Discuss and describe the potential security threats

Assignment Help Computer Engineering
Reference no: EM133083

Question

The most important public consulting firm has been tasked with implementing an online patient care system that will allow a military medical facility to electronically provide military patients access to their medical records. The patients contain both active and retired military personnel located all through the world. Included in the system is a social network so patients could share information with each other and provide feedback to the medical facility.

a. Discuss and describe the potential security threats.

b. Identify potential vulnerabilities of such a system and provide your rationale.

c. explain relevant security approaches necessary to protect both patients and the military organization responsible for maintaining the new system.

d. describe the security issues related to outsourcing this work to a consulting firm over having it done in house within a military environment. How would one overcome these issues?

Reference no: EM133083

Questions Cloud

Write down a program on visual basic format : Write down a program on visual basic format
Design a chart that showing input, output, and processing : Design a  chart that showing input, output, and processing
Write a non-recursive version of the process fibonacci : Write a non-recursive version of the process Fibonacci
Write down the definitions for a double-stack structure : Write down the definitions for  a double-stack structure
Discuss and describe the potential security threats : Discuss and describe the potential security threats
Discuss the relevance of the term social citizenship : Discuss the challenges to sustainability of pensions in Mauritius and what can be done to address the challenges Discuss the relevance of the term social citizenship to the provision of welfare state
Identify the security provisions : Identify the security provisions
Discuss how the topology can be used : Discuss how the topology can be used
Describe python modules and packages : Describe Python modules and packages

Reviews

Write a Review

Computer Engineering Questions & Answers

  Examine how computer forensics investigations pertain to law

Examine how computer forensics investigations pertain to law

  Design a data structure which supports two operations

Design a data structure which supports two operations 1. Insert(S, x) inserts x into S. 2. Remove-Duplicates(S) removes from S all duplicated values.

  Write down an account class

Write down an Account Class.

  Write the code used in a for loop

Write the code used in a for loop

  Explain examples of type of knowledge industry

Explain examples of type of knowledge industry

  How to set up or recover cybersecurity

How to set up or recover cybersecurity.

  Plan an er diagram

Plan an ER diagram

  Findout which one is false statement

Findout which one is false statement.

  Program for dissimilar values for real numbers

Program for dissimilar values for real numbers

  How to create a database for music

How to create a database for music? Other entities will be Artist/Group - Attributes will be Name, Year Founded, Origin, Tones and Biography, Track - Attributes will be Number and User's Recommendation and finally Song - Attributes will be Name, ..

  Explain the reason for the project development

Two members of your project development team are differing about relative significance of training and documentation.

  How to produce a function mult-stream

How to produce a function mult-stream.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd