The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following ULOs:
Explain the major methodologies for secure networks and what threats they address;
Identify and report network threats, select and implement appropriate countermeasures for network security.
The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging network-based applications, and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.
The use of network technologies is rapidly growing in healthcare sector. Now, healthcare is considered as one of the emerging application of network-based applications. Different network scenarios using wireless, wired, and mobile communications can provide efficient solutions to access electronic medical records (EMRs), medical management systems, imaging, biomedical information, material management, patient accounting, admitting information, and online claims submissions. Today, healthcare systems can combine these tools into one network-based infrastructure to more effectively communicate and collaborate, reduce errors, and improve patient care and efficiency. As healthcare providers adopt new technologies, they also face new security threats. Hackers, malicious software (malware), disgruntled employees, and human error present real dangers to healthcare networks . Security of healthcare networks is a prime concern in today’s World.
The literature review should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.
Your discussion should include:
In this section you will analyse critically, three security issues in Healthcare Networks. These issues should be taken from the current state of the art literature. This section must be supported by at least three (3) references.
In this part you need to choose one of the issues identified in the previous section and propose a possible solution to the particular security issue.
The specific data network or the computerized network can be defined as the digital telecommunications network, which enables various nodes to share several resources . These computer devices are responsible for exchanging the sensitive information or data with each other by taking the major help of few data connections in the nodes. These data connections can be easily established with the cable media such as wires, optical cables and also the wireless media such as wireless fidelity or Wi-Fi. The basic use of the network technologies are growing rapidly in the sector of health care . The health care could be eventually considered as one of the major applications for the various applications on the basis of networks. The several networks can easily give the effective as well as efficient solutions for the few factors such as accessing the electronic medical record or EMR, online claims submissions, patient accountings, biomedical information, admission information and many more. The several networks of health care are highly vital and important for the health care sector . The following report will be outlining a detailed description about the various security based challenges or issues within the emerging networks in the sector of health care. The report also provides the network architecture, recent development as well as the importance of privacy and security.
The sector of health care majorly consists of those typical organizations that are responsible for providing the various medical services as well as medical insurances, that also manufacture the medical equipment or drugs and finally facilitate the provision of this health care for the patients . The sector of health care consists of the diversified array of various industries and even with kinds of activities, which are ranging either from the researches to the manufactures or to facilities management. These makers of the medical equipment substantially range from those firms that manufacture the standardized and familiar products such as bandages, gloves, scalpels and forceps. The various experts of health care and the patients get advantages from the sector of health care. The respective networks of the health care sector easily and promptly provide various advantages to the doctors, nurses and patients . The routers, servers, firewalls, gateways, switches and clients are clearly depicted in the provided architecture of a health care network.
This above provided figure has properly demonstrated the clear understanding of gateway, OAM server, clients and server farm. The server selected in this network is from Oracle. These mentioned four components are the main elements of the network architecture and it is absolutely based on the important concept and ideology of service oriented network architectures or SONA . All of these ideologies could be sub divided to three structural elements that are server farm’s level, infrastructure level and client level.
The networks of health care sector are eventually bringing out various developments for their users in the entire world . Several important and significant development programs have been deployed within the rural areas. The main purpose of the recent developments is assisting the health care sector for properly develop the integrated network of health care. All of the networks of health care sector can be extremely effective and efficient strategies to achieve the economies of scale and efficiency. The most significant objective is to increment the communication and thus mitigate all the current problems with this communication. Furthermore, the sensitive information is extremely dangerous for the networks and thus is often hacked by various hackers . The lack of data or information loss is the major recent development of health care network.
The security is the most significant requirement or need in the networks of health care sector. This network security is the perfect protection or prevention from the destruction, misuses, accessing or hacking of the confidential files and directories in the computer based or digitalized networking system . The most important and noteworthy threats or risks to the health care network are identity theft, adware, spyware, worms or computer viruses. The major importance of the network security is that it could easily and promptly detect or prevent the viruses’ entries. Moreover, the other threats are also ceased with this type of security. Various security measures such as encryption and decryption are present for stopping the hacker to get hold or access of the data . Since, these networks of health care sector could store the confidential information like the various details of patients or progress reports of those patients, there is a significant importance of this network security.
Several vulnerable and potential security issues are present in the networks of health care sector. Within them, three most vulnerable issues of security are listed below:
The three above-mentioned risks are required to be mitigated as soon as possible since they could be extremely dangerous for the users of health care sector.
Among the three mentioned issues of security in heath care network, the distributed denial of service attack is considered as the most vulnerable . This can be easily mitigated with the help of some of the important techniques and these are given below:
Therefore, from the above discussion, conclusion can be drawn that the computerized networks within the specific sector of health care is extremely important and necessary to get more effective and efficient solutions or accessing the confidential or sensitive data for the various patients as well as the doctors and nurses. This sector of health care is eventually responsible to provide several types of solutions such as imaging, patient accountings, electronic medical record or EMR, online claims submissions, biomedical information, admission information and many more. Since, all of these above mentioned solutions are present in the health care sector; these are subsequently becoming more advanced every day. The specified providers of this health care sector are adopting newer technologies for obtaining extreme efficiency as well as effectiveness. However, although this sector has all of these advantages or solutions, all of the networks are extremely vulnerable for the several kinds of security and privacy challenges or issues. The attackers or the hackers hence can easily and promptly hack or access the sensitive data. This particular report has clearly outlined the entire concept of the networks of health care sector. The architecture of the health care network as well as the current development of these types of networks is being properly explained in this report. Furthermore, three important and significant security issues for these types of health care networks are also provided here. The final part of this report has described the mitigation techniques for mitigating any one of the identified security issues in health care network.
 Perlman, Radia, Charlie Kaufman, and Mike Speciner. Network security: private communication in a public world. Pearson Education India, 2016.
 Kahate, Atul. Cryptography and network security. Tata McGraw-Hill Education, 2013.
 Manshaei, Mohammad Hossein, Quanyan Zhu, Tansu Alpcan, Tamer Bac?ar, and Jean-Pierre Hubaux. "Game theory meets network security and privacy." ACM Computing Surveys (CSUR) 45, no. 3 (2013): 25.
 Tokuyoshi, Brian. "The security implications of BYOD." Network Security 2013, no. 4 (2013): 12-13.
 Knapp, Eric D., and Joel Thomas Langill. Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Syngress, 2014.
 Chen, Gaojie, Yu Gong, Pei Xiao, and Jonathon A. Chambers. "Physical layer network security in the full-duplex relay system." IEEE transactions on information forensics and security 10, no. 3 (2015): 574-583.
 Liang, Xiannuan, and Yang Xiao. "Game theory for network security." IEEE Communications Surveys & Tutorials 15, no. 1 (2013): 472-486.
 White, Gregory B., Eric A. Fisch, and Udo W. Pooch. Computer system and network security. CRC press, 2017.
 Kizza, Joseph Migga. Guide to computer network security. London: Springer, 2013.
 Zaalouk, Adel, Rahamatullah Khondoker, Ronald Marx, and Kpatcha Bayarou. "Orchsec: An orchestrator-based architecture for enhancing network-security using network monitoring and sdn control functions." In Network Operations and Management Symposium (NOMS), 2014 IEEE, pp. 1-9. IEEE, 2014.
 Acemoglu, Daron, Azarakhsh Malekian, and Asu Ozdaglar. "Network security and contagion." Journal of Economic Theory166 (2016): 536-585.
 Suo, Hui, Zhuohua Liu, Jiafu Wan, and Keliang Zhou. "Security and privacy in mobile cloud computing." In Wireless Communications and Mobile Computing Conference (IWCMC), 2013 9th International, pp. 655-659. IEEE, 2013.
 Bejtlich, Richard. The practice of network security monitoring: understanding incident detection and response. No Starch Press, 2013.
 Anwar, Raja Waseem, Majid Bakhtiari, Anazida Zainal, Abdul Hanan Abdullah, Kashif Naseer Qureshi, F. Computing, and J. Bahru. "Security issues and attacks in wireless sensor network." World Applied Sciences Journal 30, no. 10 (2014): 1224-1227.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2019). Overview Of Network Security 4. Retrieved from https://myassignmenthelp.com/free-samples/mn502-overview-of-network-security-4.
"Overview Of Network Security 4." My Assignment Help, 2019, https://myassignmenthelp.com/free-samples/mn502-overview-of-network-security-4.
My Assignment Help (2019) Overview Of Network Security 4 [Online]. Available from: https://myassignmenthelp.com/free-samples/mn502-overview-of-network-security-4
[Accessed 19 January 2020].
My Assignment Help. 'Overview Of Network Security 4' (My Assignment Help, 2019) <https://myassignmenthelp.com/free-samples/mn502-overview-of-network-security-4> accessed 19 January 2020.
My Assignment Help. Overview Of Network Security 4 [Internet]. My Assignment Help. 2019 [cited 19 January 2020]. Available from: https://myassignmenthelp.com/free-samples/mn502-overview-of-network-security-4.
Students stuck with complicated research paper outlines and topics are no more required to look around for help frantically. MyAssignmenthelp.com is available with the best team of writers and resources for the finest bibliography, referencing, thesis statements and conclusions. From assisting students with rhetorical analysis to helping them with critical literature analysis; MyAssignmenthelp.com is dedicated to sending across comprehensive solutions on a plethora of research topics.
Answer: Introduction The essence of this report is feedback to the manager who wanted a system analyst to shade more light on agile or adaptive software development methodologies. The report discusses adaptive software development and introduces the various methodologies related to it. It further expounds on scrum and extreme programming agile methodology giving a recommendation to Pty Ltd on the methodology that is best suited for the implem...Read More
Answer: Introduction: The truth is that the managers influence the intrinsic and extrinsic motivation as well as satisfaction of the employees in their workplaces. I have had a complex career path. 2 years ago, I happened to work with one of the best managers. There are various reasons as to why I’m saying that this was the best manager. First, the manager was ever supportive and paid attention to our needs and ideas as employees. Secon...Read More
Answer: Introduction: Simply, cookies are used in order to exchange information among the client and server. Server also recognize the client request by cookies. Generally, web server and client interact with each other as client-server system . Data is stored into the server and client can access those data on request. Cookies are capable of storing only 4KB of data and limit of cookies per domain is 20. Typically, web browsers functions ...Read More
Answer: Introduction: Flight Management System (FMS) refers to the fundamental component of the modern avionics of airliner. They are able to compute every relevant aspects of a whole flight by making use of performance databases and navigation that are stored in the unit and in the pilot entered data (Ramasamy et al., 2014). It allows the airplanes to hook up the autopilot and then maintain the heading in a few feet. On the other hand, ...Read More
Answer: Introduction The crypto currency is the digital asset, which is being designed to work as a basic money exchange medium . The crypto currency eventually uses a strong cryptographic algorithm to secure the various financial transactions and hence creating an additional unit is controlled and an asset transfer is easily verified. These crypto currencies can also be defined as the digital currency, alternative currency or virtual curr...Read More
Just share your requirements and get customized solutions on time.
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
I am Completely Satisfied with my coursework assignment work. Got my coursework assignment at right time with quality work. Truly recommendable.thanks again
Good Job. Thank you so much for your timely and efficient delivery of my assignment. I really appreciate your work done. Great and quality work as I wanted. Very quick and was done within the deadline. I recommend this site to anyone who is strugglin...
The Assignment provided was as per the requirements and i got accordingly as per the academic professional level of the submitted assignment.
The Assignment provided was good and was as per the requirements and up to the professional academic level. Thanks