Explain existing and potential vulnerabilities and threats

Assignment Help Computer Network Security
Reference no: EM131380755

Assignment: Critical Thinking: Facility Network Security: Assessment and Recommendations

You are the chief information technology officer at a small outpatient health care facility in Riyadh. The medical facility employs five specialist physicians, ten certified nurses, five administrative assistants, and two technicians. There are 25 clinical rooms. Each room is equipped with a computer. In addition, five computers are used by the administrative assistants for patients' appointments and records. All of these computers are connected using a local area network. Physicians are supplied with portable devices that they can use to write e-prescriptions. These devices are connected wirelessly to the rest of the network.

As the chief information technology officer, you are charged with the task of evaluating the security status of the facility network and developing a report to recommend the directions that should be followed in the near future.

Your report should include the following materials:

• Existing and potential vulnerabilities and threats

• Suggestions and discussions of methods or tools that can be used to overcome the existing and potential security threats

• Discussion of encryption techniques that can be used for the wireless network and the selection and justification of a proper technique for this facility

• Discussion of the prevention of cyber-attacks and the proper maintenance needed to achieve this goal.

Your well-written paper should meet the following requirements:

• Be six to eight pages in length
• Contain illustrative diagrams for the considered systems
• Include at least five credible external references in addition to the textbook
• Formatted according to APA writing guidelines.

Reference no: EM131380755

Questions Cloud

Suggest ways in which a global marketer is better equipped : Suggest ways in which a global marketer is better equipped to initiate and respond to competitive moves.- Why is the assessment of internal resources critical as early as possible in developing a global strategic plan?
What is joint and several liability : What is joint and several liability? Do you think it is fair that a Defendant may have to pay for more than their ''fair share'' without any guarantee of recovery from the other Defendants
Explain why you believe this is racial discrimination : Franklin hears about people being discriminated against at the workplace and in society but rarely experiences it first hand. Cortez, on the other hand, speaks English poorly and is often subject to derogatory comments from peers and coworkers.Re..
Ways in which multi domestic and global approaches differ : Outline the basic reasons why a company does not necessarily have to be large and have years of experience to succeed in the global marketplace.
Explain existing and potential vulnerabilities and threats : Explain Existing and potential vulnerabilities and threats. Suggestions and discussions of methods or tools that can be used to overcome the existing and potential security threats.
What is corporate social responsibility : What is corporate social responsibility? Provide two examples of corporations that meet that definition of corporate social responsibility and identify what they do that makes them socially responsible
Do men and women develop personality in a different manner : Write in a clear, concise, and organized manner; demonstrate ethical scholarship in the accurate representation and attribution of sources; and display accurate spelling, grammar, and punctuation. Include citations in the text and references at th..
Motivating and leading across borders : Motivating and leading across borders:managing teams and diversity - How to motivate people
What is the process for requesting a disaster declaration : Under the Stafford Act, what is the process for requesting a disaster declaration? What are some key benefits to a county/state once a disaster declaration has been approved?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Identify an assessment of risks associated with collection

Identify and provide an assessment of the risks associated with collection, processing, and storage of confidential client information.

  Drafting a security policy plan

Research and discuss the items that you would place in such a plan, and justify your reasoning for the items that you have decided to include. Research and discuss 3 items that you believe are the most important when drafting a security policy plan..

  Why is network security critical to financial institutions

Why is network security critical to financial institutions? The Blog topic is based on ‘Banks Banking on Network Security' (Closing Case Study Two, Section 11/Plug in B5 - Integrating the Enterprise, IS Function & IS Technologies).

  Create an agency-wide security awareness program

The CISO of the organization reaches out to you, the senior information security officer, and tasks you with creating an agency-wide security awareness program.

  Udp programs to establish a secure communication channel

Write UDP programs allowing two parties to establish a secure communication channel and perform a security analysis for the key exchange protocol

  List and explain key objectives of information security

Information security is used to describe the tasks of protecting information in a digital form. List and explain three key objectives of information security. Also list and explain at least two additional protections (concepts)to present a complete v..

  Assignment on network security policy plan

Research and discuss the items that you would place in such a plan, and justify your reasoning for the items that you have decided to include.

  What is virtualization

What is virtualization and what are the benefits and tradeoffs and explain at least three common virtual technologies that are used.

  Describe the secure communication scenarios

Both IPsec and SSL provide encrypted network communication, but at different layers in the Internet protocol stack, and for different purposes. Compare and contrast these two protocols, and describe the secure communication scenarios they are best..

  Give opinion of most important ways that believe encryption

Give your opinion of the two most important ways that you believe encryption could assist in addressing some of the current challenges facing organizations today, and explain why these solutions are so important. Justify your answer.

  Explain access control methods and attacks

Explain access control methods and attacks

  Explain the potential impact of selected malicious attacks

Explain in detail the potential impact of the three selected malicious attacks. Propose the security controls that you would consider implementing in order to protect against the selected potential malicious attacks.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd