logo

Report on Information Technology and Security Management

   

Added on  2022-11-25

10 Pages2301 Words119 Views
Healthcare and Research
 | 
 | 
 | 
Running head: REPORT ON INFORMATION TECHNOLOGY AND SECURITY
MANAGEMENT
REPORT
ON
INFORMATION TECHNOLOGY
AND
SECURITY MANAGEMENT
Name of the Student
Name of the University
Author Note:
Report on Information Technology and Security Management_1

IT Security Manegement1
Table of Contents
Part A: Planning, Development and the Management of the Security Policies.........................2
Introduction:...........................................................................................................................2
Description of the application:...............................................................................................2
Identified User-......................................................................................................................2
Doctor-...............................................................................................................................3
Pathologist-........................................................................................................................4
Nurse-.................................................................................................................................4
Conclusion:............................................................................................................................5
Part B: Risk Assessment in Australian Defence Industry..........................................................5
Australian Defence Industry:.................................................................................................5
Identification of the Risk(s):..................................................................................................6
Consequence(s):.....................................................................................................................6
Risk Register:.........................................................................................................................6
Report on Information Technology and Security Management_2

IT Security Manegement2
Part A: Planning, Development and the Management of the Security
Policies
Introduction:
The aim of this report is to discuss an IT system which has been developed in order to
keep the track of patients and which will also help the user to effectively communicate with
the other stakeholders present in the scope of the application. Considering the above
mentioned objectives the Australia Government has expressed their interest towards the
betterment of this application. While discussing the application as well as the user interface
of the application named as “My Health Record” it has been noticed that there are several
users who may use this application with individual purpose. Followed by this is has been
observed that it should incorporate effective data access control as well as security protocol
which will provide protection to the user data. Hence, in this paper a detail elaboration on the
most appropriate access control policies as well as the security policies will be provided
which holds the capability to reduce the risk factors present in the nominated application.
Description of the application:
After investigating the mentioned aspect it has been noticed that the nominated
application “My Health Record” is a digital health record tracking system which gathers as
well as analyses the health records of the users. This system was initially approached by the
Australian Government. Followed by this above aspects it has been noticed that this
approached application will allow the hospitals, doctors, nurse, pathologist as well as the
patients to provide their healthcare information via which it enables the user to check the
health record of particular individual’s. Along with the above feature this application enables
the user to access the healthcare information via online. Followed by these aspects in this
paper it will effectively discuss about the user interface and their operations in this
application (Wheeler et al., 2018). Hence, the discussion on the essential users of this
approached application are mentioned below.
Identified User-
Followed by the purpose to elaborate the user interfaces in the approached application
it has been noticed that there is a significant impact of information access control in this
system as this system includes several users like Doctors, Nurse, Patients and the Pathologist
as well. Hence, it is highly essential to manage and control the information based of the
Report on Information Technology and Security Management_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Report on IT Risk Management
|9
|2558
|296

ITC 596 IT Risk Management Assessment
|8
|2207
|231

Developing System Access Security Policies for Healthcare Organizations
|13
|3040
|271

Security Policy and Risk Management
|14
|2587
|388

Security Access Policy Plan and Risk Assessment for Healthcare Organization and Facebook
|12
|2961
|377

IT Risk Management
|15
|2761
|207