country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

MN502 Overview Of Network Security1

tag 1 Download10 Pages / 2,261 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

This assignment includes four parts
 
1. Literature review on Healthcare Networks.
 
The literature review should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.
 
Your discussion should include:
 
i. Healthcare network architecture (consider networking devices such as routers, switches, firewalls, servers etc.)
ii. Recent developments in healthcare networks
iii. The importance of security in healthcare networks
 
2. Analyse critically, three current or possible future potential security issues in Healthcare Networks.
 
In this section you will analyse critically, three security issues in Healthcare Networks. These issues should be taken from the current state of the art literature. This section must be supported by at least three (3) references.
 
3. Propose a possible solution for one of the threats identified in section-2.
 
In this part you need to choose one of the issues identified in the previous section and propose a possible solution to the particular security issue.
 
 

Answer:

Introduction:

The prime objective of this paper is to understand the security issues of the private networks in both the private and public sector industries. The different types of securities issues of the network based applications and the cloud based applications are highlighted in this paper. The paper highlights the recent developments in the field of science and technology considering the security aspects of healthcare networks [12]. The importance of the security measures is also discussed in this paper which helps the readers to more about the changing nature of the risks. Critical analysis of the security issues are the major healthcare industry is the most essential feature of this papers along with that the paper also discusses the different types of threats. The three major threats of the healthcare care industry which are malicious programs such as the Wannacry ransomeware, threats coming from inside the healthcare industry and the threats coming from the different types of phishing emails are discussed thoroughly in the paper [5]. All the associated issue related to these major risks are also discussed in this paper so that all the essential details related to the network security in hospitals as considered. The risk mitigation steps of one of the three discussed issues are stated in the paper. The risk mitigation steps are proposed in such a way that it maintains the growth and productivity from both the point of view of the internal as well as the external stakeholders of the hospital.

 

Healthcare network architecture 

According to Patil, Harsh and Ravi (2014), the healthcare network architecture is a very important aspect regarding the healthcare care industry. The author stated that the hospital authorities and patients access sensitive information which is needed to be protected at any cost. The authors of this paper highlighted the importance of the security in the network architecture, they stated that it is very important for the hospital authorities to concentrate more on the architectural of those networks as they are the most basic and fundamental units of the networking system in the healthcare industries. According to the author the developments in the field of advanced computer applications has led to the growth of advanced threats and vulnerabilities which can have a direct negative impact on the outcome of the healthcare industry.

According to the author all the components of the networking architecture are vulnerable to the threats and vulnerabilities so each of those components should be frequently evaluated by dedicated teams which will be enhancing the efficiency of those architecture. The writer of this resource stated that each unit or block of the network architecture should be critically examined so that there is no security issues related to them. The author focused on the importance of the analyzing different units of the networking system such as the packets which are transmitted from one point of a system to another point. The security issues related to the routers can be purposefully solved with the help of the risk mitigation strategies which are stated in the later sections of the paper. However, it was found that the main limitations of this resource us that the author failed to showcase any particular healthcare industry which is facing issues in their network architecture.

As discussed by Baig et al. (2015), trafficking is one of the most vital issues related to the server security in the healthcare industries. These issues can have a direct negative impact on the network architecture in healthcare industry. The author of this paper focused on finding the possible risks involved in the healthcare network architecture and the author concluded that ARP spoofing and Spanning Tree control attacks are the most significant vulnerabilities associated with those networks. MAC address flooding is the other types of network security issues related to the healthcare network architecture.

The author stated that there are different kinds of malicious attacks such as the distributed denial of service attack which is the most common types of attack in the healthcare network architecture. The vulnerabilities coming from the insiders are the other source of concern for the healthcare network architecture as they have the access to the entire fundamental architecture of the healthcare network. According to the author, the security of the healthcare network should be enhanced as much as possible.

The author stated that the unauthorized access is a type of threat coming from the insiders is also a concern for the healthcare industries as any types of alteration of the data which are transmitted in the hospital organizations is very much harmful for both the perspective of the hospital authorities as well as the from the point of view of the patients. The author also highlighted that the invalid configurations are the other type of threat to the network architecture of the healthcare industry. The different types of malicious attacks and data breaches are the other vital threats to the networking architecture of the healthcare industries. According to the author these threats have the potential to seize and alter any type of essential data which are circulated within the organization. The other kind of threat involved in the networking architecture are the switch spoofing and double tagging process. These issues have a direct negative impact on the healthcare network architecture. However, it was found that the foremost restrictions of this resource are that the authors were unsuccessful to focus on any specific hospital that have already faced extreme adverse conditions due to the malicious attacks or threats coming from the insiders which could have authenticated their statements.

As stated by Zhang et al. (2015), malfunctioning of the different modules of the healthcare network is the other security issues in healthcare industry as the hospital organization can get hugely affected by it. The other threats of healthcare network architecture are the attacks coming from the CDP and telnet. Fragmentation attacks are the other types of attacks related to the networking security of the healthcare industry. The main limitation of this paper is that the statements are written mostly in generalized form without any specifications.

 

Recent developments in healthcare networks

As discussed by Gope, Prosanta and Tzonelih (2016), the extensive development in the field of information technology has led to the growth of important technologies which effectively help to main security in the healthcare industries. The application of artificial intelligence in the networking sector of the healthcare is one of the most important recent development in the healthcare industries. The author focused on the latest AI based applications which provide a great deal of accuracy in securing the hospital networks from the external threats. The writer of this resource highlighted the use of business intelligence is the other major type of development in the health care network as it help the hospital authorities to deal with the future securities issues on their private networks. Cloud computing technology is also increasingly used by the latest healthcare industries which helps in the maintaining the privacy and security of the healthcare networks. However, it was found that the main limitations of this resource is that it do not discuss the compatibility issues of the latest technologies with the hospital authorities as it would have guided the other hospitals who are planning to implement these technologies on their environment.

The importance of security in healthcare networks

As stated by Bhatt, Nilanjan and Amira (2015), the security in the healthcare network has to be taken special care of for smooth conduction of all the complex operations. The author stated that any type of security related issues related to the healthcare network is very much vital for the growth and development of the organization. The writer of this resource said that the use of the advanced sensory apparatus and instruments should be practiced in all the healthcare industries as it will enhance the security both from the point of view of the patients as well as from the perspective of the internal and external stakeholders of the hospital. The author also stated that the latest health care industries generally use different types of medical and non-medical devices for different types of activities. The use of the electrical ventilators are promoted into the healthcare industries in the operation rooms. This paper is written beautifully by the writers, balancing all the key points and each of them are specified in details from different perspectives.

 

Critical Analysis

This unit of the paper will be analyzing the different types of security issues of the healthcare network. The major security issues related to the healthcare industries are the phishing email, cyber security issues and the internal threats. The internal threats are the most important among the rest of the issues as it negatively affects the organization, the privacy of the patients as well as the networks [11]. The other types of threats of this healthcare industry is the cyber security issues such as the Wannacry ransomeware which affects the entire network of the hospital authority. The attack coming from the cyber security issues affects the entire industry and cause a huge amount of financial loss of the hospital authorities. The threats coming from the phishing emails also a source of concern for the healthcare network [4]. The prime motive of the cyber criminals is to gain access to PHI. The phishing emails provide a platform to the cyber criminals so spread risks such as the ransomeware. False identities are created using the help of the phishing emails are those personal data are illegally used for different activities by the criminals.

On the other hand, it can be said that using these methods a computer system can be assessed for many months without even getting notified, detection of impacted systems is very much difficult for the hospital authorizations [6]. One of the most important aspects of these networks issues is that it can be used to change the rules and regulations of the hospital authorities which will be very much immoral from the point of view of their sales and services which there were supposed to provide to their clients.

Most of the major healthcare organization deals with different types of non-governmental organization for different types of purposes. It involves different vendors who get themselves attached to the organization for business purpose and are considered as one of the most important factors of network security.

 

Threat Mitigation

This section of the paper will be focusing on the risk mitigation strategy of wanna cry ransomeware, however it needs to be understood that there is no actual preventive measure of this cyber security issue [10]. The following paragraph will be giving an idea about the different steps which can be followed in order to minimize the chances of getting infected from deadly malicious programs such as the wanna cry ransomeware. The implementation of a dedicated IT team in each department helps in maintaining network security in the healthcare premises. Ad blocking extensions should be enabled in each of the computer systems which are connected to the network. The practice of updating the latest versions of the operating systems used in the healthcare industry as well as updating the network based applications are very much useful in containing or minimizing the issues which have a direct negative impact on the organization.  

Application of the complex alphanumeric passwords as login credentials for each stakeholder of the healthcare industry is one of the most important criteria regarding the healthcare network security [8]. The data backup processes in the healthcare industries should be frequently practiced using the cloud computing applications. The advanced cloud computing applications are used   in the risk migration strategies in different kinds of ways. All the wireless communications which are installed and used in the hospital premises should be disconnected if they are not actively used.  The attachments of the emails should be properly scanned before downloading it into the system as it will be helpful in preventing the cyber security issues to a huge extent.

 

Reference

Gope, Prosanta, and Tzonelih Hwang. "BSN-Care: A secure IoT-based modern healthcare system using body sensor network." IEEE Sensors Journal 16.5 (2016): 1368-1376.

Bhatt, Chintan, Nilanjan Dey, and Amira S. Ashour, eds. "Internet of things and big data technologies for next generation healthcare." (2017): 978-3.

Zhang, Kuan, et al. "Security and privacy for mobile healthcare networks: from a quality of protection perspective." IEEE Wireless Communications 22.4 (2015): 104-112.

Martínez-Pérez, Borja, Isabel De La Torre-Díez, and Miguel López-Coronado. "Privacy and security in mobile health apps: a review and recommendations." Journal of medical systems 39.1 (2015): 181.

Hossain, M. Shamim, and Ghulam Muhammad. "Cloud-assisted industrial internet of things (iiot)–enabled framework for health monitoring." Computer Networks 101 (2016): 192-202.

Moosavi, Sanaz Rahimi, et al. "End-to-end security scheme for mobility enabled healthcare Internet of Things." Future Generation Computer Systems 64 (2016): 108-124.

Patil, Harsh Kupwade, and Ravi Seshadri. "Big data security and privacy issues in healthcare." Big Data (BigData Congress), 2014 IEEE International Congress on. IEEE, 2014.

Thota, Chandu, et al. "Centralized fog computing security platform for IoT and cloud in healthcare system." Exploring the convergence of big data and the internet of things. IGI Global, 2018. 141-154.

Baig, Mirza Mansoor, Hamid GholamHosseini, and Martin J. Connolly. "Mobile healthcare applications: system design review, critical issues and challenges." Australasian physical & engineering sciences in medicine 38.1 (2015): 23-38.

Islam, SM Riazul, et al. "The internet of things for health care: a comprehensive survey." IEEE Access 3 (2015): 678-708.

Gagnon, Marie-Pierre, et al. "m-Health adoption by healthcare professionals: a systematic review." Journal of the American Medical Informatics Association 23.1 (2015): 212-220.

Stankovic, John A. "Research directions for the internet of things." IEEE Internet of Things Journal 1.1 (2014): 3-9.

Download Sample

Get 100% money back after download, simply upload your unique content* of similar no. of pages or more. We verify your content and once successfully verified 100% value credited to your wallet within 7 days.

Upload Unique Document

Document Under Evaluation

Get Credits into Your Wallet

*The content must not be available online or in our existing Database to qualify as unique.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2019). Overview Of Network Security1. Retrieved from https://myassignmenthelp.com/free-samples/mn502-overview-of-network-security1.

"Overview Of Network Security1." My Assignment Help, 2019, https://myassignmenthelp.com/free-samples/mn502-overview-of-network-security1.

My Assignment Help (2019) Overview Of Network Security1 [Online]. Available from: https://myassignmenthelp.com/free-samples/mn502-overview-of-network-security1
[Accessed 12 July 2020].

My Assignment Help. 'Overview Of Network Security1' (My Assignment Help, 2019) <https://myassignmenthelp.com/free-samples/mn502-overview-of-network-security1> accessed 12 July 2020.

My Assignment Help. Overview Of Network Security1 [Internet]. My Assignment Help. 2019 [cited 12 July 2020]. Available from: https://myassignmenthelp.com/free-samples/mn502-overview-of-network-security1.


MyAssignmenthelp.com has become preferred online assignment help provider in Australia due to its efficiency and professionalism. Our highly skilled assignment writers work day in and day out to resolve students' doubts 'can I do my assignment perfectly' or 'will I able to write my assignment exactly in a manner that professors want' and provide them needed Assignment Help. Hence, students, who avail our services, get the chance to secure higher grades.

Latest Networking Samples

CO4509 Computer Security Assignment

Download : 0 | Pages : 14
  • Course Code: CO4509
  • University: University Of Central Lancashire
  • Country: United Kingdom

Answer: Introduction: Computer security is a major concern for every organisation and most importantly to safe guard the data stored on the system from any loss. It is important to secure the information from data loss or inception of viruses or malware in the system. Security completely deals with securing the data stored on the network from any unauthorized loss. Every organisation is dependent on computer for performing certain tasks thus ...

Read More arrow

HS1011 Data Communication And Networks Methodology

Download : 0 | Pages : 5
  • Course Code: HS1011
  • University: Victoria University
  • Country: Australia

Answer: Introduction The given three scenario are analyzed for the selection of the network management tool. With the increase in the complexity of the network it is crucial to select a robust network monitoring solution and thus the Manage Engine network monitoring tool is selected for analyzing the data flow in the network. It can be used for monitoring the network activities and get the status of each of the network devices connected with ...

Read More arrow

CS2S562 Secure Software Development

Download : 0 | Pages : 2

Answer: Introduction: Internet of things is simply network of  any physical computing devices. The IoT devices are used literary in day to day activities. So many devices are constructed emulating the internet of things.  Since there are so many devices of internet of things, i simulated a home automation system using C sharp programming language, visual studio 2015 IDE. From the requirement of the console system application of th...

Read More arrow

COIT20261 Network Routing And Switching 2

Download : 0 | Pages : 4

Answer: A 1: a)                           b)                   c)   Here /27 is the subnet mask, ie) 255.255.255.224   Binary Format of Given Address is,   154.78.177.3         --->10011010.01001110.10110001.000 00011   2...

Read More arrow

CI7130 Network And Information Security

Download : 0 | Pages : 13
  • Course Code: CI7130
  • University: Kingston University London
  • Country: United Kingdom

Answer: Introduction: The aim of this report is to address the issues and challenges being faced by the AO world plc organization considering the last IT installation and the operations involved within the activities of the organization. Since the organization is based on online services, it has become a considerable factor for addressing the vulnerabilities related to the challenges and issues in the security of the network. The organization...

Read More arrow
Next
watch

Save Time & improve Grade

Just share Requriment and get customize Solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,360,163

Orders

4.9/5

Overall Rating

5,081

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

529 Order Completed

95% Response Time

Ivan Blank

PhD in Functional Human Biology

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2115 Order Completed

97% Response Time

Kimberley Chen

MPA in Accounting

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1896 Order Completed

95% Response Time

Herman Berens

MSc in Psychology

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

798 Order Completed

97% Response Time

Benjamin Blakeman

MSc in Medical Technology

London, United Kingdom

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

good it was perfect clear answer just what i need for ode thank you so much!! clear and in steps

flag

User Id: 304633 - 12 Jul 2020

Australia

student rating student rating student rating student rating student rating

The current help needs to improve on his English writing. While the coach was helpful in providing the content, I had to rework the context of whole paper to make it readable for the level of output expected. But overall it was helpful since I don't ...

flag

User Id: 223122 - 12 Jul 2020

Australia

student rating student rating student rating student rating student rating

Work is perfectly written, though not graded yet but I’m being optimistic that a good grade will be awarded.

flag

User Id: 369420 - 12 Jul 2020

Australia

student rating student rating student rating student rating student rating

It was well written and I\'m 100% satisfied. The expert knew exactly what to do and finished well above my expectations.

flag

User Id: 332269 - 12 Jul 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?