Question

In: Computer Science

For Apple watch, discuss what the appropriate security and controls should be for the device, for...

For Apple watch, discuss what the appropriate security and controls should be for the device, for a smart phone app that reads the device, and for a web site where device readings can be stored and shared with medical personal.   Note: Your device may not currently support all three of these options. If not, assume that such enhancements have been made for the device/system.

Solutions

Expert Solution

Answer)
For Apple watch, the appropriate security and controls should be for the device, which should be there on the smartphone app that reads the device would be:
a) Proper access control using Biometric authentication on the smartphone
b) Encryption of the data on the watch as well on the smartphone
c) Keeping the smartphone app and also the watch app uptodate for security updates

The appropriate security and controls should be for the device, which should be there on the web site where device readings can be stored and shared with medical personnel are:
a) Access control using the user-name password and multi-factor authentication
b) Encryption of the data on the watch and on the website which is stored
c) The website should be secure such as secure and encrypted browsing using https://
d) Keeping the smartphone app uptodate for security updates
e) Sharing should be done in a predetermined and authenticated channel with the sharing with the medical personnel


Related Solutions

For Aira, discuss what the appropriate security and controls should be for the device
For Aira, discuss what the appropriate security and controls should be for the device, for a smart phone app that reads the device, and for a web site where device readings can be stored and shared with medical personal. Note: Your device may not currently support all three of these options. If not, assume that such enhancements have been made for the device/system.
What is your assessment of Apple Watch? Discuss using appropriate concepts and frameworks from your textbook....
What is your assessment of Apple Watch? Discuss using appropriate concepts and frameworks from your textbook. Evaluate the industry as well as Apple’s position in it. What would you recommend to Tim Cook regarding this product? Clearly state your reasoning.(textbook :INTERNATIONAL BUSİNESS 13TH EDITION)
The original, first generation Apple Watch was released in 2015. Although the original Apple Watch was...
The original, first generation Apple Watch was released in 2015. Although the original Apple Watch was designed to compete with various activity trackers at the time, the Apple Watch was sufficiently different for us to assume that there were no close substitutes in 2015. At the launch Tim Cook announced that the Apple Watch would sell for $500 in the United States and Europe. At that price, q was 1,000, where q was number of watches sold in thousands. An...
Create a business proposal for the 'Apple watch'. The proposal should answer these two questions, firstly,...
Create a business proposal for the 'Apple watch'. The proposal should answer these two questions, firstly, who are your target customers? Remember that your resource is limited, and it’s impossible to serve every customer well. Therefore you need to consider who might be your potential customers, and among all the potential customers, and among those, who are the ones you want to invest more in. The second question is how do you differentiate your product or service with those of...
What is the coefficient of demand elasticity for the Apple watch? Is this elastic or inelastic?...
What is the coefficient of demand elasticity for the Apple watch? Is this elastic or inelastic? How do you interpret that coefficient? (Use $349 and $299 in your calculation). The quantity associated with $349 is 177,200. The quantity associated with $299 is 297,200.
Apple company Propose a Product Development Process for Apple Watch
Apple company Propose a Product Development Process for Apple Watch
Consider what you know about Apple products - the iphone, Mac, Apple Watch, etc. Identify their...
Consider what you know about Apple products - the iphone, Mac, Apple Watch, etc. Identify their marketing mix - make sure to include all 4 components - Product, Price, Promotion, and Distribution.
Executives of the Carrot Watch, Inc. (which produces Apple Watch knock-offs) produced the latest watch which...
Executives of the Carrot Watch, Inc. (which produces Apple Watch knock-offs) produced the latest watch which is now ready for distribution. Carrot Watch sells to a wholesaler who then sells to retailers and ultimately end consumers. The following cost information is needed to answer the questions below for Carrot Watch, Inc.: Carrot Watch packaging (direct material and labor) $1.25/each Carrot Watch raw materials for production $4.95/each Software on watch          $12.85/each Rent and Fixed Salaries $275,000 General overhead $250,000 Selling price...
What principles should the information security analyst apply in order to develop appropriate acceptable use policies...
What principles should the information security analyst apply in order to develop appropriate acceptable use policies for the client? Make sure to address confidentiality, integrity, and availability of information. Answer the following please; What should users generally be allowed to do with their computing and network resources? When and why would each example be allowable? What should users generally be prohibited from doing with their computing and network resources? When and why would each example require prohibition? When and why...
What principles should the information security analyst apply in order to develop appropriate acceptable use policies...
What principles should the information security analyst apply in order to develop appropriate acceptable use policies for the client? Make sure you address confidentiality, integrity, and availability of information, as well as each of the following questions: 1-What should users generally be allowed to do with their computing and network resources? When and why would each example be allowable? 2-What should users generally be prohibited from doing with their computing and network resources? When and why would each example require...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT