3/2/2020 Exam 1 https://psu.instructure.com/courses/2041725/assignments/ XXXXXXXXXX/2 Exam 1 Due Sunday by 11:59pm Points 100 Submitting a file upload Available Mar 1 at 12:01am - Mar 8 at 11:59pm 8...

1 answer below »
please follow the attached paperAND PLEASE MAKE SURE THAT THIS PAPER IF DIFFERENT FROM THE ORDER #51522bacause it will be graded from the same professor


3/2/2020 Exam 1 https://psu.instructure.com/courses/2041725/assignments/11411284 1/2 Exam 1 Due Sunday by 11:59pm Points 100 Submitting a file upload Available Mar 1 at 12:01am - Mar 8 at 11:59pm 8 days Submit Assignment Scenario Your company designs medical equipment solutions and has become increasingly concerned with security after a hacker took control of an MRI machine during a patient's scan. In addition to MRI equipment, they also design pacemakers, defibrillators, monitoring equipment, and medication delivery systems. The company is increasingly concerned that the MRI's vulnerability may be present in their other devices. Your analysis has found that many of the devices' problems are associated with weak access authentication mechanisms inherent in the devices because of the need for medical professionals to gain access to the machines (and systems they connect to) without any undue burden in stressful or time-sensitive situations. Another aspect of the problem is a need for attributing modifications and changes to the individual’s creating those changes in order to assure changes are monitored and access is limited to appropriate individuals (i.e. the janitor shouldn’t be capable of giving you an extra shot of morphine). Password sharing has become commonplace and is concerning, so your boss wants you to explore token-based and biometric authentication and then prepare an executive summary of your findings and recommendations. You also need to deliver the pro-con analysis of their uses in the medical field for each of your products. The pro-con analysis should be delivered in the form of a table that shows clearly the positive and negative attributes of each method of authentication for each product line. Instructions Your response should be roughly 2 pages, double spaced, and your table and references do not count toward that page count. Grading Executive Summary: Did the student provide an executive summary suitable for review by senior management that meets the criteria of being both concise and sufficiently informative? (20 Points) Product Line Analysis: Did the student provide adequate analysis and explanation of the unique characteristics of each product line that may or may not make it a suitable candidate for biometric vs token based authentication? (20 Points) 3/2/2020 Exam 1 https://psu.instructure.com/courses/2041725/assignments/11411284 2/2 Pro/Con Analysis Table: Did the student provide a written analysis of the pros and cons of biometric vs token-based authentication for each product line and present it in the form of a table that allows the reader to easily read and comprehend the material? (20 Points) Recommendation: Did the student provide a recommendation with a supporting justification of their proposed course of action? (20 Points) Presentation/Grammar: Did the student provide cohesive responses and present them in a manner free of spelling and grammatical errors? Were those responses supported by references where appropriate? (20 Points) This is an individual assignment.
Answered Same DayMar 03, 2021

Answer To: 3/2/2020 Exam 1 https://psu.instructure.com/courses/2041725/assignments/ XXXXXXXXXX/2 Exam 1 Due...

Deepti answered on Mar 05 2021
141 Votes
Executive Summary
The target company is aware that the authentication process of its medical equipment is a leading source of adverse events among its clients in health care. Medical theft has become a serious issue in health car
e sector as medical data is vulnerable and easy target for hackers through malware and the like. The current authentication system used by the company is password protection which is highly inefficient with the time sensitivity of attending the patients and unmonitored access control over devices.
Following the company’s concern, this report analyses the biometric and token-based authentication methods among the medical equipment that the company deals in, on the basis of my research and findings. Biometric and token-based authentications are a better choice over password protection mechanism. As per (Lab, 2020) and (Abdullah Alhayajneh, 2018), biometrics offers monitored access control to resources, patient identification solutions and improved privacy (Guanglou Zheng, 2019) in health care even during time-sensitive and urgent situations. It eliminates tokens, cards, PINs and passwords, enhances the workflow, allows more time to care for patients and accomplishes complaint two-factor authentication (Abdullah Alhayajneh, 2018). However, dual-factor authentication is the need of the hour in medical data security due to the sensitivity of the data. Therefore, it is recommended that the company should integrate biometric as well as token authentication in a certain manner with almost all the medical equipment it offers.
Product Line Analysis
MRI: The device provides detailed image of internal body generating images which can’t be taken with X-rays, ultrasound or CT scan. They detect disorders of heart, spine, brain, eye and ear. It measures brain structure and its function without exposing the body to harmful radiations. It uses string magnets during examination. Therefore, patients with any metallic implant like pacemaker cannot undergo MRI scan. The data is highly sensitive so dual-factor authentication should be included.
Pacemaker: It is a battery-powered unit surgically implanted within human body that produces electrical impulses at regular intervals to stimulate the heart of the patient to beat, similar to sinoatrial node....
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here