New! Hire Essay Assignment Writer Online and Get Flat 20% Discount!!Order Now
CYB5CYA
AU
La Trobe University
Objective:
The objective of this assignment is to identify a set of (cyber security) algorithmic requirements and apply the relevant symmetric and asymmetric key cryptography algorithms for a given application (Australian My Health Record - MHR System).
In this assignment, you are required to complete the following three activities. Clearly state any assumptions you make. Your assumptions should be consistent with what are given the descriptions below. Upon the completion of the activities, you are required to provide a formal report documenting your findings in a single PDF file.
Please consider the following application scenario using Australian My Health Record (MHR) system.
MHR is an initiative by Australian government that provides a secure online summary of the health information to the individuals (e.g., health professionals and patients). It can control what goes into it and who is allowed to access the MHR system. It can choose to share patients' health information with their doctors, hospitals and other healthcare providers like pharmacists. In addition to such "primary use" of the data/information for the health services, there are plans to use aggregated and anonymised health data/information for research and other purposes - this is known as "secondary use". Overall, the MHR system controls our health information securely in one place. It is really our choice - we can keep our MHR with basic information, or we can allow more information to MHR system or permanently delete the record. An MHR user is an individual who has right to use patients' health information. For example, A Doctor can do the following actions in the MHR system: Login to the system, Access patients' health information, Write prescription, Recommend patient to the specialists. The MHR system also gives our pharmacists a clearer picture of our health information.
More information about MHR can be found here: https://www.myhealthrecord.gov.au/. You can use other MHR scenarios/examples from other sources, however, please document your scenarios/examples and provide references.
Please follow the word limits that are mentioned in each activity.
Activity (1)
Write any specific use case description of the MHR system and identify the misuse cases. In this activity
you should document your findings according to following:
Identify at least 5 use cases that can allow different users to interact with MHR system
Identify the possible misuse cases for those use cases (at least 5 misuse cases)
Select a single use case and provide the situations (i.e., a situation is seen as interactions between actors and system) for your selected use case
Write the description of the selected use case
Write a Brief Survey on Cryptographic Algorithms:
In this activity, you have to provide a brief report on the following:
Understand the basic concepts of Symmetric versus Asymmetric Key Cryptography and briefly write your findings including a symmetric key algorithm and specific asymmetric key algorithm
Write your reflections on using different cipher substitution algorithms (e.g., AtBash Substitution Cipher and Caesar Cipher Substitution) for secure communication – like, two entities (or users) can communicate and interact with MHR system through creating such a secure channel
Write your reflections on using different encryption and decryption techniques (through secret and public keys) for secure communication in the MHR system
A Recent Cryptographic Algorithm: In this activity, you have to provide a brief report on any relevant symmetric or asymmetric algorithm that can be applied in MHR system. Document your research and findings according to following:
Write about your research approach to find any relevant research paper - you can use 'Google Search' or 'Google Scholar Search' to search/find your paper, and/or 'Google Dataset Search' to find the relevant dataset
Identify any relevant algorithm from the paper that is proposed within last five years (say, from 2015 to 2020)
How the algorithm works and briefly describe the application area in which the algorithm is applied
Write your reflections on applying the proposed algorithm in the MHR system to solve any (and/or multiple) of the issues mentioned in Activity (2), like encryption/decryption, key exchange, secure communication, and so on
15,000+ happy customers and counting!