Get Instant Help From 5000+ Experts For
question

Writing Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Add File

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!

The Impact Of Technology On Microbiology Essay.

26 Pages / 6,262 Words Published On: 27-11-2020

Nature of the Business

Please note: Work presented in an assessment must be the student's own. Plagiarism is where a student copies work from another source, published or unpublished (including the work of a fellow student) and fails to acknowledge the influence of another's work or to attribute quotes to the author. Plagiarism is an academic offence.Work presented in an assessment must be your own and must not be submitted as part of another unit’s assessment. Plagiarism is where a student copies work from another source, published or unpublished (including the work of another student) and fails to acknowledge the influence of another’s work or to attribute quotes to the author. Plagiarism is an academic offence and the penalty can be serious. Self-plagiarism, or duplication, is the act of using your own work that is submitted for more than one assessment.

The University’s policies relating to Plagiarism and Self-plagiarism can be found in the regulations at To detect possible plagiarism we may submit your work to the national plagiarism detection facility. This searches the Internet and an extensive database of reference material including other students’ work to identify. Once your work has been submitted to the detection service it will be stored electronically in a database and compared against work submitted from this and other universities. It will therefore be necessary to take electronic copies of your materials for transmission, storage and comparison purposes and for the operational back-up process. This material will be stored in this manner indefinitely.


All assignments must be electronically submitted via BREO by 10:00 am on the due date. Please leave sufficient time to meet this deadline and do not leave the handing-in of assignments to the last minute. You need to allow time for any system problems or other issues. Do not include this page and the following ones in your submission Referral Assignment You are required to address the issues identified in the comments of your markers on BREO and their
feedback to complete this assessment to a passable grade.


Rationale and Learning Outcomes The case study is an individual piece of coursework.In this assessment, you will be able to evidence in-depth working knowledge of computer and network security, security threats and mitigations, ethical and legal aspects, and disaster recovery planning. This will be demonstrated by responding to the following case study and the consequent tasks as part of an individual report. The assignment aims to test your ability to apply, analyse, evaluate and criticise existing methods and tools in the domain of computer and network security and present
business solutions.

Assessment Specifications
Report Word Count 5000 words (excl. references, appendices and Tables) with a single file submitted electronically with your student details on the front cover.Font Type and Size Arial 11pts – Single spacing Referencing Style Harvard

Background
You are asked to study a small private microbiology laboratory that is located in Luton and collaborates with 2 big hospitals. The examinations performed are ordered either by a registered GP (in which case the patient needs to have a referral in order for the tests to be paid), or privately (in which case the patient pays himself, in cash).The laboratory consists of 8 employees:
• 2 secretaries, that are responsible for answering phones, making appointments for blood tests and taking payment information from the patients. They are also responsible for posting the results (either using Royal Mail or a courier service).

Cost Benefit Analysis


• 2 GPs, that are responsible for checking the blood test results and making recommendations. • 4 microbiologists that are responsible for processing the blood samples in order to get results.
• Lately, the laboratory’s reputation has spread and it receives a lot of private patients that wish to have check-ups. This has resulted in a great increase in telephone calls, asking to book appointments or get information of alternative methods of paying (for now only cash is accepted).
The laboratory’s computer network consists of 10 PCs on a simple Wi-Fi network:
• Computers 1 and 2 - used by the secretaries to book appointments and hold transaction details.
• Computers 3 and 4 - used by the GPs to access patients’ files, update them adding medication prescriptions and recommendations.
• Computers 5 to 8 - used by the microbiologists to access patients’ files and add the blood test results.
• Computers 9 and 10 - used as a backup solution, to store all patients’ files and transactions,for extra security. These PCs are also connected to the hospital’s network, to exchange patient information.


For security, the company uses AVG free and the default Windows firewall on all machines. The company wishes to create an online prescription request system, in which the patients will be able to access specific parts of their files, order repeat prescriptions and order new tests (e.g. blood tests).You are hired as an IT professional in order to investigate how this can be done, in the most cost effective way. You will also be investigating what damage can be done by losing the patients’ files and also produce a solution to mitigate this damage. In more detail, the company will need:

• An online prescription request system.
• Possibly new hardware and software (Note: the company wants to keep the Microsoft Windows as their client operating system).
• A telephone management system (patients sometimes complain that they are unable to get through because the phones are busy). Also, the laboratory is closed during weekends, but several requests have to be processed. The company wants to include an internal telephone system for internals calls.
• Many new patients come to the laboratory as it was suggested to them by someone they know It would be nice if the laboratory could exploit social media to increase its reputation. Also, the patients could rank the lab, to make it appear higher in search results.


Requirements
Write a report addressing the following parts and structured as outlined below. Part One – Threats (1500 words max)
A report section explaining the nature of the business and analysing the potential threats that exist and which, you, the IT specialist will have to address (we are mostly interested in network and hosts security threats). The report should  lso focus on the harm that can be caused if the patients’ files cannot be retrieved.Hint: Focus on the ethical issues existing in such a laboratory.

Part Two – Mitigations (1500 words max)
A report section explaining your suggestions for overcoming the security threats that may exist in this scenario. The full security layers should be addressed in your solution. Solutions offered must be both technically and legally possible and acceptable.

Part Three – Evaluation and Conclusions (2000 words max)
Report sections stating your evaluation, conclusions, and recommendations. This Part should be written in a way that would enable an IT Director (or similar role) understand both the issue and be able to implement the plan suggested.
Additional Hints:
1. You may wish to use tools such as Microsoft Visio, LucidChart or Microsoft Threat Modelling Tool to draw a diagram of the network (Cisco Packet Tracer images are not accepted).
2. No requirement for writing detailed policies. Instead, a summary of the policy purpose is enough.

Final Report Structure:
• Title and Introduction 
a) General stuff about the nature of the business (written to meet the needs of the potential end user, IT Director, or similar role – Very brief)
b) Cost benefit analysis (with possible scenarios – minimum 3 scenarios) • The Problem (20 marks)
a) Risks
b) Ethical and Law considerations
• The Solution Suggestions (based on the adopted scenario)
• Conclusion and Evaluation 
a) Short summary of the Disaster Recovery Plan
b) Conclusions
c) Recommendations

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2020). The Impact Of Technology On Microbiology Essay.. Retrieved from https://myassignmenthelp.com/free-samples/cis119-systems-and-network-security/microbiology-laboratories.html.

"The Impact Of Technology On Microbiology Essay.." My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/cis119-systems-and-network-security/microbiology-laboratories.html.

My Assignment Help (2020) The Impact Of Technology On Microbiology Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/cis119-systems-and-network-security/microbiology-laboratories.html
[Accessed 02 October 2023].

My Assignment Help. 'The Impact Of Technology On Microbiology Essay.' (My Assignment Help, 2020) <https://myassignmenthelp.com/free-samples/cis119-systems-and-network-security/microbiology-laboratories.html> accessed 02 October 2023.

My Assignment Help. The Impact Of Technology On Microbiology Essay. [Internet]. My Assignment Help. 2020 [cited 02 October 2023]. Available from: https://myassignmenthelp.com/free-samples/cis119-systems-and-network-security/microbiology-laboratories.html.


Stuck on Any Question

Our best expert will help you with the answer of your question with best explanation.

question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

loader
250 words
Error goes here

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

icon
5% Cashback

On APP - grab it while it lasts!

Download app now (or) Scan the QR code

*Offer eligible for first 3 orders ordered through app!

screener
ribbon
callback request mobile
Have any Query?
close
Subtraction Payment required!

Only one step away from your solution of order no.