Assignment Description : The purpose of this assignment is to develop skills to
ID: 3752545 • Letter: A
Question
Assignment Description :
The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging network-based applications, and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue. The use of network technologies is rapidly growing in healthcare sector. Now, healthcare is considered as one of the emerging application of network-based applications. Different network scenarios using wireless, wired, and mobile communications can provide efficient solutions to access electronic medical records (EMRs), medical management systems, imaging, biomedical information, material management, patient accounting, admitting information, and online claims submissions. Today, healthcare systems can combine these tools into one network-based infrastructure to more effectively communicate and collaborate, reduce errors, and improve patient care and efficiency. As healthcare providers adopt new technologies, they also face new security threats. Hackers, malicious software (malware), disgruntled employees, and human error present real dangers to healthcare networks [1]. Security of healthcare networks is a prime concern in today’s World. This assignment includes four parts 1. Literature review on Healthcare Networks.The literature review should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art. Your discussion should include: i. Healthcare network architecture (consider networking devices such as routers, switches, firewalls, servers etc.) ii. Recent developments in healthcare networks iii. The importance of security in healthcare networks 2. Analyse critically, three current or possible future potential security issues in Healthcare Networks. In this section you will analyse critically, three security issues in Healthcare Networks. These issues should be taken from the current state of the art literature. This section must be supported by at least three (3) references. 3. Propose a possible solution for one of the threats identified in section-2. In this part you need to choose one of the issues identified in the previous section and propose a possible solution to the particular security issue.
Explanation / Answer
1i) Healthcare network architecture: Healthcare industries is one of the most important field in the world where they have to record the health condition of a patient and for that it is really important to keep the data safe from attackers, because of millions of patient’s records will be stored there. So, the network architecture is really important for healthcare industries.
ii) Development in healthcare network: - throughout the various development in the architecture has been implemented, such development includes scalability, remote and secure access to the servers, user friendliness and possibility of integration with internet. These developments have made huge impact on the healthcare industries and patient’s information can be accessed from any hospitals.
iii) Importance of security in healthcare networks: it is really important to protect the patient information and it is quite a challenging task. Moreover, it is need to be ensured that any attack should not be happened in the healthcare domain because lots of sensitive data will be at risk. Ransomware attack is the most dangerous attack that will hijack all the patient’s valuable information, so proper security can stop those attack to happen.
2) Security issues in healthcare industries:
3 references are listed below:
3) Mitigating healthcare industries security issues:
First, it is important to implement a proper network security based on firewalls, where you need to allow and deny the traffics which you want that traffic to get entered into the network. Several level of password authentication must be done, in order to remotely connect to one of the servers. Proper backup of data must be done, so that data can be restored at any moment of time.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.