Question

In: Computer Science

Tasks After your successful engagement to provide a security and privacy risk assessment for the DAS,...

Tasks

After your successful engagement to provide a security and privacy risk assessment for the DAS, you have again been engaged to develop a Personally Identifiable Information (PII) privacy and personal data protection strategy for the MyLicence portal.

You are to write a report that proposes appropriate policies for DAS in the following areas:

  1. Develop a PII strategy proposal for the DAS MyLicence portal. The strategy should consider the threats and risks to both Privacy and data protection for the PII data collected in the MyLicence portal as well as possible controls to mitigate the identified risks.
  2. Develop a strategy to protect the informal Digital Identity that a user may create in the MyLicence portal. You should consider both the privacy and data protection aspects for a digital identity as well as possible controls to mitigate the identified risks.
  3. Develop a strategy to ensure data sovereignty for the MyLicence portal
  4. Develop a PowerPoint or Google slides presentation that gives a comprehensive overview of the three (3) tasks in a maximum of 30 slides. (20 marks

Solutions

Expert Solution

1.In the licence portal, end user needs to give all the personal information so there is higher chance of mishandling the information, taking to different sites and while entering the text hacker can get the info through your keyboard,there are higher chances for spying the information mainly contact number.These are some of the risks associated with the portal.

To get rid of these risks we can use Encryption method.By encrypting the data we can somehow manage to save the information from hackers.Portal needs to backup the information given by the users.There should be password system to access the licence and this also should be a 2 way password system.As the portal is website there will be many links which takes the user to other phishing pages, to avoid this government has to take the initiative and develop a software that doesn't allow any links in the website.

2. The major threat involved in this digital one is saving the user information and holding it for longer periods,accepting the cookies.

To avoid this firstly we need to avoid uploading the digital ones which are holding sensitive information using drives, any cloud storages because they can backup the data and store it.Never accept the cookies unless reading it thoroughly.Read the cookie popup completely and check what information we are providing to them.After completing the submission, make sure to clear the cookie data from your browser.

3.In this licence portal, as it is a government one most of the user's data will be stored.To make this place safe we need to *encrypt the whole data,

*understand the requirement of the data and get only the relevant and important information from the users.

*None of the data should leave the portal without user action

*They should be perfect authentication system with two way password control.

*As this portal is of renewing the new application, make sure to dispose the old data, media or any information safely.We can do this by overwriting on the information or any kind of physical destruction.

* Advice users to use secure connections, advice user not to use a public network.

* change the keys for the database frequently.

*Advice the user to not share passwords with any person or showcase it.Password should be a confidential one.

Thus, this is a strategy to ensure data sovereignty for Mylicence portal.


Related Solutions

After your successful engagement to develop privacy and personal data protection strategies for DAS, you have...
After your successful engagement to develop privacy and personal data protection strategies for DAS, you have been engaged by the Department of Health (DoH) to advise on the development of privacy and data protection for CovidSafe users. DoH expect up to 16 million Australian mobile users to download and use this app. DoH have announced that they will be using a major U.S. based public cloud provider to host the CovidSafe data, but claim that the data will always be...
You are the privacy and security officer for your facility; your background is HIM and you...
You are the privacy and security officer for your facility; your background is HIM and you are an RHIA with the Certified in Healthcare Privacy and Security (CHPS) credential. You are part of a team that is reviewing the RFPs received from various EHR vendors. Your emphasis in the review will be the privacy and security issues. You know that there are many privacy requirements, some of which are policy related; however, many impact the functionality of information systems. You...
Telemedicine Describe the privacy risk of telemedicine Describe Security safeguard with telemedicine Describe the strategis for...
Telemedicine Describe the privacy risk of telemedicine Describe Security safeguard with telemedicine Describe the strategis for evaluating the Effectiveness of telemedicine
Details on how you can test for risk and conduct a security assessment using CCTV security...
Details on how you can test for risk and conduct a security assessment using CCTV security camera? Also, explain the risk mitigation?
how privacy, security, and ethics in computer system changed your life?
how privacy, security, and ethics in computer system changed your life?
Regarding Risk Assessment Security is imperative in payroll systems. Payroll information security is about more than...
Regarding Risk Assessment Security is imperative in payroll systems. Payroll information security is about more than computer security. It covers a wide range of security measures like protecting the data or information from theft, misuse, natural disasters, social attacks, or hacking. How can we advance the security in payroll transactions? PLEASE MAKE COPY PASTE AVAILABLE
Software security: Assume you are performing preliminary security risk assessment. 1. The first step in performing...
Software security: Assume you are performing preliminary security risk assessment. 1. The first step in performing a preliminary risk assessment is asset identification. List down three assets you identify in an in-store automated supermarket shopping system when conducting the preliminary risk assessment. 2. Identify two possible security risks associated with an in-store supermarket shopping system and propose a system requirement that might reduce each of those risks.
The HIPAA privacy and security rules provide federal protection for individually identifiable health information. Consider a...
The HIPAA privacy and security rules provide federal protection for individually identifiable health information. Consider a physician practice that is transitioning from being paper based to electronic medical records. The receptionist area contains both hanging folders and the desktop computer on which the practice management system runs. During the transition, a patient’s health information (valued asset) will exist in two states: on paper in a hanging folder and in an electronic record on a computer. Identify and evaluate the risks...
Provide your thoughts on the phenomenon of privacy and social media marketing.
Provide your thoughts on the phenomenon of privacy and social media marketing. Your response must consider the issues of social media privacy and be at least two full pages.
Part 2: Software security: (7 marks) Assume you are performing preliminary security risk assessment. 1. The...
Part 2: Software security: Assume you are performing preliminary security risk assessment. 1. The first step in performing a preliminary risk assessment is asset identification. List down three assets you identify in an in-store automated supermarket shopping system when conducting the preliminary risk assessment. 2. Identify two possible security risks associated with an in-store supermarket shopping system and propose a system requirement that might reduce each of those risks.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT