Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

please fill out the table Medical Device Pros Cons MRIs Token: Biometric: Token: Biometric: Pacemaker Token: Biometric: Token: Biometric: Defibrillator Token: Biometric: Token: Biometric: Monitoring

image text in transcribed

please fill out the table

Medical Device

Pros

Cons

MRIs

Token:

Biometric:

Token:

Biometric:

Pacemaker

Token:

Biometric:

Token:

Biometric:

Defibrillator

Token:

Biometric:

Token:

Biometric:

Monitoring Equipment

Token:

Biometric:

Token:

Biometric:

Medication Delivery

Token:

Biometric:

Token:

Biometric:

Your company designs medical equipment solutions and has become increasingly concerned with security after a hacker took control of an MRI machine during a patient's scan. In addition to MRI equipment, they also design pace makers, defibrillators, monitoring equipment, and medication delivery systems. The company is increasingly concerned that the MRI's vulnerability may be present in their other devices. Your analysis has found that many of the devices' problems are associated with weak access authentication mechanisms inherent in the devices because of the need for medical professionals to gain access to the machines (and systems they connect to) without any undue burden in stressful or time sensitive situations. Another aspect of the problem is a need for attributing modifications and changes to the individual's creating those changes to assure changes are monitored and access is limited to appropriate individuals (i.e. the janitor shouldn't be capable of giving you an extra shot of morphine). Password sharing has become commonplace and is concerning, so your boss wants you to explore token-based and biometric authentication and then prepare an executive summary of your findings and recommendations. You also need to deliver the pro-con analysis of their uses in the medical field for each of your products. The pro-con analysis should be delivered in the form of a table that shows clearly the positive and negative attributes of each method of authentication for each product line

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Oracle 10g SQL

Authors: Joan Casteel, Lannes Morris Murphy

1st Edition

141883629X, 9781418836290

More Books

Students also viewed these Databases questions