Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

MN502 Overview Of Network Security1

tag 0 Download10 Pages 2,261 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

This assignment includes four parts
 
1. Literature review on Healthcare Networks.
 
The literature review should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.
 
Your discussion should include:
 
i. Healthcare network architecture (consider networking devices such as routers, switches, firewalls, servers etc.)
ii. Recent developments in healthcare networks
iii. The importance of security in healthcare networks
 
2. Analyse critically, three current or possible future potential security issues in Healthcare Networks.
 
In this section you will analyse critically, three security issues in Healthcare Networks. These issues should be taken from the current state of the art literature. This section must be supported by at least three (3) references.
 
3. Propose a possible solution for one of the threats identified in section-2.
 
In this part you need to choose one of the issues identified in the previous section and propose a possible solution to the particular security issue.
 
 

Answer:

Introduction:

The prime objective of this paper is to understand the security issues of the private networks in both the private and public sector industries. The different types of securities issues of the network based applications and the cloud based applications are highlighted in this paper. The paper highlights the recent developments in the field of science and technology considering the security aspects of healthcare networks [12]. The importance of the security measures is also discussed in this paper which helps the readers to more about the changing nature of the risks. Critical analysis of the security issues are the major healthcare industry is the most essential feature of this papers along with that the paper also discusses the different types of threats. The three major threats of the healthcare care industry which are malicious programs such as the Wannacry ransomeware, threats coming from inside the healthcare industry and the threats coming from the different types of phishing emails are discussed thoroughly in the paper [5]. All the associated issue related to these major risks are also discussed in this paper so that all the essential details related to the network security in hospitals as considered. The risk mitigation steps of one of the three discussed issues are stated in the paper. The risk mitigation steps are proposed in such a way that it maintains the growth and productivity from both the point of view of the internal as well as the external stakeholders of the hospital.

 

Healthcare network architecture 

According to Patil, Harsh and Ravi (2014), the healthcare network architecture is a very important aspect regarding the healthcare care industry. The author stated that the hospital authorities and patients access sensitive information which is needed to be protected at any cost. The authors of this paper highlighted the importance of the security in the network architecture, they stated that it is very important for the hospital authorities to concentrate more on the architectural of those networks as they are the most basic and fundamental units of the networking system in the healthcare industries. According to the author the developments in the field of advanced computer applications has led to the growth of advanced threats and vulnerabilities which can have a direct negative impact on the outcome of the healthcare industry.

According to the author all the components of the networking architecture are vulnerable to the threats and vulnerabilities so each of those components should be frequently evaluated by dedicated teams which will be enhancing the efficiency of those architecture. The writer of this resource stated that each unit or block of the network architecture should be critically examined so that there is no security issues related to them. The author focused on the importance of the analyzing different units of the networking system such as the packets which are transmitted from one point of a system to another point. The security issues related to the routers can be purposefully solved with the help of the risk mitigation strategies which are stated in the later sections of the paper. However, it was found that the main limitations of this resource us that the author failed to showcase any particular healthcare industry which is facing issues in their network architecture.

As discussed by Baig et al. (2015), trafficking is one of the most vital issues related to the server security in the healthcare industries. These issues can have a direct negative impact on the network architecture in healthcare industry. The author of this paper focused on finding the possible risks involved in the healthcare network architecture and the author concluded that ARP spoofing and Spanning Tree control attacks are the most significant vulnerabilities associated with those networks. MAC address flooding is the other types of network security issues related to the healthcare network architecture.

The author stated that there are different kinds of malicious attacks such as the distributed denial of service attack which is the most common types of attack in the healthcare network architecture. The vulnerabilities coming from the insiders are the other source of concern for the healthcare network architecture as they have the access to the entire fundamental architecture of the healthcare network. According to the author, the security of the healthcare network should be enhanced as much as possible.

The author stated that the unauthorized access is a type of threat coming from the insiders is also a concern for the healthcare industries as any types of alteration of the data which are transmitted in the hospital organizations is very much harmful for both the perspective of the hospital authorities as well as the from the point of view of the patients. The author also highlighted that the invalid configurations are the other type of threat to the network architecture of the healthcare industry. The different types of malicious attacks and data breaches are the other vital threats to the networking architecture of the healthcare industries. According to the author these threats have the potential to seize and alter any type of essential data which are circulated within the organization. The other kind of threat involved in the networking architecture are the switch spoofing and double tagging process. These issues have a direct negative impact on the healthcare network architecture. However, it was found that the foremost restrictions of this resource are that the authors were unsuccessful to focus on any specific hospital that have already faced extreme adverse conditions due to the malicious attacks or threats coming from the insiders which could have authenticated their statements.

As stated by Zhang et al. (2015), malfunctioning of the different modules of the healthcare network is the other security issues in healthcare industry as the hospital organization can get hugely affected by it. The other threats of healthcare network architecture are the attacks coming from the CDP and telnet. Fragmentation attacks are the other types of attacks related to the networking security of the healthcare industry. The main limitation of this paper is that the statements are written mostly in generalized form without any specifications.

 

Recent developments in healthcare networks

As discussed by Gope, Prosanta and Tzonelih (2016), the extensive development in the field of information technology has led to the growth of important technologies which effectively help to main security in the healthcare industries. The application of artificial intelligence in the networking sector of the healthcare is one of the most important recent development in the healthcare industries. The author focused on the latest AI based applications which provide a great deal of accuracy in securing the hospital networks from the external threats. The writer of this resource highlighted the use of business intelligence is the other major type of development in the health care network as it help the hospital authorities to deal with the future securities issues on their private networks. Cloud computing technology is also increasingly used by the latest healthcare industries which helps in the maintaining the privacy and security of the healthcare networks. However, it was found that the main limitations of this resource is that it do not discuss the compatibility issues of the latest technologies with the hospital authorities as it would have guided the other hospitals who are planning to implement these technologies on their environment.

The importance of security in healthcare networks

As stated by Bhatt, Nilanjan and Amira (2015), the security in the healthcare network has to be taken special care of for smooth conduction of all the complex operations. The author stated that any type of security related issues related to the healthcare network is very much vital for the growth and development of the organization. The writer of this resource said that the use of the advanced sensory apparatus and instruments should be practiced in all the healthcare industries as it will enhance the security both from the point of view of the patients as well as from the perspective of the internal and external stakeholders of the hospital. The author also stated that the latest health care industries generally use different types of medical and non-medical devices for different types of activities. The use of the electrical ventilators are promoted into the healthcare industries in the operation rooms. This paper is written beautifully by the writers, balancing all the key points and each of them are specified in details from different perspectives.

 

Critical Analysis

This unit of the paper will be analyzing the different types of security issues of the healthcare network. The major security issues related to the healthcare industries are the phishing email, cyber security issues and the internal threats. The internal threats are the most important among the rest of the issues as it negatively affects the organization, the privacy of the patients as well as the networks [11]. The other types of threats of this healthcare industry is the cyber security issues such as the Wannacry ransomeware which affects the entire network of the hospital authority. The attack coming from the cyber security issues affects the entire industry and cause a huge amount of financial loss of the hospital authorities. The threats coming from the phishing emails also a source of concern for the healthcare network [4]. The prime motive of the cyber criminals is to gain access to PHI. The phishing emails provide a platform to the cyber criminals so spread risks such as the ransomeware. False identities are created using the help of the phishing emails are those personal data are illegally used for different activities by the criminals.

On the other hand, it can be said that using these methods a computer system can be assessed for many months without even getting notified, detection of impacted systems is very much difficult for the hospital authorizations [6]. One of the most important aspects of these networks issues is that it can be used to change the rules and regulations of the hospital authorities which will be very much immoral from the point of view of their sales and services which there were supposed to provide to their clients.

Most of the major healthcare organization deals with different types of non-governmental organization for different types of purposes. It involves different vendors who get themselves attached to the organization for business purpose and are considered as one of the most important factors of network security.

 

Threat Mitigation

This section of the paper will be focusing on the risk mitigation strategy of wanna cry ransomeware, however it needs to be understood that there is no actual preventive measure of this cyber security issue [10]. The following paragraph will be giving an idea about the different steps which can be followed in order to minimize the chances of getting infected from deadly malicious programs such as the wanna cry ransomeware. The implementation of a dedicated IT team in each department helps in maintaining network security in the healthcare premises. Ad blocking extensions should be enabled in each of the computer systems which are connected to the network. The practice of updating the latest versions of the operating systems used in the healthcare industry as well as updating the network based applications are very much useful in containing or minimizing the issues which have a direct negative impact on the organization.  

Application of the complex alphanumeric passwords as login credentials for each stakeholder of the healthcare industry is one of the most important criteria regarding the healthcare network security [8]. The data backup processes in the healthcare industries should be frequently practiced using the cloud computing applications. The advanced cloud computing applications are used   in the risk migration strategies in different kinds of ways. All the wireless communications which are installed and used in the hospital premises should be disconnected if they are not actively used.  The attachments of the emails should be properly scanned before downloading it into the system as it will be helpful in preventing the cyber security issues to a huge extent.

 

Reference

Gope, Prosanta, and Tzonelih Hwang. "BSN-Care: A secure IoT-based modern healthcare system using body sensor network." IEEE Sensors Journal 16.5 (2016): 1368-1376.

Bhatt, Chintan, Nilanjan Dey, and Amira S. Ashour, eds. "Internet of things and big data technologies for next generation healthcare." (2017): 978-3.

Zhang, Kuan, et al. "Security and privacy for mobile healthcare networks: from a quality of protection perspective." IEEE Wireless Communications 22.4 (2015): 104-112.

Martínez-Pérez, Borja, Isabel De La Torre-Díez, and Miguel López-Coronado. "Privacy and security in mobile health apps: a review and recommendations." Journal of medical systems 39.1 (2015): 181.

Hossain, M. Shamim, and Ghulam Muhammad. "Cloud-assisted industrial internet of things (iiot)–enabled framework for health monitoring." Computer Networks 101 (2016): 192-202.

Moosavi, Sanaz Rahimi, et al. "End-to-end security scheme for mobility enabled healthcare Internet of Things." Future Generation Computer Systems 64 (2016): 108-124.

Patil, Harsh Kupwade, and Ravi Seshadri. "Big data security and privacy issues in healthcare." Big Data (BigData Congress), 2014 IEEE International Congress on. IEEE, 2014.

Thota, Chandu, et al. "Centralized fog computing security platform for IoT and cloud in healthcare system." Exploring the convergence of big data and the internet of things. IGI Global, 2018. 141-154.

Baig, Mirza Mansoor, Hamid GholamHosseini, and Martin J. Connolly. "Mobile healthcare applications: system design review, critical issues and challenges." Australasian physical & engineering sciences in medicine 38.1 (2015): 23-38.

Islam, SM Riazul, et al. "The internet of things for health care: a comprehensive survey." IEEE Access 3 (2015): 678-708.

Gagnon, Marie-Pierre, et al. "m-Health adoption by healthcare professionals: a systematic review." Journal of the American Medical Informatics Association 23.1 (2015): 212-220.

Stankovic, John A. "Research directions for the internet of things." IEEE Internet of Things Journal 1.1 (2014): 3-9.

OR

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2019). Overview Of Network Security1. Retrieved from https://myassignmenthelp.com/free-samples/mn502-overview-of-network-security1.

"Overview Of Network Security1." My Assignment Help, 2019, https://myassignmenthelp.com/free-samples/mn502-overview-of-network-security1.

My Assignment Help (2019) Overview Of Network Security1 [Online]. Available from: https://myassignmenthelp.com/free-samples/mn502-overview-of-network-security1
[Accessed 12 December 2019].

My Assignment Help. 'Overview Of Network Security1' (My Assignment Help, 2019) <https://myassignmenthelp.com/free-samples/mn502-overview-of-network-security1> accessed 12 December 2019.

