logo

There are some major risks of IT systems

   

Added on  2022-09-18

17 Pages4107 Words39 Views
Running Head: My Health Record Page 0 of 17
My
Health
Record
Report
Student name

My Health Record Page 1 of 17
Table of Contents
Part one...................................................................................................................... 2
Introduction................................................................................................................ 2
Security policy............................................................................................................ 2
Distributed Denial of Service:...............................................................................3
Social engineering................................................................................................ 3
Phishing................................................................................................................ 3
Plan of Data access policy....................................................................................... 3
Development of Data access policy........................................................................4
Management of Data access policy.........................................................................5
Conclusion.................................................................................................................. 5
Part Two..................................................................................................................... 6
Viruses.................................................................................................................... 6
Social engineering................................................................................................... 6
Conclusion................................................................................................................ 10
References............................................................................................................... 12

My Health Record Page 2 of 17
Part one
Introduction
The Commonwealth Government of Australia is highly focused on the My
Health Record (MHR) system, as it is a necessary part of a human being. The
government has created various rules and regulations for all Australian to register
them in My Health System. There are many advantages of this system to the
government as well as citizens (Nott, 2018). The Australian government has decided
about the online health record of all Australians. It is necessary to know about the
health conditions of that particular person in emergency and other conditions.
There are many benefits of the My Health Record (MHR) system to the
government as well as citizens in their treatment and other things. It provides help
to the doctors and government for the identification of history about the patients.
This report will provide planning of security policy for the MHR system. It will also
describe the development and management of security policy for the MHR system.
Security policy
My Health Record system has collected all the information of a person to
investigate their health and its related issues. Personal data and information have
stored in the system, which is confidential and sensitive, as it is related to the
health of a person. Therefore, security policy requires making all the data and
information safe and securing at the end of the government and the system (Pai &
Huang, 2011).
There are some policies for accessing the data and information from the
databases of the system. In addition, there are some important aspects of citizens
regarding the security of their personal data, such as name, mobile number,
address, credit card details, and health records. Therefore, security policy requires
securing all the data and information from hackers and third parties, as they can
use that data for their personal benefits.

My Health Record Page 3 of 17
Commonwealth government has launched its new program for securing all
the information of the user. It collects their health information in a database, which
is fully secure. It is a government department in Australia. It provides various
facilities to all Australians and various other departments. The organization has its
own IT systems and resources to manage all the resources properly (Hsiao & Hing,
2012). There are some major risks of IT systems of the organization, which areas:
Distributed Denial of Service:
It is a common and highly popular risk of the systems in which hackers block
access to all the services, such as network, computer systems, databases, and
many others. It creates many issues in the systems as well, such as losses of data,
financial losses, and many others (Howard, et al., 2013).
Social engineering
It is another risk of the systems in which anyone can provide their credentials
of a system for different reasons, such as force, personal benefits, and many others.
It makes huge impacts on long-terms on the systems (Goh, Gao, & Agarwal, 2011).
Phishing
It is a common issue of IT system in which hacker sends many emails to
identify information about the authentication of the system.
Plan of Data access policy
Data can be accessible for only limited users, which have proper
authentication of access to that data, such as a particular person, administrator,
operator, doctors, hospitals, and government. The main role of this policy is the
security of data. The government must consider this policy and create plans to
implement high level of security using cybersecurity.
The government should use an international framework for security overall
systems from different types of attacks, such as cyber-attacks, cybercrimes,
malware, viruses, phishing, social engineering, and many more (Osman, 2018).
There are some resources required for the implementation of security of data
centers and other processes, which are a high level of firewalls, IDS/ IPS systems,
and secure network. Planning is important for security policy. Therefore,

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Case Study Of My Health Record
|16
|3468
|25

My Health Record (MHR)
|4
|849
|68

Health Promotion and Policy Task
|7
|1490
|18

Nursing Debate Australia Topic 2022
|6
|1337
|32

My Health Record System: Advantages, Security Controls and Lessons from Singapore Data Breach
|14
|3749
|225

Enhancing Cybersecurity | Activity
|11
|1481
|18