Question

In: Computer Science

For Aira, discuss what the appropriate security and controls should be for the device

For Aira, discuss what the appropriate security and controls should be for the device, for a smart phone app that reads the device, and for a web site where device readings can be stored and shared with medical personal. Note: Your device may not currently support all three of these options. If not, assume that such enhancements have been made for the device/system.

Solutions

Expert Solution

Device control is a measure of protection that restricted user access to devices. Companies open or block access to devices such as data storage media, including removable devices, CD/DVDs, data transfer devices such as modems, printers, multi-function peripherals, and connection buses such as USB and FireWire. Most device control restricted user access to devices by access rules. Access rules are sets of parameters that identify two functions of the device control component: providing access to specific types of devices for certain group of user during specific time and setting restriction rules on reading and editing files on data storage media.

Companies choose data protection solutions that offer device control and encryption to secure their data and protect their system. The best data protection solutions handle device control and encryption in a variety of ways. Some provide automated, policy based usage control for removable media devices that alert, prompt, or block when identify an attempt at risky behaviour. Other distinguish devices and data by class and allow only authorized individuals to use or access them. Often this is centrally managed, enabling companies to control and enforce security policies as necessary without disrupting workflows.

In present time many customer-facing applications, businesses have trusted their security to coding practices, any number of internal security test and app penetration testing. These are certainly must have capability since the most effective security is about building defence in layer. But these traditional security layer miss completely is protecting the actual app code before it is deployed into a zero-trust world.

Even in case where app protection solutions have been used by businesses to protect mobile application, they can only protect against what is known at the time they are deployed. Most current app security solutions don’t possess the ability to understand how protections are holding up “in the wild” and provide insight into new threats in real time that can be counter in time to stop them before they viral.

In Medical sector or medical person to be help of Internet of Things is the group of devices connected to Internet, to perform the processes and services that support healthcare. IoT is emerged as new technology for e-healthcare that collects vital body parameter of patient and monitor their pathological details by small wearable devices or implantable sensors. IoT has shown great potential in providing a better guarantee for people’s health and support a wide range of applications from implantable medical devices to wireless body area network.

In Health Information Exchange, patient health information can be share electronically with explicit authorization of information exchange in a auditable manner. However, existing approach for authorization in health information systems exhibit several drawbacks in meeting the needs of HIE, with noncryptographic approached lacking a secure and reliable mechanism for access policy enforcement, while cryptographic approach being too expensive, complex, and limited in specify policie. Chandrasekhar et al. HIE which fills the gap between cryptographic and noncryptographic approaches. The system consists of three main components: the HIE cloud, healthcare organizations, and the patients. They developed a novel proxy signature-based protocol, based on a novel discrete log-based trapdoor hashing scheme, to enable authenticated and authorized selective sharing of patient health information via a cloud-based HIE.


Related Solutions

For Apple watch, discuss what the appropriate security and controls should be for the device, for...
For Apple watch, discuss what the appropriate security and controls should be for the device, for a smart phone app that reads the device, and for a web site where device readings can be stored and shared with medical personal.   Note: Your device may not currently support all three of these options. If not, assume that such enhancements have been made for the device/system.
What principles should the information security analyst apply in order to develop appropriate acceptable use policies...
What principles should the information security analyst apply in order to develop appropriate acceptable use policies for the client? Make sure to address confidentiality, integrity, and availability of information. Answer the following please; What should users generally be allowed to do with their computing and network resources? When and why would each example be allowable? What should users generally be prohibited from doing with their computing and network resources? When and why would each example require prohibition? When and why...
Discuss what significant elements should a CPA firm’s methodology for assessing internal controls have? Why is...
Discuss what significant elements should a CPA firm’s methodology for assessing internal controls have? Why is each of these elements important? What risk does the CPA firm run if each of these elements were not included in the assessment of the internal controls process?
Using appropriate literature, properly discuss a specific security threat, and recommend appropriate solution(s). The topic discussion...
Using appropriate literature, properly discuss a specific security threat, and recommend appropriate solution(s). The topic discussion should include at least the following: ▪ Explanation of the security threat. ▪ Impact of the security threat. ▪ Recommended solution ___________________________________________ I choose the topic is : ( computer viruses ) I NEED ONLY THE FITST POINT IS Explanation of the security threat + make sure include distinction between viruses and other typed of malware.
Give an example of a load-bearing orthopedic device. What properties should this device exhibit in order...
Give an example of a load-bearing orthopedic device. What properties should this device exhibit in order to be termed biocompatible? Briefly describe three possible mechanisms of metallic implant corrosion
Discuss the elements of institutional security.  What is an institution in terms of security?
Discuss the elements of institutional security.  What is an institution in terms of security?
Linux Ubuntu 1. Use the appropriate commands to locate the device file used by the device,...
Linux Ubuntu 1. Use the appropriate commands to locate the device file used by the device, mount the filesystem to a directory of your choice, and check the filesystem for errors. 2. Finally, add a line to /etc/fstab to ensure that the filesystem can be easily mounted in the future (this line should not automount the filesystem at boot time). You have to document all your steps and provide the screenshot of your work process.
Security Controls to Protect Assets What are the control measures currently in use to protect against...
Security Controls to Protect Assets What are the control measures currently in use to protect against payroll fraud? What are the vulnerabilities related to payroll fraud found by the risk assessment team? Please make copy paste available Must be 250 words
Accreditation is the evaluation of the security controls of an IT system to establish the extent...
Accreditation is the evaluation of the security controls of an IT system to establish the extent to which a particular design and implementation meets a set of specified security requirements. The risk management strategy used for A&A is depicted in the document, Risk Management Framework. Select ONE of the six steps of the framework illustrated in the Risk Management Framework. In at least 250 words, discuss the following: Identify the step and associated government document. Discuss the importance of the...
Accreditation is the evaluation of the security controls of an IT system to establish the extent...
Accreditation is the evaluation of the security controls of an IT system to establish the extent to which a particular design and implementation meets a set of specified security requirements. The risk management strategy used for A&A is depicted in the document, Risk Management Framework. Select Three of the six steps of the framework illustrated in the Risk Management Framework below: STEPS: 1: Categorize Information System 2: Implement Security Controls 3: Assess Security Controls 4: Select Security Controls 5: Authorize...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT