Answered step by step
Verified Expert Solution
Question
1 Approved Answer
INFORMATION TECHNOLOGY (IT) - NETWORK SECURITY Onyx Healthcare is a renowned primary provider of private healthcare services in West Malaysia. Onyx Healthcare provides medical specialist
INFORMATION TECHNOLOGY (IT) - NETWORK SECURITY
Onyx Healthcare is a renowned primary provider of private healthcare services in West Malaysia. Onyx Healthcare provides medical specialist services from their multiple hospitals throughout West Malaysia. Due to its affordable and reliable medical treatments, Onyx Healthcare has a huge number of demands coming from Sabah and Sarawak. The management of Onyx Healthcare has decided to expand its service in West Malaysia to reach up to East Malaysia (Sabah and Sarawak). As the Senior Network Security Consultant in Onyx Healthcare, your tasks are to: - Provide the background of the company including the business operations (e.g. running 24/7, multiple data centres) and the security needs (e.g. secure environment for its clients) of the company's network. - Analyse THREE possible internal attacks that can be launched at the company. In your analysis, provide the following for each of the internal attacks identified: a. Description of the internal attack b. Example scenario on how the attack is launched c. Security measure to eliminate the attack - Analyse THREE possible external attacks that can be launched at the company. In your analysis, provide the following for each of the external attacks identified: a. Description of the external attack b. Example scenario on how the attack is launched c. Security measure to eliminate the attack - Propose and discuss THREE key aspects (security controls) of approaching a good cyber security for the company to prevent ethical issues on network security a. FIRST key aspect (security control) of approaching a good cyber security for the company with appropriate example b. SECOND key aspect (security control) of approaching a good cyber security for the company with appropriate example c. THIRD key aspect (security control) of approaching a good cyber security for the company with appropriate exampleStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started