How to identify plausible security issues

Assignment Help Computer Networking
Reference no: EM132119474

Security Challenges in Emerging Networks

Assignment Description

The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging network-based applications, and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

The use of network technologies is rapidly growing in healthcare sector. Now, healthcare is considered as one of the emerging application of network-based applications. Different network scenarios using wireless, wired, and mobile communications can provide efficient solutions to access electronic medical records (EMRs), medical management systems, imaging, biomedical information, material management, patient accounting, admitting information, and online claims submissions. Today, healthcare systems can combine these tools into one network-based infrastructure to more effectively communicate and collaborate, reduce errors, and improve patient care and efficiency. As healthcare providers adopt new technologies, they also face new security threats. Hackers, malicious software (malware), disgruntled employees, and human error present real dangers to healthcare networks [1]. Security of healthcare networks is a prime concern in today's World.

This assignment includes four parts

1. Literature review on Healthcare Networks.

The literature review should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

Your discussion should include:
i. Healthcare network architecture (consider networking devices such as routers, switches, firewalls, servers etc.)
ii. Recent developments in healthcare networks
iii. The importance of security in healthcare networks

2. Analyse critically, three current or possible future potential security issues in Healthcare Networks.

In this section you will analyse critically, three security issues in Healthcare Networks. These issues should be taken from the current state of the art literature. This section must be supported by at least three (3) references.

3. Propose a possible solution for one of the threats identified in section-2.

In this part you need to choose one of the issues identified in the previous section and propose a possible solution to the particular security issue.

4. Create a 3 - 5 minutes presentation and present your work during the Lab.

You have to create a 3 - 5 minutes presentation to present your work in front of your class fellows and tutor during the Lab in Week 11.

Note: Need powerpoint ppt of this assignment

Reference no: EM132119474

Questions Cloud

How might the company go about alerting consumers : As a distributor, Testa Produce doesn't have direct contact with the public. How might the company go about alerting consumers to its "green" initiatives?
Provide an overview of the governance : Provide an overview of the governance, law, or standard explaining how it is intended to protect civilians.
How the given systems-enabled tasks are performed : Write a 350- to 525-word description of your use of technology systems in your current or past jobs. If you have no personal experience to draw from.
Fulfill the monthly demand : Thus Monday July 16th,2018 will give a one week lead time to fulfill the monthly demand (assuming end of the month order deadline for monthly requirements).
How to identify plausible security issues : How to identify plausible security issues in this emerging network-based applications, and finally learn the skill of adding knowledge to existing domain
Discuss about the formal company emails : Formal Company Emails. Acting as supervisor for a company of your choice, draft two examples of formal company e-mails to employees.
Alternative strategies available for the firm : How well does Tiger Brand's vision and mission statement help narrow down feasible alternative strategies available for the firm?
Permission or compensation for the non us authors : As a result, U.S. publishers routinely published foreign works without permission or compensation for the non U.S. authors.
What kind of liability does buymore have for bob actions : 1) What kind of liability does BuyMore have for Bob's actions? 2) Was a valid contract formed, binding BuyMore? 3) What kind of liability does Bob face?

Reviews

len2119474

9/22/2018 1:46:58 AM

Section to be included in the report Description of the section Marks Introduction Introduction of Healthcare Networks. Introduction should also discusses the report outline. 5 Literature Review Literature review of Healthcare Networks • Healthcare network architecture (consider networking devices such routers, switches, firewalls, servers etc.) • Recent developments in healthcare networks • The importance of security in healthcare networks 15 Analyse Critically Analyse critically, three potential security issues in Healthcare Networks. 12 Threat Mitigation Technique Discuss in detail a threat mitigation technique for one of the security threat 10 Report layout The report layout should be appropriate (following the submission guidelines and containing all the sections mentioned above) 3 Reference Style Follow IEEE reference style 5 Presentation Slides The presentation slides should be well organised and clear. 5 Oral Presentation Delivery of the presentation (quality of the presentation, depth of knowledge on the material presented and ability to answer questions asked by the audience) 5 Total 60

len2119474

9/22/2018 1:46:48 AM

• All work must be submitted on Moodle by the due date along with a title Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

len2119474

9/22/2018 1:46:21 AM

Hi mate, pls make sure you guys read the whole pdf of this assignment and also follow all the instructions or format should be correct. Moreover, pls check the plagiarism and it should be plagiarism free. THANK YOU

Write a Review

Computer Networking Questions & Answers

  Why do we pursue technologies

Why do we pursue technologies, such as those associated with virtual reality? Going back to one of our definitions of technology, what problem are we trying to solve? What are the risks associated with these technologies?

  Review of the current market for online education

Your task is to provide a critical review of the current market for online education as well as providing an overview and definition of what online education is and how it works.

  Implementing ospf over a multipoint frame

Implementing OSPF over a Multipoint Frame Relay needs more planning and requires specific configurations such as (1) a single subnet for every PVC or (2) a single subnet for all routers using point to point subinterfaces associated with each PVC

  The law of diminishing returns

The law of diminishing returns says that you get a smaller and smaller return (benefit) as you invest more and more. An example would be: if you spend $100 on insulating your home

  Create a chart that illustrates diversity of your network

Create a chart that illustrates the diversity of your network. Include at least ten dimensions of diversity, such as social class, race, age, personality type, job function, and so on.

  What is the difference between lan and wan

What is the difference between an intranet and an extranet? What is the difference between LAN and WAN?

  Advantages of using wireless sensor networks

The alerts are delivered to smartphones or street signs. Identify the advantages and disadvantages of using wireless sensor networks to alleviate the problem

  Nmap feature to guess the os of the host

Is Nmap able to recognize operating system running on each system? Is there any Nmap feature which can be utilized to guess OS of host?

  Determine maximum value for tcp sequence numbers

Determine the maximum value of L such that TCP sequence numbers are not exhausted? Recall that TCP sequence number filed has four bytes.

  Explaining bgpv4 router receives update

Suppose a BGPv4 router receives update for prefix P which indicates AS1 is next hop.

  What is the maximum overhead in a byte stuffing algorithm

Computer Networks 4310- What is the maximum overhead in a byte stuffing algorithm? TV channels are 6MHz wide. How many bits/sec can be sent if we use 4 level digital signals?

  Find the minimum distance of the encoding function

Coding of Binary Information and Error Detection (IX)Minimum Distance of the Encoding Function

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd