Case Study

 

Using the case study below, you will analyze an existing business problem, create a secure network topology, and write a security plan. Your written paper should be completed in word and consist of a Cover page, four to five-page written pages and a bibliography for cited references.

Case Study:

You are a consultant working with a dental office that has just merged with another dental practice. The original office housed three dentists, two dental assistants, and one receptionist in one location. With the merger, there are now five offices in different parts of the city, 15 dentists, 12 dental assistants, and five receptionists. Four of the dentists work in the offices but also are mobile in that they provide dental checkups to elderly patients in their homes or at the senior citizen centers, and to school children in the three inner-city elementary schools. The mobile dentists need to be able to send and receive patient records while they are out of the office. All the dentists and dental assistants must have real-time access to all patient records and daily schedules. The lead dentist has reminded you that they are required to meet HIPAA requirements for protecting patient information. You, as a telecommunications specialist, have been asked to design the telecommunications network to support this new multi-location practice. Others on the team will develop the applications and databases. Your task is to identify the requirements and design a network solution that will meet those requirements.

  1. Analyze the given case and provide a clear set of solutions for the network solution.
  2. Identify the information that is to be protected and the related security requirements.
  3. Identify the network components, security hardware, devices and equipment that would be involved in meeting the needs of the stationary offices and the mobile dentists.

Unit 2 Assignment 2 -Deliverable 1: Analyze the Business Problem

  1. Analyze the given case and provide a clear set of solutions for the network solution.
  2. Identify the information that is to be protected and the related security requirements.
  3. Identify the network components, security hardware, devices and equipment that would be involved in meeting the needs of the stationary offices and the mobile dentists.

Scoring Guide

Tags: No tags