logo

Secure Encryption Technologies Assignment

   

Added on  2021-04-21

13 Pages2437 Words101 Views
Data Science and Big Data
 | 
 | 
 | 
Running Head: SECURE ENCRYPTION TECHNOLOGIESSecure Encryption TechnologiesName of the StudentName of the University
Secure Encryption Technologies Assignment_1

1SECURE ENCRYPTION TECHNOLOGIESTable of Contents1.0 Project Overview.......................................................................................................................22.0 Client Overview.........................................................................................................................23.0 Scope..........................................................................................................................................34.0 Project Assessment Report........................................................................................................34.1 Introduction................................................................................................................................34.2 Project Findings.........................................................................................................................34.3 Project Recommendations.........................................................................................................44.4 Possible OHS Concerns.............................................................................................................55.0 Project Analysis and Design......................................................................................................55.1 Project Estimated Duration........................................................................................................55.2 Target Audience.........................................................................................................................55.3 Mock-Up Design.......................................................................................................................66.0 Project Management..................................................................................................................76.1 Preliminary Evaluation of Technologies...................................................................................76.2 Project Timeline.........................................................................................................................76.3 Budget......................................................................................................................................106.4 Copyright and Legal Issues.....................................................................................................107.0 Project Sign Off.......................................................................................................................10References......................................................................................................................................12
Secure Encryption Technologies Assignment_2

2SECURE ENCRYPTION TECHNOLOGIES1.0 Project OverviewThe project is based on the development of data encryption system for RCH in order toprotect sensitive information of their patients that are stored in their online database. In theprevious system, data was managed manually and stored in the form of paper documents.However, the hospital has now developed information system and all the patient information isnow stored in online virtual media. In addition, when the doctors and nurses travel to otherhealthcare facilities of the hospital, they carry the information in their electronic devices likelaptops and smartphones. Due to the lack of sufficient security measures, it is risky to carry suchinformation in the devices (Gupta & Singh, 2015). If the devices somehow get stolen, thesensitive and secure information may be broken by some other people for unethical use. Hence,this project aims to deliver a suitable encryption technology that will help to secure such data andinformation from falling to the hands of the wrong individuals.2.0 Client OverviewThe client Royal Children’s Hospital (RCH) provides healthcare care assist to children inMelbourne, Australia since 1870. Although the hospital initiated its services in one buildingonly, with the growing number of healthcare requirements of children, the hospital has openedseveral other branches including emergency locations, specialty care centers and outreach clinicsin other parts of the city as well as other nearby cities. The company is fully committed toproviding healthcare assistance to the children of Australia and has expanded their services inorder to treat more children within more area coverage.
Secure Encryption Technologies Assignment_3

3SECURE ENCRYPTION TECHNOLOGIES3.0 ScopeThe scope of the project includes the following.Analyzing the type of data to be protected is within the scope of the project.Analyzing the available encryption techniques is within the scope of this project.Selection of a suitable encryption tool is within the scope of the project.4.0 Project Assessment Report4.1 IntroductionThe project looks to address the data security problem faced by the travelling doctors andnurses of the hospital who carry secure and sensitive patient information in their laptops whilemoving from one facility to another. The main security risk is that if the laptop somehow getsstolen or if an individual attempts phishing on the laptop, they may be able to access the sensitiveinformation that they may misuse. Hence, the suggested solution for this issue is to apply asuitable encryption technique that will protect the sensitive information from unauthorizedaccess.4.2 Project FindingsIn order to complete the project, some suitable encryption techniques are to bedetermined and evaluated. After that, analyzing the requirement for the client, the most suitableencryption technique should be chosen and implementation plan has to be prepared.From the findings of initial analysis, the following possible encryption technologies havebeen found.
Secure Encryption Technologies Assignment_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Implementation of Secure Encryption Technologies
|11
|2460
|38

Project Management Plan
|16
|1976
|1

Healthcare Networks: Technologies, Devices, Recent Developments, Importance of Security, and Mitigation Techniques
|7
|278
|396

Overview of Network Security in Healthcare Industry
|9
|2269
|418

THE DEVELOPING POLICY
|6
|1084
|17

Information Systems and Big Data Analysis - BSC (Hons) Business Management with Foundation
|9
|2303
|112