My Assignment Help. Overview Of Network Security1 [Internet]. My Assignment Help. 2019 [cited 12 December 2019]. Available from: https://myassignmenthelp.com/free-samples/mn502-overview-of-network-security1.


MyAssignmenthelp.com has become preferred online assignment help provider in Australia due to its efficiency and professionalism. Our highly skilled assignment writers work day in and day out to resolve students' doubts 'can I do my assignment perfectly' or 'will I able to write my assignment exactly in a manner that professors want' and provide them needed Assignment Help. Hence, students, who avail our services, get the chance to secure higher grades.

Latest Networking Samples

ICT703 Network Technology And Management 1

Download : 0 | Pages : 11

Answer: Introduction One of the fundamental parts of any business or organization is the computer network. A computer network is an interconnection of different computing devices such as computers laptops, routers, access points, servers, switches, and other components for the purpose of communication and sharing of resources such as data, applications, and files (Zhuravlev, 2016). Since the network is a critical business requirement of the b...

Read More arrow

MN502 Overview Of Network Security 4

Download : 0 | Pages : 9

Answer: Introduction The specific data network or the computerized network can be defined as the digital telecommunications network, which enables various nodes to share several resources [3]. These computer devices are responsible for exchanging the sensitive information or data with each other by taking the major help of few data connections in the nodes. These data connections can be easily established with the cable media such as wires, o...

Read More arrow

MN502 Overview Of Network Security 3

Download : 0 | Pages : 9

Answer: Introduction The purpose of this report is to discuss about the network of healthcare organisations. A detailed literature review discussing the network of a healthcare organisation is provided. The architecture of a healthcare network is provided in this report. A detailed discussion of the networking devices such as routers, firewalls, switches, and servers is provided in this report. The recent developments in the network of a heal...

Read More arrow

BN305 Virtual Private Network 2

Download : 0 | Pages : 6

Answer: Introduction After a detailed investigation of the infrastructure of the organization and identification of the needs of the network the report is prepared. The current needs of the organization is to establish a VPN connection between remote sites of the same organization and securely transmission of the data packets in the network. The success of the development of the network depends on the successful implementation of the VPN. The V...

Read More arrow

CITS5502 Software Processes

Download : 0 | Pages : 4
  • Course Code: CITS5502
  • University: University Of Western Australia
  • Country: Australia

Answer: Introduction: In this task the main objective is to perform task 1 and task 2 to have an insight about the time needed to write problems in different languages when written repeatedly. In particular at first 7 random students’ required time to write problem 1 in language A and B and problem 2 in language A is selected from a total of 14 students’ data. Then the average time is calculated for each attempt for the three task...

Read More arrow
Next
watch

Save Time & improve Grades

Just share your requirements and get customized solutions on time.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,162,585

Orders

4.9/5

Overall Rating

5,051

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

529 Order Completed

95% Response Time

Ivan Blank

PhD in Functional Human Biology

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1592 Order Completed

96% Response Time

Jane Sima

Ph.D in Psychology with Specialization in Industrial-Organizational Psychology

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

752 Order Completed

100% Response Time

Hugh Cleave

Masters in Human Resource Management (MMgt, HRM)

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

798 Order Completed

97% Response Time

Benjamin Blakeman

MSc in Medical Technology

London, United Kingdom

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

The project was well organized and I got good grade. I could understand clearly and follow what the expert did.

flag

User Id: 186794 - 12 Dec 2019

Australia

student rating student rating student rating student rating student rating

Was a very fast response as usual and I am very happy with my mark. Thank you so much

flag

User Id: 348363 - 12 Dec 2019

Australia

student rating student rating student rating student rating student rating

You are the best. You provided exactly what I need. The expert who did the work is a great. Thank you very much.

flag

User Id: 298410 - 12 Dec 2019

Australia

student rating student rating student rating student rating student rating

I got HD in my one assignment that I bought from here. Very happy and surely gonna need help from you guys for the next time too.

flag

User Id: 311195 - 12 Dec 2019

Australia

student rating student rating student rating student rating student rating
Have any Query?