Identity the various security configuration options

Assignment Help Computer Network Security
Reference no: EM13326563

Assignment 1

CIS8004 Enterprise Planning and Implementation 1500 words excluding reference list This written assignment is to be electronically submitted through the EASE system in the CIS8004 Study Desk. Hardcopy or email submission will NOT be accepted.

You have been hired as an Information Systems consultant to examine State Health Centre, a fictitious multi-centre State Government Hospital, with about 20-specialist cardiologists. The centres are East, West, North, South and Central. The State Health Centre offers cardiology related services to affected people. The services include initial screening, ongoing maintenance and periodical treatment. The costs are recovered through subsidies provided by the Government.

The hospital is modern and comes with state-of-the-art technology infrastructure, including wireless systems. The registrar, who is responsible for all patient safety and service quality affairs, wants to revise the IT structure and is especially interested in integrating access to all services through mobile devices inside and beyond the hospital.

Your task is to develop a Business Systems Plan (with full justification as to how these are applicable for the organisation) so as to accommodate mobile access to various services provided by the hospital. Your task is to develop a planning document that details how a mobile access system can be implemented. You can use your imagination but MUST address the following:

1. Any potential customer of the State Health Centre must be able to securely access all information aspects pertaining to services offered using a variety of mobile devices.

2. The planning should involve provision for security, privacy and other user and organizational concerns.

3. Your planning should identity the various security configuration options available on the market.?

4. The planning should include consideration of various operating systems needed for this implementation, and these should be properly segmented and structured.

5. The planning should also indicate a provisional list of expense items. You don't have to provide a costing now, as this will be done in the second assignment.

You will prepare a planning document, in the form of a report, on how the above aspects can be accommodated. The planning document is a report covering all aspects stated above in a succinct manner. You have been given a word limit of 1200 words (excluding references). You must state your assumptions clearly and validate the stated assumptions through proper literature search. You may use any format for the report.

The Internet provides many examples of Executive Type reports, and you are encouraged to search for samples that suit your needs.

Reference no: EM13326563

Questions Cloud

Find the magnitude of the bird watcher displacement : A bird watcher meanders through the woods, walking 0.496 km due east, 0.754 km due south, find the magnitude (in kilometers) of the bird watcher's displacement.
Each business-taking control-taxation and liability issue : For the business below discuss the entity that represents the best choice for each business, taking control, taxation, and liability issues into consideration. Identify laws and regulations each business must consider in starting the business, and id..
Determine what is the problem with the prediction : he human genome project initially predicted 100,000 genes due to the number of proteins found through western blots. When near completion, computer analysis of the sequence predicted only 30,000 genes.
Describe what is happening at cellular and molecular level : If we add 100 ul of 0.5 mg/ml ConA and 100 ul of 1 M mannose to 800 ul of a dilute suspension of red blood cells in ConA buffer, what should we expect to happen
Identity the various security configuration options : Any potential customer of the State Health Centre must be able to securely access all information aspects pertaining to services offered using a variety of mobile devices.
What will be the current through each resistor : What is the effective resistance of a parallel combination of a very large resistance and a very small resistance, what will be the current through each resistor
Find how much of each starting solution do need to use : You want to make one liter of a solution containing 10 mg/ml sodium phosphate, 10 mg/ml sodium chloride, and 10 mg/ml potassium nitrate. How much of each starting solution do you need to use, and how much water do you need to add
Calculate the current and voltage : A 1.5-V battery is connected in series with a 3.3-k? resistor, a 4.7-k? resistor, and a 1.0-k? resistor. Calculate the current (in mA) through and the voltage (in V) across each resistor
What are likely causes of these problems : Describe the problems characterized in this case and what are the likely causes of these problems - what are consequences of these problems for investors, Czech companies, and the Prague Stock Exchange?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Classify vulnerability using the risos model

Classify this vulnerability using the RISOS model, classify this vulnerability using the PA model and justify your answer

  List three key things employees remember on data privacy

List at three key things employees should remember on data privacy, security practices, and the legal implications of data privacy. The document should be something which draws someone to look at it while still maintaining professional appearan..

  Explain flow of information in and configuration of network

For the network that you have chosen to characterize, list the MAC Address, IP Address, IP Subnet Mask, Gateway Information. Based on this information, explain the flow of information in and configuration of this network.

  Implement the s-box functionality as a class

Implement the cipher as a class which implements the provided interface.

  How system derive secret key for des from user-s password

Known risks of the UNIX password system, it has been recommended that the system be replaced by an alternative system that uses public key cryptography, RSA for example. How might the system derive the secret key for DES from the user's login pas..

  Explain security model of class using cnss model

suppose that the security model is required for protection of your class. Using CNSS model, examine each of the cells and write a short statement.

  Question about communication

Communication is valuable; a main part of this is the ability to provide management the information they required, when they require it.

  Why are timestamps used in the kerberos protocol

Why are timestamps used in the Kerberos protocol - When Alice is on a trip, she tries to store an important message in the CEO's account directory.

  Thoughts regarding vulnerabilities surrounding computing

What are your thoughts regarding vulnerabilities surrounding the computing world today and the risks of computers being attacked.

  Use of keys to communicate when alan sends private message

Alan and Beatrice are both users of (PKI)also called public key infrastructure. Describe how they use their keys to communicate when Alan sends a private message to Beatrice

  What are service level agreements

What are Service Level Agreements (SLAs) and why are they a critical component of any IT Outsourcing agreements?

  Security vulnerabilities of vc

single access point (AP), wireless network, CSMA/CA, goals of information security, Wireless LANs, wireless hacking process, Wired Equivalent Privacy (WEP), Open System Authentication and Shared Key Authentication, Initialisation Vector (IV), RADIU..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd