How you wish to undertake your presentation

Assignment Help Computer Networking
Reference no: EM131965425

Assignment: Wireless and Mobile Computing Security

Case Study

Background

Bradford Hospital is a (fictitious) hospital located in Perth, Western Australia with approximately 600 beds, 50 administration staff, and 3 employees in charge of the IT infrastructure. Employees within Bradford Hospital have been voicing their continual interest in being able to connect various portable devices such as smart phones, tablets, network storage and laptops to the network. The employees have been suggesting that by connecting these devices to the network it would allow them to manage patient data, upload records, as well as being able to review patient files while on the move.

The head administrator of the hospital has concerns regarding the security of such a proposal and has asked external consultants to prepare a series of reports on the matter. At the same time the head administrator feels that it may be an effective way to improve patient care. At this point in time, the head administrator is unaware of any other hospitals such a model and as a result would be interested in knowing other approaches in hospitals utilising similar practices.

Task

The deliverable for this case study is a presentation and report that addresses the graduate attributes of: communication skills, critical appraisal skills and ability to generate ideas. The assignment can either be completed individually or in a group of two. A group of two will be required to produce twice the amount of work as a single person.

Your task is to select one topic from modules 3 to 12 on Blackboard as shown below and email your lecturer/tutor no later than close of business 20th March 2018 with your selection any group members (if any).

Note the difficulty of topics increases as the week's progress. You should specify which of these you have covered in your writeup as well.

• Mobile Device Management
• Evaluating Mobile Device Management Systems
• Mobile Device Security Policies
• Wireless Vulnerabilities
• Mobile Application Security
• Mobile Device Forensics
• Wireless Intrusion Detection Systems/Wireless Intrusion Prevention Systems etc...

Each module has weekly lecture notes and a recording already created to introduce you to the topic and point you in the right direction. Based on the topic and the background you are to develop a presentation which will show the head administrator the positive and negative aspects of allowing employees to utilise portable computing devices at work. If for instance, you are undertaking the wireless vulnerabilities topic, you would then need to show the dangers and potential threats, how they can eventuate and at the same time mitigated.

You may also contrast this with case studies of other hospitals or medical facilties and examine the mitigation strategies that they have employed.

It is entirely up to you as to how you wish to undertake your presentation and what you wish to include. You should go beyond the scope of simply presenting what is available in the weekly lecture/audio material. You should review existing systems and examine publicly accessible case studies. You may like to undertake in-class demonstrations or activities relevant to the topic.

Both On-campus and Off-campus students will prepare a full business report of their chosen topic in relationship to the case scenario above which they will have to upload on Blackboard Off-campus students will be required to create a video/audio recording of their slides which will subsequently be shown in the lecture time slot also. Audio/video recording will need to be submitted to Blackboard at least 1 day prior to the date of the presentation.

Reference no: EM131965425

Questions Cloud

Create and execute a test plan for your proposed design : In the final part, create and execute a test plan for your proposed design (1500-1800 words). The design may include a web-based project management tool
Calculate the company cost of equity capital : David Ortiz Motors has a target capital structure of 30% debt and 70% equity. The yield to maturity on the company's outstanding bonds is 11%.
Computing the current share price of the stock : DBP Inc. just paid a dividend of $2.50. The expected growth rate of dividend is 5 percent. The required return for investors in the first three years.
What day does this stock begin trading ex? dividend : What? change, if? any, would you expect in the price per share when the stock begins trading on the? ex-dividend day?
How you wish to undertake your presentation : It is entirely up to you as to how you wish to undertake your presentation and what you wish to include. Evaluating Mobile Device Management Systems.
How much would school fees be when goes to australia : Datin wishes to consult you for a professional finance solution. She wishes to send her son to an Australian university that charges total school fees.
Explain what options sandra sharp clothes has : Explain what options Sandra Sharp Clothes has and discuss how you think that Sandra Sharp Clothes should proceed.
Current culture in the twenty-first century : What new ideas and scientific explorations shape our current culture in the twenty-first century?
Compute the current price of the bond : Katie Pairy Fruits Inc. has a $3,400, 13-year bond outstanding with a nominal yield of 15 percent (coupon equals 15% × $3,400 = $510 per year).

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd