Question
Create an executive summary. Your company designs medical equipment solutions and has become increasingly concerned with security after a hacker took control of an MRI
Create an executive summary. Your company designs medical equipment solutions and has become increasingly concerned with security after a hacker took control of an MRI machine during a patient scan. In addition to the MRI equipment they also design pace makers, defibrillators, monitoring equipment and medication delivery systems so are increasingly concerned that the vulnerability with the MRI machine may be present in the other devices. Your analysis has found that many of the problems are associated with weak access authentication mechanisms inherent in the devices because of the need for medical professionals to gain access to the machines (and systems they connect to) without undue burden in stressful and time sensitive situations. Another aspect of the problem is a need to be able to attribute modifications and changes to the individuals making them to assure changes are monitored and access is limited to appropriate individuals i.e. the janitor shouldnt be capable of giving you an extra shot of morphine. The sharing of passwords has become commonplace and of great concern so your boss wants you to explore token-based and biometric authentication and prepare an executive summary of your findings and recommendation. You also need to deliver the pro-con analysis of their use in the medical setting with each of your products. The pro-con analysis should be delivered in the form of a table that shows clearly the positive and negative attributes of each method of authentication for each product line.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started