What are the security concerns you would have and how can you address them? Explain with suitable examples.
What will be an ideal response?
The security issues involved in this system would be:
(a) We would not want an intruder to hack the computer system and gain access to all the patient records. Hence, the data should not be accessible to anyone outside the system. It may be the case that the intruder is not altering the data in any way. Therefore, the prevention of such intrusions is desired as opposed to their detections.
(b) In case, the intruder alters the system data the problem is grave. In this scenario, we need to take preventive action depending on the type of security .aw that occurs. For example, if use encryption, then it will make the system more secure.
(c) There will be a need to authenticate the system user to ensure that he/she is not an intruder. Every member can be assigned a password which can either be entered into a computer or can be punched in the form of a code to gain access of the system resources.
(d) Smart sensors/Surveillance cameras can be employed to detect any
suspicious behavior.
You might also like to view...
Figure 8-2
Based on the accompanying figure, what happens to the three load contacts connected between the three phase power line and the motor after either START button is pressed?
What will be an ideal response?
What is an amphibian?
What will be an ideal response?
How can three-phase capacity be calculated using the line voltages and line current?
What will be an ideal response?
Would it be appropriate to compute a 95% confidence interval for the population standard deviation of the costs? If so, compute it. If not, explain why not.
Refer to Exercise 24. A sample of six repair records for a different type of component was drawn. The repair costs, in dollars, were as follows. 93 97 27 79 81 87