Computer and Networks Security: Threats and Risks of Self-Testing Kits and Centralized Systems in the Medical Field
Design a secure system for an imaginary device that tests blood samples for bio-markers and sends the data for analysis and tracking.
17 Pages4086 Words432 Views
Added on 2023-06-03
About This Document
The report highlights the vulnerabilities that may arise from setting up centralized systems in the medical field. Several threats have been identified including; the risk of leaking patient information to third parties, loss of data and denial of service attacks leading to users of the system experiencing delays in accessing the system. The report concludes by suggesting various alternatives to mitigate the risks such as applying encryption and authentication measures on the kits and the centralized system.
Computer and Networks Security: Threats and Risks of Self-Testing Kits and Centralized Systems in the Medical Field
Design a secure system for an imaginary device that tests blood samples for bio-markers and sends the data for analysis and tracking.
Added on 2023-06-03
ShareRelated Documents
End of preview
Want to access all the pages? Upload your documents or become a member.
Cryptographic Algorithms for Australian My Health Record System
|6
|1809
|47
Vulnerability Assessment and Risk Management for Business Continuity
|7
|2478
|153
Healthcare Networks: Technologies, Devices, Recent Developments, Importance of Security, and Mitigation Techniques
|7
|278
|396
IoT in Healthcare: Advantages, Disadvantages, Future Scope and Mitigation Techniques
|10
|638
|407
Logical Network Design for Utopimed
|9
|1738
|432
Medical Devices and the Internet of Things - ITC560
|5
|1036
|104