logo

Enhancing Cybersecurity | Activity

   

Added on  2022-08-17

11 Pages1481 Words18 Views
Running head: CYBER SECURITY
Cyber security
Name of the Student:
Name of the University:
Author note:

CYBER SECURITY1
Introduction:
The primary goal of the assignment is identification of the algorithmic requirements for
enhancing cybersecurity and other error detection algorithms and correction algorithms for
enhancing the security of the organization [1].
Part A:
Activity 1:
The two processes identified for the MHR scenario are given below:
1. Logging in to the system
2. Accessing the patients’ information for health
Description of the process:
1. Logging in to the system:
This process is developed for authentication of the users in the system. For proper
log in to the system, a user has to provide a proof of its validation by presenting a valid
username and a corresponding password. This plays an important role in the system as it
prevents unauthorized access to the system and its data. Certain actions has to be taken in
order to successfully ‘log in’ to the system and they are:
a. Enter the credentials for logging in
b. Authentication of the log in credentials
The possible malicious actions which can be affect the above actions are given
below:
a. Eavesdropping attack

CYBER SECURITY2
b. Brute force attack
Activity diagrams:
The activity diagram for “entering the login credentials” is give below:
Activity diagram for Brute Force Attack:

CYBER SECURITY3
The activity diagram for “Authentication of the Log in credential”: is given below:
The activity diagram for the “eaves dropping attack” is given in the section below:
2. Accessing the patients’ information for health:
The goal of this process is to permit the valid and authenticate users of MHR
system for accessing the data stowed in the database of the system. The purpose of the

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Algorithms for Australian MHR System
|26
|780
|240

Cyber Algorithms Assignment
|10
|1383
|206

UML and Cryptography
|12
|3025
|447

GNS3 Simulation - Networking
|9
|565
|52

Cryptographic Algorithms for Australian My Health Record System
|6
|1809
|47

Advanced Network Security: Wireshark Analysis, Web Application Attacks, Cryptography Concepts, Trojan Download Research
|12
|1957
|154