Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Nurses at Home is a fictional visiting nurses’ association. The nurses travel by

ID: 344386 • Letter: N

Question

Nurses at Home is a fictional visiting nurses’ association. The nurses travel by car and visit patients in the patient’s home. Nurses enter medical records using laptops, tablets, and smart phones. The medical records are stored in the cloud.

Describe the vulnerabilities and threats in this scenario.

Describe your recommended controls for this scenario.

Explain your recommendation in detail regarding encryption for this scenario.

Differentiate between whole disk and file encryption and include your recommendation.

Research product offerings on the Internet.

Describe three possible product alternatives including the advantages and disadvantages of each.

Explanation / Answer

Introduction

Day by day human needs are increasing and according to their needs the health care also needs to be changed a lot. It is recognized that every body is different with unique needs and wishes. People also find difficulty to reach health care always due to many ill factors such as poor transport facilities, absence of care taker etc…..In such case the health personnel especially home care nurses visit the patients at their door step. They give care and collect all the data and enter in the mobile devising units for their comfort and for the future references.

In the given scenario the nurse visit the patient and entering the data in her own device and she is travelling by a car to reach the patient site. The Vulnerabilities and recommendations are discussed below:

Vulnerabilities and threat are

                          The resources or personal information of the users can be traced via internal programme data calls or hard coded instructions.

                          Obfuscation is functionality or processing attributes are hidden or in secured from the users.

Other threat such as

Recommendations to control the situation

The health personnel should be available with adequate knowledge and resources and they should be accountable to the work done by them. They need to realize that the data collected by them are other persons personal and the treatment will be based on that.

The person visiting and the institution should have the control over the data enter or collected from the patient.

Requirements

There are three major requirements to secure the data

Difference between whole disk and file encryption

The whole disk encryption is encryption of an entire disk. It is also known as hard drive encryption

File encryption is encryption of specific files. It is also known as content encryption.

Research products offering on the internet

Alternative methods

1. Telecommunications: The patient can get help from home by seeking the medical personnel by television or by phone.

Advantage:     Continuity of care.

Time saving

Protection from theft

Disadvantage: The patient can not feel the direct care.

                          Communication gap

                          Chance for bias

2. Securing with password: The password should be changed periodically

Advantage:    control access to the Authorized person.

Less chance for exploitation

Disadvantage: Need more time

                         Difficult to remember the password

3. Sensor identification: The person who enter and uses the data need to be secure with sensor identification:

Advantage:    control access to the Authorized person.

Less chance for exploitation

Disadvantage: Need more time

                         Expensive

Conclusion

Day by day the electronic device attack vectors are undergoing dynamic changes. there are variety of vulnerabilities and threats. If the person is well trained and skilled it can be prevented and the data can be protected.