logo

Cryptographic Algorithms for Australian My Health Record System

   

Added on  2022-12-30

6 Pages1809 Words47 Views
Cyber Algorithms 1
CRYPTOGRAPHIC ALGORITHMS FOR AUSTRALIAN MY HEALTH RECORD SYSTEM
By
Student’s Name
Student ID
Course Name
Instructor’s Name
University
City and State
Date

Cyber Algorithms 2
Cyber Algorithms
Introduction
Cyber security is the process of safeguarding servers in a network, computer systems, electronic
devices such as the mobile and the electronic devices, protection of information and computer networks
against the attackers. In the security of the information, Cybersecurity is responsible for the protection
of data privacy and integrity. The data is protected can either be in a database or transit. We can apply
the cybersecurity algorithms in Australian My Health Record - MHR system application to secure the
information in the database and also the data under transit. Implementation of both algorithms of cyber
security which include the symmetrical and asymmetrical we will be able to achieve the appropriate
protection.
Activity 1
The use case and the misuse cases descriptions in MHR
A use case is a description that is written which shows how the users will carry out their duties on the
Australian My Health Record (MHR). The use case describes from the perspective of the user when it
is providing a response as requested. Use cases highlight the number of goals that are considered in
evaluating the complexity and the cost of the system as discussed by Jacobson, Spence and Kerr
(2016).
In the case of the MHR, the use case is highlighting to use the group of people using the website which
includes the doctors, pharmacists and the patients. Furthermore, the use case is describing the goals of
what the doctors want to do in the system, what the patient intends to achieve and what the system
administrator wishes to do. The administrator may decide to allow more data into the system or wipe
out the data present in the database of the system.
Use Cases
The use case is the one that can allow the users to achieve their goal; for instance, the doctor can give a
prescription to a patient on the MHR system. The fourth use case provides the steps to be taken by the
user achieve specific tasks such as the procedures followed when locking into the system by the users
of the MHR system. The last use case the way the website of MHR responds primarily in situations
when information about a patient is required.
Misuse Cases
Misuses case is a situation which occurs when an actor is hostile and poses some risks to the system as
explained by Yoo, Vaca and Kim (2017). The possible misuse cases or the above illustrated use cases
in the MHR system include the failure of the organization to secure the MHR system will attract the
attackers, when a doctor fails to log out of the system when using a public computer, a patient provides

Cyber Algorithms 3
the wrong information, an assumption that a doctor may give a wrong prescription and lastly a misuse
in the MHR system may occur in a situation when the vital data is deleted from the system.
Activity 2
Cryptographic algorithms
Cryptographic algorithms are the algorithms that can be used to in an advanced method which
involves use of mathematical laws in storage and transmission of the information in specific forms
enabling only those connected can access that information as noted by Panda (2016). Symmetric and
asymmetrical are examples of the fundamental algorithms that can be used to establish secure
communication. The symmetrical encryption is a method performing ciphering and deciphering of the
information which makes it a simple form of an algorithm for encryption. It uses a string of various
letters or a number to produce a secret key which is mixed up with a message with a plain text to
transform the composition into a given form. The transmitter and the receiver of the message must have
the key which they will use in encoding and decoding of the word.
Asymmetrical encryption

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
UML and Cryptography
|12
|3025
|447

Cyber Algorithms for Australian MHR System
|26
|780
|240

Case Study Of My Health Record
|16
|3468
|25

Enhancing Cybersecurity | Activity
|11
|1481
|18

Cyber Algorithms Assignment
|10
|1383
|206

The cryptographic algorithm assignment
|9
|1446
|21