Description of the it security information related to case

Assignment Help Management Information Sys
Reference no: EM131189777 , Length: word count:2000

Introduction to Computer Security Assignment - Teamwork Report

Objectives of the assignment - The learning objectives of this assessment task are to:

Work as a team to assess the impact of social engineering attacks in various organisations and analyse the effectiveness of its countermeasures.

Improve the level of security of systems with remote control by using proper access control, authentication, privilege management and encryption methods.

Apply the appropriate use of tools to facilitate network security to prevent various types of computer and network attacks, and malicious software that exists.

Assessment Task Description-

This is a group assessment task with an individual aspect. You are required to work as a team and submit a team work report of approximately 2000 words (maximum) as well as exhibits to support findings and a list of bibliography. This report involves a comprehensive analysis of an organisation, collection of security information based on real scenarios, analysis of the results to determine feasible solutions and writing a complete report detailing a proper defence framework.

This report should consist of:

  • Description of the IT security information related to the case
  • List of major security problems
  • Analysis and presentation of solutions

Purpose and audience:

  • Purpose of the report - to inform and educate
  • Audience for the report - yourself, a family member, a friend

The Scenario: ABC Medical Group-

ABC Medical Group provides healthcare services to regional, rural and metropolitan communities at 50 clinics across Australia. ABC employing 500 personnel that comprises of a combination of allied health professionals including nurses, practitioners, administrators, technologists, etc.

ABC deploys a complex networked system that seamlessly integrates their clinics internet and Intranet. ABC IT Division is responsible for the management of the infrastructure for ABC and the information system of patient medical records, all staff records, and administrative records. Firewalls, antivirus products, intrusion detection systems and security policies are the current security controls use to protect the IT infrastructure and the sensitive records from viruses. Cyber criminals and other threats.

While IT teams have put the current security control in place to minimize the risk and impact of security breaches, they face an increasingly complex IT environment as employees adopt mobile working or use their personal smartphones and tablet computers to work on corporate data.

-Description of the IT security information related to the case

Define and discuss 8 information security related challenges that may be encountered by ABC Medical Group with current security controls, Essentially, determine any vulnerabilities which may exist now or in the future.

Description of the IT security information related to the case

-List of major security problems

1. Research, cite and list 4 security problems which may impact the privacy of patient's information related to a potential information security attack to ABC.

2. Justify your answer to the identified 4 problems and argue convincingly that these attacks can be perpetrated against ABC. Research and cite real world examples which have occurred and been published in the news or research articles.

3. Describe 4 countermeasures that you could apply to protect the patients' information from the 4 identified security problems. Research, cite and locate an array of appropriate use of hardware or digital tools to facilitate network or workstation security to prevent these 4 security problems. Note: our focus will be on the keeping patient information private.

Description of the IT security information related to the case

-Analysis and presentation of solutions

Provide a summary of an approach with recommendations for ABC to improve their privacy of information for patients. This will be used as a short outline which would be used for managers to review. Making reference to any prior beneficial researched statistics, prices and solutions you discovered will be favorable.

This template is intended to be a guide for you to complete the report for assignment. The headings and word count guide for each section has been provided to help you structure your report.

Report Title

Authors

Contents

a) Introduction (100 words)

b) Description of the IT security information related to the case (Approximately 500words)

c) List of major security problems

d) Analysis and presentation of solutions (Approximately 300 words)

e) Conclusion (100 words).

This is an assignment on computer security. It is based on a fictitious company called ABC Medical Group. The assignment has a 2000 word limit.

Reference no: EM131189777

Questions Cloud

Long-term financing needed-long-term debt financing : At year-end 2016, Wallace Landscaping’s total assets were $1.8 million and its accounts payable were $370,000. Sales, which in 2016 were $2.2 million, are expected to increase by 25% in 2017. Total assets and accounts payable are proportional to sale..
Data set on hospital admissions : Using the following data set on hospital admissions, define the service area for Hospital A, based only on quantitative factors
Should the annual stickturn be for production or ssc : What specific techniques will you explain to the Managing Director as being relevant to improve this situation?
Design of a supply chain to ensure strategic competitiveness : You are required to submit a Supply Chain Management assignment. Details of the programme assessment scheme and general information on preparing and submitting assignments.
Description of the it security information related to case : SIT182 Introduction to Computer Security Assignment - Teamwork Report. This report should consist of: Description of the IT security information related to the case, List of major security problems and Analysis and presentation of solutions
Find risk level of stock from your investors point of view : determine the risk level of the stock from your investor's point of view. Indicate key strategies that you may use in order to minimize these perceived risks.
Compare and contrast pf and traditional models of validity : Using the 4 steps outlined by Bornstein how would you assess validity for your chosen construct and selected test to assess that construct?
Show that san francisco sustainability plan is successful : The San Francisco Sustainability Plan, adopted in 1997. Which of the following are environmental indicators used to show that the San Francisco Sustainability Plan is successful?
Describe at least three ways a person can teach : Describe at least three ways a person can teach by example according to the article and provide a personal example in which you have demonstrated this concept.

Reviews

Write a Review

Management Information Sys Questions & Answers

  define the technology or business phenomenon

Define the technology or business phenomenon, Analyze how the technology or phenomenon has shaped or will shape relevant industries

  How fulfill the forensics needs of an organization

Imagine you are the CIO of an organization. Construct an outline of four ongoing responsibilities that the digital forensics personnel must complete each week. Provide a possible scenario for how each responsibility may be performed to fulfill the..

  Franchisee how can a franchisee grow their businesshow can

franchisee how can a franchisee grow their business?how can a franchisee grow his or her business?...advertises for and

  Technology industry and research methods

Technology Industry and Research Methods - Draw at least one comparison and one distinction or contrast between the two.

  Logistics provider traditional and virtual3-4 pages is

logistics provider traditional and virtual3-4 pages is required1. compare and differentiate the functions normally

  Analyze the fundamental impact of it architecture

Analyze the fundamental impact of IT architecture or enterprise architecture on information management for your chosen company or industry. Determine if IT architecture impacts the effectiveness or efficiency of information management and vice ver..

  What are some of the shifters and potential substitutes

What are some of the shifters and potential substitutes and complements for the smaller rural hospitals.

  Prepare a presentation on information systems and

prepare a presentation on information systems and organizational changesfirst it is important to understand what

  Impact analysis of related and competing technologies

Write a 3- to 4-page draft paper to cover the impact analysis of related and competing technologies, with respect to ERP systems

  Describe the scope and analyze how to control the scope

Define relevant terms that will be used throughout project. Describe the scope and analyze how to control the scope. Identify possible risks, constraints, and assumptions.

  Requirements for entry into the apple app store

Provide a description of the requirements for entry into the Apple App Store. This is for an app that finds healthcare providers based on user search criteria

  Explain workforce planning as to its purpose

Explain workforce planning as to its purpose. Describe methods for conducting workforce planning and detail desired outcomes.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd