CS6P05 Data Breach Monitoring For Medical Information Assignment Sample

A comprehensive assignment sample detailing the development, implementation, and evaluation of a data breach monitoring system for medical information in healthcare organizations.

  •  
  •  
  •  
  • Type Assignment
  • Downloads540
  • Pages8
  • Words1978

Chapter 1: Introduction

1.1 Project Topic and Rationale

This project specially aims at creating a Data Breach Monitoring System for medical information system in healthcare organizations while demonstrating how an assignment help service can guide through such advanced academic and technical topics. The move from paper to digital systems that characterizes the conversion from traditional paper health records to electronic health records brings about both potential benefits and harms. The move toward electronic health records is to advance the health of patients, facilitate advancement in clinical decision support and enable integration of care teams (Attaran, 2022). At the same time, this advancement has led to more exposing of sensitive health data to different forms of cyber threats like outsider hackers. The need for this project arises from the rising number of common and severe data breach occurrences in the healthcare domain. A breach of data can result to financial losses, reputational loss and at worse patient harm. For instance, illegal access to patient’s files may lead to invasion of privacy, interruption of the health services provision or perhaps lead to major financial and organizational losses. Huge numbers of security measures such as encryption, multi-factor authentication, and staff educations are in place, but compliance remains low, and systems remain at risk (Butpheng et al 2020). This is not just about identifying when breaches occur but about constantly scanning for them in the hope that to respond in real-time to minimize the damage. This project is intended to solve the problem by implementing an automated monitoring system that will automatically detect, alert and handle the unauthorized attempts to access the desired medical data more securely.

1.2 Project Aims and Objectives

This project intends to design and develop a data breach monitoring system to monitor and prevent a data breach of medical information in real-time for faster response by healthcare institutions. The system will use Splunk for logs monitoring and for exposing patterns associated with suspicious activities that can be notified regarding access to patient data.

Objectives

  • To Assess the financial, reputational, and operational effects of data breaches on healthcare institutions.
  • To identify potential weaknesses within healthcare information systems that could be exploited by cyber attackers.
  • To develop a continuous monitoring system that can detect and respond to unauthorized access attempts in real time.
  • To Investigate and refine current user authentication practices, focusing on multi-factor authentication, biometric verification, and password policies to improve overall security.

1.3 Methodology

Approach to this project involves using elements of software engineering to produce a structured and methodical data breach monitoring system from the knowledge of threats.

Risk Profile Analysis: In the first stage, it involves developing awareness of the risk exposures that are likely to cause loss of data in healthcare facilities. This entails appreciation of some of the most widely practiced risks that are associated with systems that include weak passwords, limited encryption, or restricted access control (Rani et al 2023). Based on case studies and discussions with privacy officers and health care security specialists the project will try to create a risk picture that defines main threats concerning medical information systems.

System Design and Tool Selection: The next step that follows is choosing of the right tools and technology to use in putting up the monitoring system. The central technology selected for the current project is Splunk a data analysis tool for log data processing that can collect and analyze data from multiple sources in real-time (Ratta et al 2021). It will then be compared with other monitoring tools to fit the system appropriately. At the same time, encryption software (for examples, VeraCrypt) and multi-factor authentication (MFA) will be implemented for the purpose of boosting the general security system.

Proactive Monitoring and Response: The system will be developed in a way to periodically check the user activity on the patents record and pattern match against the normal usages, if they don’t match then it will trigger the alert (Khanra et al 2020). The project will identify parameters of so-called ‘normal’ and ‘abnormal ‘behaviour that will enable the system to alert security personnel of any attempted intrusions.

Policy and Procedure Development: Policies and Procedures for dealing with breaches when they are being witnessed will also be developed (Sheikh et al 2021). Such compliance tools will entail matters such as reaction to incidents, data handling, GDPR compliance and employee training.

This broad approach guarantees the robust implementation of the health-care monitoring system, and incorporates organizational and technical issues in the ensuring of an efficient and perpetuating defense against data violation.

1.4 The Report Structure

The report is structured as follows: Chapter 2: Background Research reviews previous literature on monitoring data breaches focusing on Challenges, technologies, and practices in healthcare. Chapter 3: Requirements Analysis and Specification provides the system with functional and non-functional specifications, features, users and security measures. Chapter 4: Software Design describes the technology environment and exactly how the breaches will be managed and responded to. Chapter 5: Conclusion and Suggestion for Future work presents the main findings in the writing, it also provides some recommendations for further enhancement of the system. In maintaining an organized approach to the project, each of the chapters is developed based on the other in sequence.

