Facility network security

Assignment Help Computer Network Security
Reference no: EM13726874

Facility Network Security: Assessment and Recommendations

You are the chief information technology officer at a small outpatient health care facility in Riyadh. The medical facility employs five specialist physicians, ten certified nurses, five administrative assistants, and two technicians. There are 25 clinical rooms, each equipped with a computer. In addition, five computers are used by the administrative assistants for patient appointments and records. All of these computers are connected using a local area network. Physicians are supplied with portable devices that they can use to write e-prescriptions. These devices are connected wirelessly to the rest of the network.

As the chief information technology officer, you are charged with the task of evaluating the security status of the facility network and developing a report to recommend the directions that should be followed in the near future.

The report should include:

  • Existing and potential vulnerabilities and threats
  • Suggestions and discussions of methods or tools that can be used to overcome the existing and potential security threats
  • Discussion of encryption techniques that can be used for the wireless network and the selection and justification of a proper technique for this facility
  • Discussion of the prevention of cyber-attacks and the proper maintenance needed to achieve this goal.

Reference no: EM13726874

Questions Cloud

What will the dividend be six years from now : Atlas Mines has adopted a policy of increasing the annual dividend on its common stock at a constant rate of 2.75 percent annually. The firm just paid an annual dividend of $1.67. What will the dividend be six years from now?
Explain the general and specific factors found in the case : Case Study-Waste Management, Conduct an external environmental analysis of this case. List and explain the general and specific factors found in the case, and provide an example for each type
How will you make the work of art : Description- describe what you see- imagine that the person you are describing it to is not there or is blind. How will you make the work of art visible through verbal description?
What is the composition of gdp by percentage : What is Country A's GDP, what is the composition of GDP by percentage, what is the GDP per capita and how does this relate to Keynesian economics?
Facility network security : Discussion of encryption techniques that can be used for the wireless network and the selection and justification of a proper technique for this facility, Discussion of the prevention of cyber-attacks and the proper maintenance needed to achieve th..
Develop a paper which includes any ethical concerns : Develop a paper which includes an assessment of any ethical concerns for your intended research topic as well as a brief review of the IRB Application
What is the marginal product of the second worker : What is the marginal product of the second worker and what is the marginal revenue product of the fourth worker?
Why did the corporation request removal : Case study: Dole Food Co. v. Patrickson, Why did the corporation request removal
Case study on brand partiy perception : Case study on Brand partiy perception on the German automotive market

Reviews

Write a Review

Computer Network Security Questions & Answers

  Cryptosystem

Block cipher, Primitive root, Confusion, Diffusion, Digital signature, Conventional Symmetric-Key Encryption

  Security risks associated with social networking sites

Discusses the security risks associated with social networking sites

  What is virtualization

What is virtualization and what are the benefits and tradeoffs and explain at least three common virtual technologies that are used.

  Distinguish physical security from logical security and

question 1 imagine a local financial company just expanded its operations into five branches connected over a broadband

  Mini case: cisco systems

Mini Case: Cisco Systems

  Analyze security requirements and prepare a security policy

Analyze security requirements and prepare a security policy.

  Use the diffie-hellman public-key algorithm

You are Alice. You have agreed with your friend Bob that you will use the Diffie-Hellman public-key algorithm to exchange secret keys. You and Bob have agreed to use the public base g = 19 and public modulus p = 739.

  Write down a 1000- to 1500-word paper on at least three

write a 1000- to 1500-word paper on at least three major information security threats that a specific organization you

  Describe a process that would allow alice to send a message

Suppose that Alice and Bob need to communicate, and have decided to use asymmetric (public key) encryption.

  Key generation of the simplified des algorithm

What is the history of DES and describe the key generation of the Simplified DES algorithm

  Apple inc is known for its state-of-the-art designs for

apple inc. is known for its state-of-the-art designs for products such as the iphone but most are unaware that apple

  Problem on ethereal lab

The basic tool for observing the messages exchanged between executing protocol entities is called a packet sniffer. As the name suggests, a packet sniffer captures ("sniffs") messages being sent/received from/by your computer

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd