1. Homepage
  2. Exam
  3. [2019] COMPSCI5077 Enterprise Cyber Security (M) - Question 3 Redundant Data

[2019] COMPSCI5077 Enterprise Cyber Security (M) - Question 3 Redundant Data

This question has been solved
Engage in a Conversation

3. (a) CourseNana.COM

CourseNana.COM

The management team of Mauchly Hospital have been reviewing the expense in the back-up of medical records associated with patients. The medical records largely comprise of multiple standard forms and letters for each individual patient. Consequently, multiple forms and letters have small changes between them. A typical example is that of an appointment letter where only the address and name are altered for each patient. CourseNana.COM

Mauchly Hospital require a more efficient approach to storage of back-up medical records for patients. The current back-up solution maintains a complete duplicate for each patient. The management want to make efficient use of infrastructure and avoid storage of redundant data and reduce the flow of data over their internal network. CourseNana.COM

Devise and describe an appropriate solution that reduces redundant data in the given context. CourseNana.COM

[8] CourseNana.COM

The management team are concerned about threats to patient privacy that may arise from changes to internal back-up infrastructure. CourseNana.COM

Identify a potential attack that may compromise patient privacy for the proposed solution in (a) and argue for an appropriate solution to the attack. CourseNana.COM

[6] CourseNana.COM

The management team are concerned that any sophisticated solution to reducing redundant data may hamper the organisation to comply with aspects of data protection and privacy. They are particularly concerned about the right of an individual to have their data deleted. CourseNana.COM

Outline how the proposed solution in (a) may be perceived as in conflict with the right of data subjects to be forgotten. Argue how the solution would not conflict with the right to be forgotten. CourseNana.COM

[6] CourseNana.COM

  CourseNana.COM

Get the Solution to This Question

WeChat WeChat
Whatsapp WhatsApp
COMPSCI5077代写,Glasgow代写,Enterprise Cyber Security代写,Exam代写,COMPSCI5077代编,Glasgow代编,Enterprise Cyber Security代编,Exam代编,COMPSCI5077代考,Glasgow代考,Enterprise Cyber Security代考,Exam代考,COMPSCI5077help,Glasgowhelp,Enterprise Cyber Securityhelp,Examhelp,COMPSCI5077作业代写,Glasgow作业代写,Enterprise Cyber Security作业代写,Exam作业代写,COMPSCI5077编程代写,Glasgow编程代写,Enterprise Cyber Security编程代写,Exam编程代写,COMPSCI5077programming help,Glasgowprogramming help,Enterprise Cyber Securityprogramming help,Examprogramming help,COMPSCI5077assignment help,Glasgowassignment help,Enterprise Cyber Securityassignment help,Examassignment help,COMPSCI5077solution,Glasgowsolution,Enterprise Cyber Securitysolution,Examsolution,