The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following ULOs:
This assignment includes four parts
The literature review should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.
Your discussion should include:
iii. The importance of security in healthcare networks
In this section you will analyse critically, three security issues in Healthcare Networks. These issues should be taken from the current state of the art literature. This section must be supported by at least three (3) references.
The health care sector can be stated as one of the most important sectors which is relating to the life of the common people. Whenever there is linking of heath care sector with any technological aspect it should be taken into consideration that security aspects are high enough in the sector of operation. A device which can directly reduce the overall risk factor can be stated as one of the most advantageous related to any technological aspect. It can be stated here that in the heath sector if any risk factor is identified it can directly impact the overall system which is related to the concept.
The report takes into consideration the sector of the health care which is connected to the field of implementation in the network based technology. In this sector there can be different types of problem or issue faced which are majorly discussed in the report. On the other hand, the report also takes into consideration the mitigation aspects which can be related to the concept.
In recent times it can be stated that the sector of the health care is improving due to the invent of the different types of technology into the concept. This is due to the factor that most of the institutes which are related to the health care is implementing computer based network and the technology of hospital information technology (HIS) into the internal working. The main advantage which can be related to the concept is the remote access and the distribution of the medical record to the medical community. In the sector of the deployment of the health care into the network architecture different devices should be used which would be executing the internal functionality of the system.
It is proposed in the most of the institution that a three-layer client server architecture solution should be implemented. The implementation of the server would be very much beneficial in the sector of the improved authorization, data security, authentication, the sector of privacy access and protection of the overall system. The authentication methods which would be implemented within the process is the secure socket layer (SSL) protocol based TCP/IP.
The main aspect which is related to the implementation of the firewall is to protect the overall system and secure the patient data which would be present in the system. It can be stated as one of the most important security measure which can be implemented at the entry point of the data. The data which would be entering the network would be checked for the purpose of the authentication and it would be restricting those data which would be harmful for the system.
The implementation of thee router and the switches are directly done in the access layer which is directly linked with the aspect of two distributed layer of switches which is related to the purpose of redundancy. The access layer which is robust would be directly be beneficial in the sector of the supporting the software and the hardware attributes [11]. The main components of the attribute are the power redundancy and the path redundancy.
It can be stated here that in the recent few years it can be majorly seen that the implementation of the hospital information system is very much important which bring different kinds of advantage. The main sector of the advantage which can be related to the concept is in the sector of the financial, administrator and clinical documentation part [7]. The need of such a system directly arose when the need of an efficient resource management, security of the data and the high availability of the data arose. The implementation of such a system can be seen in most of the areas which is related to the health care. One of the disadvantage which can be related to the context is that it does not include a proper standard solution.
The main advantage of networking the health care sector is that it gives the access of national sharing of the information in an authenticated manner, directly improves the doctor and patient relationship, time and cost saving and convenience.
The security in the concept of the health care can be considered as one of the most important factors which should be taken into consideration [6]. It can be stated here that due to the implementation of the domain controller the security of the data is usually maintained in the system. In order to get a complete solution relating to the security the connection which is between the server and the client must have a strict enforcement policy and rules. As stated by [1] the infrastructure network which is related to the health care usually has two gateways. The main function which is related to the gateways is to provide packet filtering technique on data which is entering or leaving the cline side to the server farm side ad very much vice versa. The connection which is created from the sector of the different sites are mainly done through an open network which is the internet. The possibility of the deployment of a private network backbone can also be done which would be directly raising the cost which is related to the concept.
The main aspect which can be stated in context of the securing of the channel would be the use of channels which are encrypted. The concept is achieved by means of deployment of virtual private network (VPN) between the deployment of the gateway [9]. The main functionality which is related to the communication which is done thorough VPN is that it directly ensures that the data which is passed through the concept is encrypted so that no activity which is related to the intruders are enforced into the process. The use of the digital authority it can be directly be assured which VPN community can participate in the different sectors which is related to the VPN [12]. This approach can be very much beneficial in the sector of mitigation aspect which is related to the man in the middle attack. The main components which is related to the man in the middle attack mainly consist of an attempt to intercept the traffic of data which is between the different logical sites. As stated by [4] Strong process of encryption can be very much beneficial in the aspect which directly ensure that even if the data is intercepted it cannot be directly be deciphered [1]. The aspect of the encryption can be very much beneficial in the sector of the implementation of a security mechanism which would be directly securing the system.
Some of the potential problem which is faced in the sector area as follows:
Issue 1: More devices which can increase risk factor
In the concept of the health care sector it can be stated that there are many devices which are connected in the concept of internet in order to communicate with each other. According to [2] It can be stated that most of the devices in this sector are very much vulnerable to the security issue. One of the major issue which can be related here is the loss of the data which can occur [9]. The security of the data can be considered as one of the most important factor which can be related to the technology.
Issue 2: Embedded devices
In the concept of the heath care it can be stated that there are different components such as the patient monitoring system, medication scanner and imaging devices. These devices help in the sector of the identification, tracking and monitoring of the record of the patient [11]. However, these devices directly put strain on the aspect of the bandwidth and exposes the network to the different types of viruses in by means of new connected devices that are different from the traditional personal computers.
Issue 3: Consumer friendly IT
It can be stated here that the aspect of the employees and the physician need to directly access the network of the facility in order to conduct their business needs [5]. In this sector the consumerization can be stated to one of the biggest problem which can be playing a very much important role. Due to the involvement of more users in the sector of the own device manipulation, health care would be directly seeing more security threats [6]. As a fact it can be stated that the aspect of the consumerization of the IT is directly driving the need of the network security solution that directly covers up the multiple layer devices and the components of the infrastructure.
Solution 1: more devices which can increase risk factor
The main solution which can be stated here is that use of the network access control (NAC) solution. This directly offers the ability to identify each of the type of user and the connected devices and the scan for threat identification. On the other hand, the NAC solution would be directly offering a standard which is related to the network security status across all the devices which are connected.
Solution 2: Embedded devices
The main aspect which should be taken into consideration in the aspect is the incorporation of security solution that would directly reduce protect the integrity of the critical data which is often referred as private data [3]. On the other hand, it should also reduce the vulnerability gap which exact in the sector of the network in which the devices are connected.
Solution 3: Consumer friendly IT
One of the main solution which can be related to the consumer friendly IT is the adaptation of a good NAC system which can stave off each of the threats which are related to the concept [5]. The concept of the response of the security solution would be identifying any consumer service which is adopted. It should always take into consideration the aspect of generation of a scan when a new data tries to enters the network.
The report main focus point was the heath care sector when relating to the network manipulation. Whenever a device is connected to the network device vulnerability aspects play a very vital role which has to be taken into consideration so that the overall system is kept safe and the data which is present in the system is very much safe from the intruders. The devices should be safe so that the data which is generated from the system is authenticated.
[1] Betancourt, Joseph R., et al. "Defining cultural competence: a practical framework for addressing racial/ethnic disparities in health and health care." Public health reports (2016).
[2] Acharya, Bibhav, et al. "Partnerships in mental healthcare service delivery in low-resource settings: developing an innovative network in rural Nepal." Globalization and health13.1 (2017): 2.
[3] Hutton, B., Salanti, G., Caldwell, D. M., Chaimani, A., Schmid, C. H., Cameron, C., ... & Mulrow, C. (2015). The PRISMA extension statement for reporting of systematic reviews incorporating network meta-analyses of health care interventions: checklist and explanations. Annals of internal medicine, 162(11), 777-784.
[4] Rojas, Eric, et al. "Process mining in healthcare: A literature review." Journal of biomedical informatics 61 (2016): 224-236.
[5] Chen, Feng, et al. "Data mining for the internet of things: literature review and challenges." International Journal of Distributed Sensor Networks 11.8 (2015): 431047.
[6] Brett, Jo, et al. "Mapping the impact of patient and public involvement on health and social care research: a systematic review." Health Expectations 17.5 (2014): 637-650.
[7] Martínez-Pérez, Borja, Isabel De La Torre-Díez, and Miguel López-Coronado. "Privacy and security in mobile health apps: a review and recommendations." Journal of medical systems39.1 (2015): 181.
[8] Grajales III, Francisco Jose, et al. "Social media: a review and tutorial of applications in medicine and health care." Journal of medical Internet research 16.2 (2014).
[9] Nilsen, Per. "Making sense of implementation theories, models and frameworks." Implementation Science 10.1 (2015): 53.
[10] Popp, Janice, et al. "Inter-organizational networks: a review of the literature to inform practice." IBM Center for the Business of Government (2014).
[11] Bekelman, Justin E., et al. "Comparison of site of death, health care utilization, and hospital expenditures for patients dying with cancer in 7 developed countries." Jama 315.3 (2016): 272-283.
[12] Couët, Nicolas, et al. "Assessments of the extent to which health?care providers involve patients in decision making: a systematic review of studies using the OPTION instrument." Health Expectations 18.4 (2015): 542-561.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). Overview Of Network Security. Retrieved from https://myassignmenthelp.com/free-samples/mn502-overview-of-network-security/making-sense-of-implementation-theories.html.
"Overview Of Network Security." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/mn502-overview-of-network-security/making-sense-of-implementation-theories.html.
My Assignment Help (2021) Overview Of Network Security [Online]. Available from: https://myassignmenthelp.com/free-samples/mn502-overview-of-network-security/making-sense-of-implementation-theories.html
[Accessed 21 April 2021].
My Assignment Help. 'Overview Of Network Security' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/mn502-overview-of-network-security/making-sense-of-implementation-theories.html> accessed 21 April 2021.
My Assignment Help. Overview Of Network Security [Internet]. My Assignment Help. 2021 [cited 21 April 2021]. Available from: https://myassignmenthelp.com/free-samples/mn502-overview-of-network-security/making-sense-of-implementation-theories.html.
Programming assignments are no less than challenges. If you are wondering ‘Where can I pay someone to write my paper’? You will be glad to know that MyAssignmenthelp.com has some of the best-experienced paper writers. Most of our writers are computer engineers. Therefore, you can expect the best programming help from them. From java help to R programming help – we do it all.
Answer: Introduction Communication is vital in every business. The success of a business depends on how well employees interact with their customers and co-workers. Therefore, clear, precise and consistent communication should be encouraged in order to achieve the objectives of the business. It’s also important to nurture good communication and listening skills among employees in order to reduce interpersonal conflict and increase...
Read MoreAnswer: Introduction: The Overview to this assignment is I am working as a Business IT Trainer within Team Tech, a large business IT Support Company. During the recent appraisal process it was identified that staff required further training with regards to their employability skills. Task 1: Scheduling task This is a professional schedule to support the planning of the event, which demonstrates the timings and resourcing prior to the...
Read MoreAnswer: Introduction This report identifies and analyses the need and want that led to the purchase of Lipton green tea It also examines internal and external sources of information It also analyses available purchase methods Problem Recognition The purchasing procedure starts with the recognition of needs by internal and external stimuli. In the case of tea, it is an internal stimulus that triggers the requirements (Solomon...
Read MoreAnswer: Introduction Gucci is a leading brand of fashion as well as leather goods house that was founded in 1921 in Florence. In 2008, Gucci generated about €4.2 billion revenue from worldwide sales of fashion (Gucci.com 2018). Gucci is also the highest selling Italian brand. The operation of Gucci spreads over 278 directly operated stores all around the world (Gucci.com 2018). Wholesalers and franchises is one of the manner in whic...
Read MoreAnswer Introduction of the organization Tesla Motors is an automobile based organization which has its origin in the United States of America and the operations are related to the energy and automotive products. The organization has its headquarter in Paulo Alto, California. Tesla Motors mainly specialises in the manufacture of electric cars and solar panels. The assembly plants and factories of Tesla are located in Fremont California. The di...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
im really happy with the quality of work and got me good mark. work was provided way before deadline.
Australia
the solution was provided before the deadline so I was happy. the work was excellent. it was exactly what I needed and met all my requirements
Australia
I am awaiting the grade. Professor loved the content and received a B but he instructed me to make the suggestions that I would be able to get the A.
Australia
Great service and delivery! The expert helpt me with tests and gave detailed workings on the solutions for each question. I had also the option to ask further questions if I did not understand everything perfectly!
Australia