logo

The cryptographic algorithm assignment

   

Added on  2022-07-28

9 Pages1446 Words21 Views
Running head: Cyber Algorithm
CYBER ALGORITHM
Name of the Student
Name of the University
Author Note

Cyber Algorithm1
Table of Contents
Introduction:...............................................................................................................................2
Description:................................................................................................................................2
Activity 1:...............................................................................................................................2
Activity 2:...............................................................................................................................4
Activity 3:...............................................................................................................................6
Recommendation:......................................................................................................................6
Conclusion:................................................................................................................................7
References:.................................................................................................................................8

Cyber Algorithm2
Introduction:
This report is divided into three activities. The first activity provides different use
cases and their functionality within the system, the second activity can display a brief survey
on the cryptographic algorithm and the last activities provide a recent cryptographic
algorithm.
Description:
Activity 1:
5 use cases that can allow different users to interact with the MHR system.
1. Share patient health information.
2. Log in to the system.
3. Access patients' health information.
4. Write prescription.
5. Recommend patient to the specialists.
The possible misuse cases for those use cases
1. Share health information among the wrong patient.
2. Sharing login credentials among another doctor.
3. Access patients for illegal purpose.
4. Write incorrect prescription.
5. Wrong specialists’ recommendation.
Selecting Single-use case and providing the situation
Log in to the system:

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
UML and Cryptography
|12
|3025
|447

Cryptographic Algorithms for Australian My Health Record System
|6
|1809
|47

Cyber Algorithms for Australian MHR System
|26
|780
|240

Cyber Algorithms Assignment
|10
|1383
|206

Enhancing Cybersecurity | Activity
|11
|1481
|18

Network Security: Concepts and Techniques
|11
|718
|27