Nurses at Home is a fictional visiting nurses’ association. The nurses travel by car and visit patients in the patient’s home. Nurses enter medical records using laptops, tablets, and smart phones. The medical records are stored in the cloud.
Describe the vulnerabilities and threats in this scenario.
Describe your recommended controls for this scenario.
Explain your recommendation in detail regarding encryption for this scenario.
Differentiate between whole disk and file encryption and include your recommendation.
Research product offerings on the Internet.
Describe three possible product alternatives including the advantages and disadvantages of each.