3/2/2020 Exam 1 https://psu.instructure.com/courses/2041725/assignments/ XXXXXXXXXX/2 Exam 1 Due Sunday by 11:59pm Points 100 Submitting a file upload Available Mar 1 at 12:01am - Mar 8 at 11:59pm 8...

1 answer below »
Please follow the instruction on the attached file pleaseThank you


3/2/2020 Exam 1 https://psu.instructure.com/courses/2041725/assignments/11411284 1/2 Exam 1 Due Sunday by 11:59pm Points 100 Submitting a file upload Available Mar 1 at 12:01am - Mar 8 at 11:59pm 8 days Submit Assignment Scenario Your company designs medical equipment solutions and has become increasingly concerned with security after a hacker took control of an MRI machine during a patient's scan. In addition to MRI equipment, they also design pacemakers, defibrillators, monitoring equipment, and medication delivery systems. The company is increasingly concerned that the MRI's vulnerability may be present in their other devices. Your analysis has found that many of the devices' problems are associated with weak access authentication mechanisms inherent in the devices because of the need for medical professionals to gain access to the machines (and systems they connect to) without any undue burden in stressful or time-sensitive situations. Another aspect of the problem is a need for attributing modifications and changes to the individual’s creating those changes in order to assure changes are monitored and access is limited to appropriate individuals (i.e. the janitor shouldn’t be capable of giving you an extra shot of morphine). Password sharing has become commonplace and is concerning, so your boss wants you to explore token-based and biometric authentication and then prepare an executive summary of your findings and recommendations. You also need to deliver the pro-con analysis of their uses in the medical field for each of your products. The pro-con analysis should be delivered in the form of a table that shows clearly the positive and negative attributes of each method of authentication for each product line. Instructions Your response should be roughly 2 pages, double spaced, and your table and references do not count toward that page count. Grading Executive Summary: Did the student provide an executive summary suitable for review by senior management that meets the criteria of being both concise and sufficiently informative? (20 Points) Product Line Analysis: Did the student provide adequate analysis and explanation of the unique characteristics of each product line that may or may not make it a suitable candidate for biometric vs token based authentication? (20 Points) 3/2/2020 Exam 1 https://psu.instructure.com/courses/2041725/assignments/11411284 2/2 Pro/Con Analysis Table: Did the student provide a written analysis of the pros and cons of biometric vs token-based authentication for each product line and present it in the form of a table that allows the reader to easily read and comprehend the material? (20 Points) Recommendation: Did the student provide a recommendation with a supporting justification of their proposed course of action? (20 Points) Presentation/Grammar: Did the student provide cohesive responses and present them in a manner free of spelling and grammatical errors? Were those responses supported by references where appropriate? (20 Points) This is an individual assignment.
Answered Same DayMar 03, 2021

Answer To: 3/2/2020 Exam 1 https://psu.instructure.com/courses/2041725/assignments/ XXXXXXXXXX/2 Exam 1 Due...

Neha answered on Mar 06 2021
143 Votes
Student Name
Topic
Executive Summary
This report is all about the medical equipment and their security. This report includes soluti
on for the issue of security breaching. The company faced a case of MRI machine hacking during a patient’s scan. The scanned report was not as it was expected. Someone hacked the machine and the report was altered. This is a concerned topic which needs a solution soon. The company design multiple equipment like pacemakers, defibrillators, monitoring equipment and medication delivery system along with the MRI machine. A pacemaker is related with the functioning of heart. If someone hacks the pacemaker then the life of the patient can be controlled. This report talks about this issue in brief along with the possible solutions. The equipment should have strong authentication access with out wasting any time. The biometric authentication system and token-based system can be used based on their pros and cons for different machines.
Product Line analysis
The MRI machine is very vulnerable to the cyberattacks. This device is mainly connected with the hospital network which makes it possible for the attackers to exploit the vulnerability (Fotopoulos, V., Stavrinou, M. L., & Skodras, A. N). This may result in target the devices infrastructure and components. We can use token-based authentication...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here