Nurses at Home is a fictional visiting nurses’ association. The nurses travel by
ID: 344386 • Letter: N
Question
Nurses at Home is a fictional visiting nurses’ association. The nurses travel by car and visit patients in the patient’s home. Nurses enter medical records using laptops, tablets, and smart phones. The medical records are stored in the cloud.
Describe the vulnerabilities and threats in this scenario.
Describe your recommended controls for this scenario.
Explain your recommendation in detail regarding encryption for this scenario.
Differentiate between whole disk and file encryption and include your recommendation.
Research product offerings on the Internet.
Describe three possible product alternatives including the advantages and disadvantages of each.
Explanation / Answer
Introduction
Day by day human needs are increasing and according to their needs the health care also needs to be changed a lot. It is recognized that every body is different with unique needs and wishes. People also find difficulty to reach health care always due to many ill factors such as poor transport facilities, absence of care taker etc…..In such case the health personnel especially home care nurses visit the patients at their door step. They give care and collect all the data and enter in the mobile devising units for their comfort and for the future references.
In the given scenario the nurse visit the patient and entering the data in her own device and she is travelling by a car to reach the patient site. The Vulnerabilities and recommendations are discussed below:
Vulnerabilities and threat are
The resources or personal information of the users can be traced via internal programme data calls or hard coded instructions.
Obfuscation is functionality or processing attributes are hidden or in secured from the users.
Other threat such as
Recommendations to control the situation
The health personnel should be available with adequate knowledge and resources and they should be accountable to the work done by them. They need to realize that the data collected by them are other persons personal and the treatment will be based on that.
The person visiting and the institution should have the control over the data enter or collected from the patient.
Requirements
There are three major requirements to secure the data
Difference between whole disk and file encryption
The whole disk encryption is encryption of an entire disk. It is also known as hard drive encryption
File encryption is encryption of specific files. It is also known as content encryption.
Research products offering on the internet
Alternative methods
1. Telecommunications: The patient can get help from home by seeking the medical personnel by television or by phone.
Advantage: Continuity of care.
Time saving
Protection from theft
Disadvantage: The patient can not feel the direct care.
Communication gap
Chance for bias
2. Securing with password: The password should be changed periodically
Advantage: control access to the Authorized person.
Less chance for exploitation
Disadvantage: Need more time
Difficult to remember the password
3. Sensor identification: The person who enter and uses the data need to be secure with sensor identification:
Advantage: control access to the Authorized person.
Less chance for exploitation
Disadvantage: Need more time
Expensive
Conclusion
Day by day the electronic device attack vectors are undergoing dynamic changes. there are variety of vulnerabilities and threats. If the person is well trained and skilled it can be prevented and the data can be protected.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.