Chapter 2: Background Research

This chapter provides a critical review of related work, and products with an aim to demonstrate a specialist understanding of the project topic, including its fundamentals and the state-of-the-art, i.e. the current developments and potential areas (i.e. “gaps”) for future development.

The review of the related work provides the context for the project work within the chosen topical area and relate the project to what is already known and available. As a result, the scope of the project can be determined.

Further, the chapter also reviews and describes relevant theories, methods and software/tools, which will be used in the project. Alternative options are discussed, and choices are justified.

It is very important to note that your review should not be simply a description of what others have published in the form of a set of summaries, but should take the form of a critical discussion, showing insight and an awareness of differing arguments, theories and approaches. It should be a synthesis and analysis of the relevant and up to date published work, relating at all times to your own purpose and rationale.

This chapter includes the following main contents.

2.1 Literature review of related work

2.2 Critical evaluation of related products/solutions

2.3 The scope of the project

2.4 Review and justification of theories/models/development platforms/tools selected for use in the project

Below is an example of a figure with a reference, which will automatically be pickup by the Word generator of the List of Figures.

Literature Review Process

Figure 1: Literature Review Process, Dawson (2015), p.92

Chapter 3: Requirements Analysis and Specification or
Problem Analysis and Specification

This chapter is eliciting what your system is required to do, not how it will do it.

If you develop a software, a structured approach should be used to determine the requirements of the system/ program or the investigation being conducted. There are several techniques particularly in the area of software design to assist in this process, and you are recommended to use a technique appropriate to your project, but which ensures that you fully analyse the system you are designing and fully understand its requirements.

This chapter should be concluded with a detailed and unambiguous specification of your software requirements (functional and non-functional requirements). Use cases technique is recommended for eliciting and representing the functional requirement.

If your project is of an investigative type, the result of the problem analysis should be a clear problem statement with a detailed problem description, research hypothesis, and key research questions.

Below is an example of a figure with a reference, which will automatically be pickup by the Word generator of the List of Figures.

Planned Software Development Tasks based on the BRIDGE process

Figure 2: Planned Software Development Tasks based on the BRIDGE process, Jalloul (2012 ), p.51

Chapter 4: Software Design or Research Methodology Design

(Approximately 50% of the “final” complete system/solution detailed design)

The chapter outlines the software and/or research design that you have drafted from your work done in the Autumn semester.

It is crucial that you should have got very clear ideas and the details of what you are going to implement or investigate in the next stage of your project process.

The chapter’s contents and sections’ headings may vary depending on the specifics of your project.

EITHEROR
For a project of the software development type, the following sections must be included. For a project of the investigative type, the contents below can be used as the starting points. Please discuss with your supervisor for further guidelines. Recommended reading: Section 5.5 Methodology Chapter, page 83 from Breach M., 2008, Dissertation Writing for Engineers and Scientists.
Software Design 4.1 User-Interface design e.g. using mock-up screens 4.2 Database tables’ structure design 4.3 Main components of the software architecture Research Methodology Design 4.1 Application of chosen theories/methods 4.2 Decision on what sample datasets are 4.3 Data analysis models, e.g., which statistical models, neural network models, etc. 4.4 How the results will be analysed

Chapter 5: Summary and Future work

5.1 Summary of the development to date

5.2 Any reflections and lessons learned

Reflection upon personal development, legal, social, ethical and professional issues (LSEP).

CS6P05 Data Breach Monitoring For Medical Information Assignment Sample
Liked This Sample? Hire Me Now
Michael Brown
Michael Brown 4.5 reviews 7 Years | MSc

Provide a clear indication of measures that you are considering in order to ensure a successful completion of the project.

5.3 Remaining work

Details of the remaining work.

Strategy to complete them.

Briefly discuss any risks associated with your plan.

References

  • Attaran, M., 2022. Blockchain technology in healthcare: Challenges and opportunities. International Journal of Healthcare Management, 15(1), pp.70-83.
  • Butpheng, C., Yeh, K.H. and Xiong, H., 2020. Security and privacy in IoT-cloud-based e-health systems—A comprehensive review. Symmetry, 12(7), p.1191.
  • Rani, S., Chauhan, M., Kataria, A. and Khang, A., 2023. IoT equipped intelligent distributed framework for smart healthcare systems. In Towards the Integration of IoT, Cloud and Big Data: Services, Applications and Standards (pp. 97-114). Singapore: Springer Nature Singapore.
  • Ratta, P., Kaur, A., Sharma, S., Shabaz, M. and Dhiman, G., 2021. Application of blockchain and internet of things in healthcare and medical sector: applications, challenges, and future perspectives. Journal of Food Quality, 2021(1), p.7608296.
  • Sheikh, A., Anderson, M., Albala, S., Casadei, B., Franklin, B.D., Richards, M., Taylor, D., Tibble, H. and Mossialos, E., 2021. Health information technology and digital innovation for national learning health and care systems. The Lancet Digital Health, 3(6), pp.e383-e396.
  • Khanra, S., Dhir, A., Islam, A.N. and Mäntymäki, M., 2020. Big data analytics in healthcare: a systematic literature review. Enterprise Information Systems, 14(7), pp.878-912.

Bibliography

Note: The items listed in this section are relevant publications you read and found useful but have not been cited or referred in the report’s body text.

Harvard style is recommended.

Author’s Surname, Initials. (Year of publication). Title. Edition (if not the first). Place of publication: Publisher.

Examples:

  • Bennett, McRobb, Farmer. (2010) Object-Oriented systems analysis and design using UML, 4th edition. London: McGraw-Hill.
  • Breach, M. (2008). Dissertation Writing for Engineers and Scientists. Harlow: Pearson Education Ltd.
  • Connolly, T., Begg, C. (2014) Database Systems- A Practical Approach to Design, Implementation, and Management (6th ed.). Upper Saddle River, N.J: Pearson.
  • Dawson, C. (2015). Projects in Computing and Information Systems - A Student Guide, 3rd Edition. Harlow: Pearson Education Ltd.
  • De Oliveira , J., Bruchet M. (2017). Learning ASP.NET Core 2.0. Birmingham: Packt Publishing.
  • Hughes, B. (2012). Project Management for IT-related Projects. London: BCS Publications.
  • Jacobson, Booch and Rumbaugh. (1999) The Unified Software Development Process. Upper Saddle River, NJ: Addison-Wesley.
  • Jalloul, G (2012). UML by Example. Cambridge: Cambridge University Press.
  • Müller M. (2018). Practical JSF in Java EE 8 : Web Applications in Java for the Enterprise. New York City: Apress.
  • Pfleeger, C. P. et al. (2015). Security in Computing, 5th edition. Harlow: Pearson.
  • Rothman, D. (2018). Artificial Intelligence By Example: Develop machine intelligence from scratch using real artificial intelligence use cases. Birmingham: Packt Publishing.
  • Sommerville, I. (2016). Software Engineering, 10th Edition. Harlow: Pearson
  • Stallings, W. and Brown, L. (2018) Computer Security: Principles and Practice, Global Edition, 4/E. Harlow: Pearson Education.
  • Turban, E., Sharda, R., Delen, D., 2010, Decision Support and Business Intelligence Systems, 9th edition. Upper Saddle River, N.J: Pearson.
  • Welling L. and Thomson, L. (2017). PHP and MySQL Web Development, 5/E. Upper Saddle River, NJ: Addison-Wesley.

Recently Downloaded Samples by Customers

Employability And Wealth Creation Applying Mwc Assignment Sample

Introduction Get free samples written by our top-notch subject experts by taking the Assignment Helper service from Rapid...View and Download

Finance for Decision Making Assignment Sample

Introduction Financial decision making is an important factor of business management. In this report, the Pedaltrain Ltd. is a...View and Download

U18655 Financial Reporting Assignment Sample

Introduction: U18655 Financial Reporting U18655 Financial reporting is defined as the process through which effective...View and Download

HR6UK15O Leadership and Change Management Assignment Sample

Introduction to Leadership and Change Management Skill auditing is essentially a review of the knowledge and skills that...View and Download

Case Study Of The Success Of Tesco Amidst Covid-19 Assignment Sample

Chapter 1: Introduction Get free samples written by our Top-Notch subject experts for taking online Assignment...View and Download

5HR02 Talent Management and Workforce Planning Assignment Sample

Introduction: Strategic Talent Management and Workforce Planning Talent management and workforce planning are articulated...View and Download

Get 55% Off on Black Friday - Limited Time Academic Offer