Determine what security is necessary for protection

Assignment Help Other Subject
Reference no: EM133212107

Assignment - Authentication Best Decision Questions

To determine what type of authentication is best for different assets in different scenarios, one must first understand certain aspects surrounding the asset. To do this, one must know information regarding the identification, authentication, authorization, and the accountability related to the asset, as well as whether a physical or logical control is appropriate (Kim & Solomon, 2016, p. 315-316). Questions are good to answer to help with basic analysis: who, when, where, why, and how help to determine what security is necessary for protection. In many cases, a combination of physical and logical controls are implemented to ensure multi-layers of security.

1. For a doctor performing on-site clinical applications, the most appropriate type of access control would be utilizing a biometric method based on a physical or behavioral trait as a physical control. Protected health information must be kept confidential and with the practice being on-site, it makes the most sense to incorporate a personal control that is unique to that person who is on the spot. A code or a token would work as well, however, because those can be stolen and used to access the information, a biometric control is the safest for this scenario.

2. For an online patient portal, it is important for the patient themselves to hold the identifying information and be ablet to access it easily from their home or office as a logical control. A username and password set up by the user would be appropriate for this scenario. It would allow the flexibility to identify oneself online easily. Recently, more sites are having users integrate a Multi-Factor Authentication (MFA) method to ensure even more security for their medical information (Kim & Solomon, 2016, p. 326).

3. In a scenario regarding access to corporate intranet for professionals, especially dealing with proprietary information, it becomes even more important to control who has access to the information and utilizing a discretionary access control should be used for this. In this case, it is important to understand who needs access and how they can access such information. This should be protected using both physical and logical controls such as a security token as well as a personal pin or passcode. It is also important to be able to cut off someone's access immediately if found to be accessing the information for nefarious reasons or if they no longer have "need to know" level authorization.

Reference no: EM133212107

Questions Cloud

How has your learning in this course : How has your learning in this course (the impact of the reading-writing connection and language acquisition) modified your self-knowledge
Identify which of the leadership theories : Identify the leader and his/her primary approach, then explain what brings you to this conclusion (provide your rationale... be sure to tie your rationale
What other risks could your business face : What other risks could your business face as a result of non-compliance with cybersecurity and privacy laws applicable to your industry
Identify at least types of workplace information : Describe methods for checking information is clear, accurate, current and relevant for purpose and What is workplace information? Describe using your own words
Determine what security is necessary for protection : To determine what type of authentication is best for different assets in different scenarios, Determine what security is necessary for protection
Create a supportive work environment : Describe two (2) separate instances when you created a supportive work environment by valuing the diversity in the workplace.
What does a capstone powerpoint contain : What does a capstone powerpoint contain, can you share an example of any old capstone, does the slides describe each subject
Understand the difference between the two : Distinguish between surface-level diversity and deep-level diversity. Why is it important to understand the difference between the two?
Summarize the planning management principle utilized : Summarize the planning management principle utilized in the pages of the reading. How do you see this management principle manifested in your life?

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd