Net Security

Net Security 

Scenario Your company designs medical equipment solutions and has become increasingly concerned with security after a hacker took control of an MRI machine during a patient’s scan. In addition to MRI equipment, they also design pacemakers, defibrillators, monitoring equipment, and medication delivery systems. The company is increasingly concerned that the MRI’s vulnerability may be present in their other devices. Your analysis has found that many of the devices’ problems are associated with weak access authentication mechanisms inherent in the devices because of the need for medical professionals to gain access to the machines (and systems they connect to) without any undue burden in stressful or time-sensitive situations. Another aspect of the problem is a need for attributing modifications and changes to the individual’s creating those changes in order to assure changes are monitored and access is limited to appropriate individuals (i.e. the janitor shouldn’t be capable of giving you an extra shot of morphine). Password sharing has become commonplace and is concerning, so your boss wants you to explore token-based and biometric authentication and then prepare an executive summary of your findings and recommendations. You also need to deliver the pro-con analysis of their uses in the medical field for each of your products. The pro-con analysis should be delivered in the form of a table that shows clearly the positive and negative attributes of each method of authentication for each product line.

  1. Start by sharing the instructions of your paper with us  
  2. And then follow the progressive flow.
  3. Have an issue, chat with us now

Regards,

Cathy, CS.