Current or possible future potential security issues

Assignment Help Computer Network Security
Reference no: EM132118831

Security Challenges in Emerging Networks

Assignment Description

The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging network-based applications, and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

The use of network technologies is rapidly growing in healthcare sector. Now, healthcare is considered as one of the emerging application of network-based applications. Different network scenarios using wireless, wired, and mobile communications can provide efficient solutions to access electronic medical records (EMRs), medical management systems, imaging, biomedical information, material management, patient accounting, admitting information, and online claims submissions. Today, healthcare systems can combine these tools into one network-based infrastructure to more effectively communicate and collaborate, reduce errors, and improve patient care and efficiency. As healthcare providers adopt new technologies, they also face new security threats. Hackers, malicious software (malware), disgruntled employees, and human error present real dangers to healthcare networks [1]. Security of healthcare networks is a prime concern in today's World.

This assignment includes four parts

1. Literature review on Healthcare Networks.

The literature review should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

Your discussion should include:
i. Healthcare network architecture (consider networking devices such as routers, switches, firewalls, servers etc.)
ii. Recent developments in healthcare networks
iii. The importance of security in healthcare networks

2. Analyse critically, three current or possible future potential security issues in Healthcare Networks.

In this section you will analyse critically, three security issues in Healthcare Networks. These issues should be taken from the current state of the art literature. This section must be supported by at least three (3) references.

3. Propose a possible solution for one of the threats identified in section-2.

In this part you need to choose one of the issues identified in the previous section and propose a possible solution to the particular security issue.

4. Create a 3 - 5 minutes presentation and present your work during the Lab.

You have to create a 3 - 5 minutes presentation to present your work in front of your class fellows and tutor during the Lab in Week 11.

Note: Need powerpoint ppt of this assignment

Verified Expert

Thw work is in ms word and ieee format to focus on the security challenges which helps in defining the needs of the system. It includes the factors that are realted to work on setting up system and performing in an effective manner. We have also prepared a ppt

Reference no: EM132118831

Questions Cloud

Explain about a cloud-based office productivity suite : The Vice President of Sales for your company has asked you for more information on cloud-based office productivity suites.
Compare two presentation programs : Create a matrix comparing five features of presentation software. Using these five features, compare two presentation programs.
What is meant by the term speciation : Why do the authors recommend focusing on identifying markets for a technology based product, rather than identifying products for a fixed market?
What types of limits are likely being placed on shelly : If AutoDoc's non - compete agreement was legally challenged, what would a court consider in determining whether it is enforceable or not?
Current or possible future potential security issues : In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain
Discuss how the pmp is used to keep the project : Discuss how the PMP is used to keep the project within scope, schedule, cost and quality agreements.
Based on land-minerals and natural resources : Based on land, minerals and natural resources, labor and entrepreneurial innovation, which country do you feel has the greatest long-term potential China
Describe the theoretical problems of ethics : Describe the theoretical problems of ethics (3), the objectives to solving them.
Discuss abbout the networks privacy policy : In a highly controversial move, your favorite social network has just agreed to allow Walmart access to the postings, messages, and photos of its users.

Reviews

urv2118831

11/13/2018 3:43:55 AM

The assignment should be plagiarism free and also need powerpoint ppt of this assignment. Dear expert mind team The price is also pocket-friendly and being a student it was affordable for me. I hope you understand the situation of the students. I really appreciate your positive response. Thanks. Amazing job dear experts and thanks a lot to expertsmind to avail me such expert who followed every units instruction perfectly. I am really amazed by the grades I received with your help. I am really thankful. I have passed the class with A grade. You are a true lifesaver.

len2118831

9/21/2018 3:37:37 AM

Section to be included in the report Description of the section Marks Introduction Introduction of Healthcare Networks. Introduction should also discusses the report outline. 5 Literature Review Literature review of Healthcare Networks ? Healthcare network architecture (consider networking devices such routers, switches, firewalls, servers etc.) ? Recent developments in healthcare networks ? The importance of security in healthcare networks 15 Analyse Critically Analyse critically, three potential security issues in Healthcare Networks. 12 Threat Mitigation Technique Discuss in detail a threat mitigation technique for one of the security threat 10 Report layout The report layout should be appropriate (following the submission guidelines and containing all the sections mentioned above) 3 Reference Style Follow IEEE reference style 5 Presentation Slides The presentation slides should be well organised and clear. 5 Oral Presentation Delivery of the presentation (quality of the presentation, depth of knowledge on the material presented and ability to answer questions asked by the audience) 5 Total 60

Write a Review

Computer Network Security Questions & Answers

  Write the enterprise technical infrastructure security plan

Write one page with references in APA format.Utilizing your comprehensive security plan outline as a guide (It is the attached document), write the enterprise technical infrastructure security plan for the organization.

  What version of ssh is the target running

What version of SSH is the target running? What version of FTP is the target running? What is port 5900 used for on the target? What OS is running on target?

  What is cryptanalysis

What is cryptanalysis. Give an example of a cryptanalytic problem. Describe the components of a digital stream cipher.

  Analyze the header files of spams

Analyze the header files of spams. The file 199803.zip is a collection of spams received by someone during 1998 March (http://untroubled.org/spam/, other spam archives could be found at:http://spamlinks.net/filter-archives.htm, etc.).

  Explain the security methods and controls that need

Describe the security methods and controls that need to be implemented in order to ensure compliance with these standards and regulatory requirements.

  Reduce the temptation to become a hacker

Most hackers start their careers breaking into computer systems as teenagers. - What can we as a community of computer professionals do to reduce the temptation to become a hacker?

  De-cipher the message using vigenere cipher analysis tool

Using statistical analysis only on Caesar cipher, decrypt this cipher. Show your work in detail. Do not use brute force - De-cipher the following message using Vigenere Cipher analysis tool

  Explain in detail the security controls

Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five (5) selected logical threats. Determine the impact of at least five (5) potential logical thr..

  How do ddos and drdos attacks differ

What is the main goal in a Denial of Service (DoS) attack?How do DDoS and DRDoS attacks differ?What is the difference between a virus and a worm?What is social engineering? What is the best defense against social engineering?

  Discuss the major categories of information security control

Define and discuss the major categories of information security controls

  Explore application level dos attacks using slow loris

You can also explore application level DoS attacks using Slow Loris and RUDY using the exercise presented in [DAMO12].

  Identify troubleshooting tools need to manage your security

Identify troubleshooting tools needed to verify and manage your security settings. Identify at least three tools.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd