Critically analyse security issues in healthcare networks

Assignment Help Computer Networking
Reference no: EM132116088

Security Challenges in Emerging Networks

Assignment Description

The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging network-based applications, and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

The use of network technologies is rapidly growing in healthcare sector. Now, healthcare is considered as one of the emerging application of network-based applications. Different network scenarios using wireless, wired, and mobile communications can provide efficient solutions to access electronic medical records (EMRs), medical management systems, imaging, biomedical information, material management, patient accounting, admitting information, and online claims submissions. Today, healthcare systems can combine these tools into one network-based infrastructure to more effectively communicate and collaborate, reduce errors, and improve patient care and efficiency. As healthcare providers adopt new technologies, they also face new security threats. Hackers, malicious software (malware), disgruntled employees, and human error present real dangers to healthcare networks [1]. Security of healthcare networks is a prime concern in today's World.

This assignment includes four parts

1. Literature review on Healthcare Networks.

The literature review should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

Your discussion should include:
i. Healthcare network architecture (consider networking devices such as routers, switches, firewalls, servers etc.)
ii. Recent developments in healthcare networks
iii. The importance of security in healthcare networks

2. Analyse critically, three current or possible future potential security issues in Healthcare Networks.

In this section you will analyse critically, three security issues in Healthcare Networks. These issues should be taken from the current state of the art literature. This section must be supported by at least three (3) references.

3. Propose a possible solution for one of the threats identified in section-2.

In this part you need to choose one of the issues identified in the previous section and propose a possible solution to the particular security issue.

4. Create a 3 - 5 minutes presentation and present your work during the Lab.

You have to create a 3 - 5 minutes presentation to present your work in front of your class fellows and tutor during the Lab in Week 11.

Verified Expert

In the given assignment, we were required to solve the problem based on networking aspects. The purpose of doing this task was to depict the core knowledge on the networking aspects.

Reference no: EM132116088

Questions Cloud

What is the project npv if the tax rate is 30 : The annual operating cash flow is $70132 and the cost of capital is 5% %?What is the project's NPV if the tax rate is 30
Explain your thought process to the class : Explain your thought process to the class. Be sure to mention a reasonable due date and responsible party.
Expalin which plan will give the best perfomance and why : Draw 3 different querry plans(trees) for the following SQL. Statement and schema. you have to write the necessary table names.
Financial statement information for the zamboni icers : Consider the following financial statement information for the Zamboni Icers Corporation:
Critically analyse security issues in healthcare networks : Analyse critically, three security issues in Healthcare Networks. These issues should be taken from the current state of the art literature
Write a method that returns the index of the second element : Write a method that returns the index of the second smallest element in an array of integers.
How many times the loop calculate is going to be executed : For the following assembly code, how many times the loop ‘calculate' is going to be executed? Why?
What is the value of his account after making the fifth : What is the value of his account after making the fifth deposit?
Find the probability that a randomly selected cd player : CD players are normally distributed with a mean of 7.1 years and a standard deviation of 1.4 years

Reviews

urv2116088

11/19/2018 3:17:12 AM

Submission Guidelines The assignment should be submitted on the Moodle in two separate files: 1. The report should be submitted as a Word file 2. The presentation should be submitted as a PPT fileProper reference?? nd used IEEE reference. i am very happy with this assignment. my professor say ppt is good and much slide. Every thing seems good prepared the solution keeping everything in mind related to graduation grade level. I will prefer to friends you guys are good and helpful and all the required criterias are fulfilled in the assignment, Thanks.

len2116088

9/18/2018 5:48:22 AM

Hi mate, pls make sure you guys read the whole pdf of this assignment and also follow all the instructions or format should be correct. Moreover, pls check the plagiarism and it should be plagiarism free. THANK YOU The assignment should be submitted on the Moodle in two separate files: 1. The report should be submitted as a Word file 2. The presentation should be submitted as a PPT file

Write a Review

Computer Networking Questions & Answers

  Explain public-key cryptography standard

Explain in detail how PKCS (Public-Key Cryptography Standard), when combined with the RSA algorithm, can thwart Eve's attempt at discovering the encrypted figure.

  Draw potential network architecture of data network

Draw the potential network architecture of the data network for secondary campus to main campus of university (Detail and describe the function of each component in the network.

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Cisco packet tracer

You can use Cisco Packet Tracer for this assignment (more information on use of Packet Tracer can be discussed with your Lecturer in Tutorial class).

  Advantages and disadvantages of network processors

What are the advantages and disadvantages of network processors, such as hubs, switches, routers, and gateways?

  Pros and cons of long distances agreements

The telephone communication systems and long distances agreements are managed by a telecommunications department in the headquarters that reports to the vice president of finance. Outline pros and cons of both alternatives.

  List the advantages and disadvantages of type of topology

List the advantages and disadvantages of the type of topology and how it can be applied to the realm of data communication.

  List the benefits of the solution

List the benefits of the solution. Ensure that this solution will eliminate all interoffice toll charges. The design and the implemented solution should not adversely affect the network performance across the WAN. Diagram your proposed network lay..

  Importance of communication protocols

Question 1: Explain the importance of communication protocols. Question 2: Identify the protocols in your design and provide rationale for your decision. Question 3: Define the overall network architecture.

  Discussion on future computer networks

Network requirement analysis and plan - Discussion on future computer networks (How would the future computer networks be like?

  Analyze the key tools available for scanning a network

Analyze the key tools available for scanning a network. Recommend one (1) scanning tool for a hacker and one (1) scanning tool for a security administrator that you believe provide the greatest protection for a network. Indicate which of the chosen t..

  Discuss the seven layer of open system interconnection model

Identify and discuss the seven layers of the Open System Interconnection (OSI) model and their importance on TCP/IP operation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd