讲解:CSC8202、WEB、web、HTMLR|Database

INFORMATION SECURITY AND TRUST (CSC8202)MODULE COURSEWORKDeadline: 22nd November 2019ScenarioHealth 123 are a UK-based company. Health 123 are developing a Web application. Basedon symptoms entered by the user, their gender and their date of birth, the application willprovide a recommended course of action for treatment. The course of action for treatmentwill include the specific service to contact (e.g. Emergency Department) and the urgencywhich with the service should be contacted. Health 123 are planning to supply periodicusage summaries from their application to another UK-based company, Health 456. Theseusage summaries will contain details of the queries made by users and include: the locationof user, their symptoms, gender and date of birth and the date/time on which they madethe query. Health 456 will use the usage summaries to design and deliver health services.Selected data flows and processing activities are illustrated in the diagram below.User Health 123 Health 4561. User Registration DetailsEmail Address, Telephone Number, Password,Gender, Date of Birth8. Usage Summary Details[(Location, [Symptom], Date/Time, Gender, Age)]2 INFORMATION SECURITY AND TRUST (CSC8202) MODULE COURSEWORKQuestionsAnswer the questions below using the information provided for the scenario.You must answer ALL questions in BOTH parts.Part One[50 marks](1) Describe the process of user authentication that is used within the application.[10 marks](2) Health 123 are planning to use Hierarchical Role Based Access Control (RBAC) tocontrol internal access (i.e. within Health 123) to the data used by the application.(a) Define a set of indCSC8202代做、WEB编程语言代写、代做web、HTMLicative roles for staff within Health 123 and structure theseroles in a hierarchy that could be used to control access to resources withinHealth 123.[5 marks](b) Describe how a chosen contextual constraint could be used by Health 123 torestrict the activation of specific roles following authentication.[5 marks][10 marks in total](3) Construct an attack defence tree to model unauthorised access to a user account.Details of feasibility, cost and countermeasures do not need to be included.[30 marks]Please turn over to next page.INFORMATION SECURITY AND TRUST (CSC8202) MODULE COURSEWORK 3Part Two[50 marks](1) Health 123 have determined that they are processing special category (or ”sensitive”)data. State whether you agree with their position and justify your answerwith reference to relevant legislation.[5 marks](2) Based on feedback from focus groups, Health 123 have determined that the majorityof users are likely to access the Web application using a mobile device. Explainwhy access to the Web application using a mobile device presents a challenge forHealth 123 in providing privacy information to users.[15 marks](3) Users enter their symptoms into the Web application as free text e.g. ”headacheand coughing” and ”high temperature”.(a) Explain why this might pose a threat to the privacy of the users (or others).[10 marks](b) Define a strategy for the anonymisation of the Usage Summary Details. Allattributes and records must be retained by the anonymisation process.[15 marks](c) Provide a brief rationale for your strategy with reference to the concepts ofrisk and utility.[5 marks][30 marks in total]转自:http://www.3daixie.com/contents/11/3444.html

你可能感兴趣的:(讲解:CSC8202、WEB、web、HTMLR|Database)