Part 3 - Secure Strategy Factory Imagine a system that handles medical patient records and all. The records are compressed and encrypted using different algorithms and different keys for different sections of the record. The system is designed to allow different users to extract copies of patient records and patient bills based on their user credentials. In this system, there are four classes of users: 1. Patient 2. Primary Care Physician 3. Consulting Physician 4. Administrative Professional There are three levels of patient record that can be produced (extracted and decrypted from one stored record): 1. Patient level (available to the Patient) 2. Primary Care level (available to the Primary Care Physician) 3. Consulting level (available to the Consulting Physician) There are two levels of patient bills that can be produced (extracted and decrypted from one stored record): 1. Patient level (available to the Patient and Administrative Professional) 2. Medical Staff level (available to the Primary Care Physician. Consulting Physician and Administrative Professional) Part 3 - Assignment 1. Implement the system using the Secure Strategy Factory design pattern from the SEI Secure Design Patterns report, drawing the UML class diagram for the pattern portion of the system. (Hint you are going to have to have two strategies, one for patient records and one for patient bills). 2. Code the pattern objects in Java. As we will not actually be running the system. I'm will not be grading based on a clean compile, but instead on an understanding of how the pattern and the security logic work. looking for logic in the code methods. Part 3 - Secure Strategy Factory Imagine a system that handles medical patient records and all. The records are compressed and encrypted using different algorithms and different keys for different sections of the record. The system is designed to allow different users to extract copies of patient records and patient bills based on their user credentials. In this system, there are four classes of users: 1. Patient 2. Primary Care Physician 3. Consulting Physician 4. Administrative Professional There are three levels of patient record that can be produced (extracted and decrypted from one stored record): 1. Patient level (available to the Patient) 2. Primary Care level (available to the Primary Care Physician) 3. Consulting level (available to the Consulting Physician) There are two levels of patient bills that can be produced (extracted and decrypted from one stored record): 1. Patient level (available to the Patient and Administrative Professional) 2. Medical Staff level (available to the Primary Care Physician. Consulting Physician and Administrative Professional) Part 3 - Assignment 1. Implement the system using the Secure Strategy Factory design pattern from the SEI Secure Design Patterns report, drawing the UML class diagram for the pattern portion of the system. (Hint you are going to have to have two strategies, one for patient records and one for patient bills). 2. Code the pattern objects in Java. As we will not actually be running the system. I'm will not be grading based on a clean compile, but instead on an understanding of how the pattern and the security logic work. looking for logic in the code methods