Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

INFORMATION TECHNOLOGY (IT) - NETWORK SECURITY Onyx Healthcare is a renowned primary provider of private healthcare services in West Malaysia. Onyx Healthcare provides medical specialist

INFORMATION TECHNOLOGY (IT) - NETWORK SECURITY

image text in transcribed

Onyx Healthcare is a renowned primary provider of private healthcare services in West Malaysia. Onyx Healthcare provides medical specialist services from their multiple hospitals throughout West Malaysia. Due to its affordable and reliable medical treatments, Onyx Healthcare has a huge number of demands coming from Sabah and Sarawak. The management of Onyx Healthcare has decided to expand its service in West Malaysia to reach up to East Malaysia (Sabah and Sarawak). As the Senior Network Security Consultant in Onyx Healthcare, your tasks are to: - Provide the background of the company including the business operations (e.g. running 24/7, multiple data centres) and the security needs (e.g. secure environment for its clients) of the company's network. - Analyse THREE possible internal attacks that can be launched at the company. In your analysis, provide the following for each of the internal attacks identified: a. Description of the internal attack b. Example scenario on how the attack is launched c. Security measure to eliminate the attack - Analyse THREE possible external attacks that can be launched at the company. In your analysis, provide the following for each of the external attacks identified: a. Description of the external attack b. Example scenario on how the attack is launched c. Security measure to eliminate the attack - Propose and discuss THREE key aspects (security controls) of approaching a good cyber security for the company to prevent ethical issues on network security a. FIRST key aspect (security control) of approaching a good cyber security for the company with appropriate example b. SECOND key aspect (security control) of approaching a good cyber security for the company with appropriate example c. THIRD key aspect (security control) of approaching a good cyber security for the company with appropriate example

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions