facilitate network or workstation security to prevent these 4 security problems. Note: our focus will be on the keeping patient information private.

Description of the IT security information related to the case

-Analysis and presentation of solutions

Provide a summary of an approach with recommendations for ABC to improve their privacy of information for patients. This will be used as a short outline which would be used for managers to review. Making reference to any prior beneficial researched statistics, prices and solutions you discovered will be favorable.

This template is intended to be a guide for you to complete the report for assignment. The headings and word count guide for each section has been provided to help you structure your report.

Report Title

Authors

Contents

a) Introduction (100 words)

b) Description of the IT security information related to the case (Approximately 500words)

c) List of major security problems

d) Analysis and presentation of solutions (Approximately 300 words)

e) Conclusion (100 words).

This is an assignment on computer security. It is based on a fictitious company called ABC Medical Group. The assignment has a 2000 word limit.

Reference no: EM131189777

Questions Cloud

Long-term financing needed-long-term debt financing : At year-end 2016, Wallace Landscaping’s total assets were $1.8 million and its accounts payable were $370,000. Sales, which in 2016 were $2.2 million, are expected to increase by 25% in 2017. Total assets and accounts payable are proportional to sale..
Data set on hospital admissions : Using the following data set on hospital admissions, define the service area for Hospital A, based only on quantitative factors
Should the annual stickturn be for production or ssc : What specific techniques will you explain to the Managing Director as being relevant to improve this situation?
Design of a supply chain to ensure strategic competitiveness : You are required to submit a Supply Chain Management assignment. Details of the programme assessment scheme and general information on preparing and submitting assignments.
Description of the it security information related to case : SIT182 Introduction to Computer Security Assignment - Teamwork Report. This report should consist of: Description of the IT security information related to the case, List of major security problems and Analysis and presentation of solutions
Find risk level of stock from your investors point of view : determine the risk level of the stock from your investor's point of view. Indicate key strategies that you may use in order to minimize these perceived risks.
Compare and contrast pf and traditional models of validity : Using the 4 steps outlined by Bornstein how would you assess validity for your chosen construct and selected test to assess that construct?
Show that san francisco sustainability plan is successful : The San Francisco Sustainability Plan, adopted in 1997. Which of the following are environmental indicators used to show that the San Francisco Sustainability Plan is successful?
Describe at least three ways a person can teach : Describe at least three ways a person can teach by example according to the article and provide a personal example in which you have demonstrated this concept.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain about technology trendsexplain the process in

explain about technology trendsexplain the process in detail? i use the internet but is there some other official way

  How is the information collected and managed

Rhode Island HEALTH web data query system: How is the information collected, managed, and retrieved

  Was your social media strategy successful

Let's suppose your current annual sales are $1 million. You implement social media strategy and begin generating $200,000 in revenue through your Facebook page. At the end your sales are still $1 million. Was your social media strategy successful?..

  Global organization importance of quality management

global organization importance of quality management control charts erpchoose an organization delivering goods andor

  Conduct a vulnerability

You are hired to conduct a vulnerability, threat, and security assessment on a web application and submit your clear recommendation for corrective actions based on your assessment.

  You are to select an existing product service or marketing

you are to select an existing product service or marketing campaign currently in effect within the hospitality and

  How can staff be motivated to encourage new behaviours

How can staff be motivated to encourage new behaviours and minimize resistance to change? What are the most typical problems in managing change for information management projects and how can they be minimized?

  Discussions negotiable

Discussions negotiable

  It acquisition performance metricsthe practices associated

it acquisition performance metricsthe practices associated with project success are documented in many books discussed

  Discuss differences that you see between age groups

Write a 3-5 pageAPA style paper on the following-Discuss differences that you see between age groups (generations) in their use of technology. Is there a difference and why or why not

  What mobile devices are and why mobile systems are important

Explain what mobile devices are and why mobile systems are important. Give examples of mobile devices, and, if applicable, name a mobile device you use and why you use it.

  Why would a warehouse be described as a necessary evil

Why would a warehouse be described as a "necessary evil" and Discuss and illustrate the role of warehouses in reverse logistics.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd