Explain existing and potential vulnerabilities and threats

Assignment Help Computer Network Security
Reference no: EM131380755

Assignment: Critical Thinking: Facility Network Security: Assessment and Recommendations

You are the chief information technology officer at a small outpatient health care facility in Riyadh. The medical facility employs five specialist physicians, ten certified nurses, five administrative assistants, and two technicians. There are 25 clinical rooms. Each room is equipped with a computer. In addition, five computers are used by the administrative assistants for patients' appointments and records. All of these computers are connected using a local area network. Physicians are supplied with portable devices that they can use to write e-prescriptions. These devices are connected wirelessly to the rest of the network.

As the chief information technology officer, you are charged with the task of evaluating the security status of the facility network and developing a report to recommend the directions that should be followed in the near future.

Your report should include the following materials:

• Existing and potential vulnerabilities and threats

• Suggestions and discussions of methods or tools that can be used to overcome the existing and potential security threats

• Discussion of encryption techniques that can be used for the wireless network and the selection and justification of a proper technique for this facility

• Discussion of the prevention of cyber-attacks and the proper maintenance needed to achieve this goal.

Your well-written paper should meet the following requirements:

• Be six to eight pages in length
• Contain illustrative diagrams for the considered systems
• Include at least five credible external references in addition to the textbook
• Formatted according to APA writing guidelines.

Reference no: EM131380755

Questions Cloud

Suggest ways in which a global marketer is better equipped : Suggest ways in which a global marketer is better equipped to initiate and respond to competitive moves.- Why is the assessment of internal resources critical as early as possible in developing a global strategic plan?
What is joint and several liability : What is joint and several liability? Do you think it is fair that a Defendant may have to pay for more than their ''fair share'' without any guarantee of recovery from the other Defendants
Explain why you believe this is racial discrimination : Franklin hears about people being discriminated against at the workplace and in society but rarely experiences it first hand. Cortez, on the other hand, speaks English poorly and is often subject to derogatory comments from peers and coworkers.Re..
Ways in which multi domestic and global approaches differ : Outline the basic reasons why a company does not necessarily have to be large and have years of experience to succeed in the global marketplace.
Explain existing and potential vulnerabilities and threats : Explain Existing and potential vulnerabilities and threats. Suggestions and discussions of methods or tools that can be used to overcome the existing and potential security threats.
What is corporate social responsibility : What is corporate social responsibility? Provide two examples of corporations that meet that definition of corporate social responsibility and identify what they do that makes them socially responsible
Do men and women develop personality in a different manner : Write in a clear, concise, and organized manner; demonstrate ethical scholarship in the accurate representation and attribution of sources; and display accurate spelling, grammar, and punctuation. Include citations in the text and references at th..
Motivating and leading across borders : Motivating and leading across borders:managing teams and diversity - How to motivate people
What is the process for requesting a disaster declaration : Under the Stafford Act, what is the process for requesting a disaster declaration? What are some key benefits to a county/state once a disaster declaration has been approved?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe data link control

Describe data link control

  Securing of computer forensics evidence

Securing of Computer Forensics Evidence

  Perform a wireless and remote connectivity assessment

Your company, Security Professionals Inc., has been engaged to perform a wireless and remote connectivity assessment and submit a proposal.

  Describe scenarios where there is an it troubleshooting?

Approaches this communication from the perspective of specific technologies the IT technicians can implement to tighten IT security.

  What are ddos attacks

Focus on detection, prevention, and mitigation techniques for DoS or DDoS attacks?

  Discuss the steps necessary to make electronic evidence

Identify and discuss the steps necessary to make electronic evidence admissible in court and identify various crimes and incidents that are involved in electronic forensic investigations.

  Potential security weaknesses of the chosen company

This report identifies the potential security weaknesses of the chosen company and explains potential solutions of the security weaknesses.

  Was the tjx break-in due to a single security weakness

Explain different ways that this program can be sabotaged so that during execution it computes a different sum, for example, 3 to 20.

  Why are anti-social engineering and dumpster diving safeguar

Attackers are becoming more ingenious in their attack methods every day. A part of this evolving methodology is the physical aspect of security. Please respond to all of the following prompts: 1. Why are anti-social engineering and dumpster diving sa..

  Define a secure system in the blp model

How would you define a secure system in the BLP model - A Security Policy is a statement that partitions the states of the system into a set of authorized, or secure, states and a set of unauthorized, or non-secure, states.

  Advantage of partial order on the empirical relation system

What is the advantage of having a partial order on the empirical relation system and  Why is the number of decisions plus 1 an important method for calculating McCabe's cyclamate number?

  Use whois at network solutions to find contact information

Use whois at Network Solutions, netsol.com and/or whois.arin.net to find contact information and DNS servers for one organization. Also find the IP address range for their network. Print your results.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd