File-Mate 1500 Design Review II

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Futures – Alpha Cloud Deployment and Application Management.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Copyright 2004 Prentice-Hall, Inc. Essentials of Systems Analysis and Design Second Edition Joseph S. Valacich Joey F. George Jeffrey A. Hoffer Appendix.
Exchange Network Key Management Services A Security Component February 28, 2005 The Exchange Network Node Mentoring Workshop.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
The future of client networks. Virtualization developed 59 years ago as a software solution to the hardware limitation Used in server environments to.
A Security Pattern for a Virtual Private Network Ajoy Kumar and Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca.
PKI 2: Protezione del traffico Web tramite SSL Fabrizio Grossi.
Open-MS (Open-Management System) Ethan Hann
Web-based Distributed Flexible Manufacturing System (FMS) Monitoring and Control Student: Wei Liu Instructor: Dr. Chang Apr. 23, 2003.
Using Digital Credentials On The World-Wide Web M. Winslett.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
Systems Architecture, Fourth Edition1 Internet and Distributed Application Services Chapter 13.
School Management Software
Objectives Explain the purpose and various phases of the traditional systems development life cycle (SDLC) Explain when to use an adaptive approach to.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
Introduction to Web Applications Instructor: Enoch E. Damson.
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Microsoft ® Application Virtualization 4.5 Infrastructure Planning and Design Series.
Project Implementation for COSC 5050 Distributed Database Applications Lab1.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
6/1/2001 Supplementing Aleph Reports Using The Crystal Reports Web Component Server Presented by Bob Gerrity Head.
File-Mate 1500 Design Review 1 November 19, 2013 KEVEN ABBOTT, ARCHITECT TYLER CROUSE, SPONSOR LIASON KIANA DELVENTHAL, TEAM LEADER, RECORDER LIAM WESTBY,
Greg Andolshek Alex Koch Michael McCormick Team Lasso.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering 1.
IT Terminology Quiz VSB 1002: Business Dynamics II Spring 2009.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 4. Understanding the Internet’s Software Structure.
Introduction to Information and Computer Science Information Systems Lecture c This material (Comp4_Unit9c) was developed by OHSU, funded by the Department.
Authentication Key HMAC(MK, “auth”) Server Encryption Key HMAC(MK, “server_enc”) User Password Master Key (MK) Client Encryption Key HMAC(MK, “client_enc”)
- Raghavi Reddy.  With traditional desktop computing, we run copies of software programs on our own computer. The documents we create are stored on our.
Utilizing the CMS Security Risk Assessment Tool Liz Hansen, PCMH CEC, ICD-10 PMC Special Consultant, GA-HITEC Member Manager, GaHIN
Production Data Grids SRB - iRODS Storage Resource Broker Reagan W. Moore
IIM Intro What is IIM? An information delivery and management solution. IIM App iPad Client Integration IIM Services Interface IIM Web Account Payment.
Copyright 2001 Prentice-Hall, Inc. Essentials of Systems Analysis and Design Joseph S. Valacich Joey F. George Jeffrey A. Hoffer Appendix B Rapid Application.
File-Mate 1500 Design Review III Keven Abbott Tyler Crouse Kiana Delventhal Liam Westby.
1 ISA&D29-Oct ISA&D29-Oct-13 Systems Analyst: problem solver IT and Strategic Planning.
1 Mail Saurus Reference:“Usable Encryption Enabled by AJAX” J.F. Ryan; B.L. Reid; Networking and Services, ICNS '06. Digital Object Identifier /ICNS
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Unified Distributed (UDub Mail) Life Cycle Objectives Sachin Pradhan Gabriel Maganis.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
6/1/2001 Supplementing Aleph Reports Using The Crystal Reports Web Component Server Presented by Bob Gerrity Head.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
Introduction TO Network Administration
ELECTRONIC DOCUMENT SHARING AND MANAGEMENT BY: EDWARD DISI JUSTIN HEIN BROM ESPY Senior Design 1.
Client-Server applications Introduction to Java Applets Client-server architectures Why do Applets exist? What can an Applet do?
Rights Management for Shared Collections Storage Resource Broker Reagan W. Moore
Module 1: Introduction to Windows 2000 and Networking.
1 Sean Aluoto Anthony Keeley Eric Werner. 2 Project Plan Overview Project Lifecycle model Time line Deliverables Organization plan Risk management Design.
Cloud Computing ENG. YOUSSEF ABDELHAKIM. Agenda :  The definitions of Cloud Computing.  Examples of Cloud Computing.  Which companies are using Cloud.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Speed Cash System. Purpose of the Project  online Banking Transaction Information.  keeping in view of the distributed client server computing technology,
Data and database administration
Distributed Systems Bina Ramamurthy 11/12/2018 From the CDK text.
Distributed Systems Bina Ramamurthy 11/30/2018 B.Ramamurthy.
Distributed Systems Bina Ramamurthy 12/2/2018 B.Ramamurthy.
IS4680 Security Auditing for Compliance
Distributed Systems Bina Ramamurthy 4/22/2019 B.Ramamurthy.
Cloud Storage-as-a-Service and Course Reflection
Presentation transcript:

File-Mate 1500 Design Review II Keven Abbott Tyler Crouse Kiana Delventhal Liam Westby

Introduction CMS 1500 Health Insurance Claim Form Issued by the Centers for Medicare and Medicaid Services Used for making claims against a patient’s health insurance policy Accepted by many private insurers and the Medicare and Medicaid programs Kiana Approved by the American Medical Association, among other groups; industry standard form 2

Introduction File-Mate 1500 Automates the production of completed CMS 1500 forms Stores data on patients and insurance policies Saves completed forms that can be retrieved at any time Kiana 3

Problem While the existing application is useful, it is a desktop client that lacks: Scalability Portability Accessibility Tyler 4

Solution Create a web-based version of the File-Mate 1500 application, accessible from any computer or tablet with a modern web browser. The web-based system will: Allow concurrent access to a shared data set Enable access to the system without needing to install software Scale to support the needs of an entire practice Tyler 5

Key Requirements Support for major web browsers Support for tablet devices Secure concurrent access Creation of different user groups Administrator, Registered, Trial Generation of documents Import/export of data Tyler 6

Development Methodology Iterative Waterfall Cycle (multiple versions of each) Atlassian Bitbucket Repository SourceTree for source control Focus on implementing core pieces of functionality, then integrating them together We adopted iterative waterfall development lifecycle. this is similar to the traditional waterfall model but iterating on each step within the waterfall model to ensure that all content and requirements are met Keven 7

Client-Server Architecture Keven 8

Client Side Accessible from any device with internet access 9 Keven. Computers, tablets and laptops 9

Server Side Keven. MVC data flow 10

Database Keven. Entity Relationship Diagram. Describe users, patients and offices 11

Implementation Login System (preliminary) Liam Current pages for login/registration system, focus was on backend functionality, including encryption and hacking prevention measures, input validation New User Registration (preliminary) 12

Database Liam Screenshot from phpMyAdmin, this is a live database 13

PDF Form Generation Liam Sample of generated PDF from our system 14

Challenges and Risks Risk Likelihood Severity Mitigation Strategy Loss of Data Integrity Moderate High Ensure integrity is preserved by testing database and related modules throughout implementation. Confidential Data Leak Low Extreme Use strong encryption, ensure accounts cannot be accessed by anyone other than the user. System Availability Compromised Design system for concurrent access and conduct load testing Liam Because our application is data driven, we must pay attention to common risks to information security: integrity, availability, and confidentiality 15

Schedule Kiana client, server/database, testing 16

Conclusion File-Mate 1500 is a desktop application; we are taking it to the network. To that end, we have produced a database- backed client-server system. With this solution, we are bringing a new level of scalability, portability, and accessibility to the File- Mate product. Kiana 17

Questions? 18