Literature review on healthcare networks

Assignment Help Computer Networking
Reference no: EM132110078 , Length: word count:1800

Security Challenges in Emerging Networks

Assignment Description

The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging network-based applications, and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

The use of network technologies is rapidly growing in healthcare sector. Now, healthcare is considered as one of the emerging application of network-based applications. Different network scenarios using wireless, wired, and mobile communications can provide efficient solutions to access electronic medical records (EMRs), medical management systems, imaging, biomedical information, material management, patient accounting, admitting information, and online claims submissions. Today, healthcare systems can combine these tools into one network-based infrastructure to more effectively communicate and collaborate, reduce errors, and improve patient care and efficiency. As healthcare providers adopt new technologies, they also face new security threats. Hackers, malicious software (malware), disgruntled employees, and human error present real dangers to healthcare networks [1]. Security of healthcare networks is a prime concern in today's World.

This assignment includes four parts

1. Literature review on Healthcare Networks.

The literature review should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

Your discussion should include:
i. Healthcare network architecture (consider networking devices such as routers, switches, firewalls, servers etc.)
ii. Recent developments in healthcare networks
iii. The importance of security in healthcare networks

2. Analyse critically, three current or possible future potential security issues in Healthcare Networks.

In this section you will analyse critically, three security issues in Healthcare Networks. These issues should be taken from the current state of the art literature. This section must be supported by at least three (3) references.

3. Propose a possible solution for one of the threats identified in section-2.

In this part you need to choose one of the issues identified in the previous section and propose a possible solution to the particular security issue.

4. Create a 3 - 5 minutes presentation and present your work during the Lab.

You have to create a 3 - 5 minutes presentation to present your work in front of your class fellows and tutor during the Lab in Week 11.

Reference no: EM132110078

Questions Cloud

Model of transformation organisation : Explain in detail the five Ps of the model of transformation organisation
Describe the concept of the black swan : Describe the concept of the black swan. Explain if you either support or dismiss the concept of the black swan.
What were your key learnings during the bsg simulation : What were your key learnings during the BSG Simulation? What did you discover about working as a member of a management team?
Appropriate graphical or other eda techniques : Use appropriate graphical or other EDA techniques to get an indication as to which of these distributions is the more likely source of the sample.
Literature review on healthcare networks : Overview of Network Security - Security Challenges in Emerging Networks - Analyse critically, three current or possible future potential security issues
What is the process capability? index-cpk?-equal to : The Farley Manufacturing Company prides itself on the quality of its products. What is the process capability? index, Cpk?, equal to?
Steps to getting the probability : Can someone please show me the steps to getting the probability, I keep getting .0576 but that's not right. Any help would be appreciated.
Explain whether he is entitled to worker compensation : Explain whether he is entitled to worker’s compensation.
Emergency management during disaster response : What is the problem when we do not have interoperability in Emergency Management during a disaster response?

Reviews

len2110078

9/11/2018 3:15:37 AM

Reference Style /5 Clear styles with excellent source of references Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors Presentation slides /5 Well organised and resourceful Organised and resourceful Resourceful but could be better organised Resourceful slides Neither resourceful nor well organised Oral Presentation /5 Good delivery, easy to follow and good interaction Delivered, easy to follow and provided a level of interaction Delivered and provided a level of interaction Delivered No oral presentation

len2110078

9/11/2018 3:15:32 AM

Analyse critically /12 Exceptional discussion on security issues in healthcare networks. Identifying highly sophisticated and well referenced vulnerabilities Exceptional discussion on security issues in healthcare networks. Good Discussion on three security issues Discussion on Two security issues Unable to identify security issues Threat Mitigation Technique /10 A very clear and in-depth discussion about threat mitigation technique Very clear discussion about threat mitigation technique Generally good discussion threat mitigation technique Brief discussion about threat mitigation technique Poor discussion about threat mitigation technique with irrelevant information Report Layout /3 Well-designed layout and proper formatting following the submission guidelines and containing all the sections Well-designed layout following the submission guidelines and containing all the sections Good layout following the submission guidelines and containing all the sections Report layout following the submission guidelines and missing some sections Report lacks a proper layout

len2110078

9/11/2018 3:15:27 AM

Marking Rubric for Assignment #2: Total Marks 60 Grade Mark HD 80% D 70%-79% CR 60%-69% P 50%-59% Fail <50% Excellent Very Good Good Satisfactory Unsatisfactory Introduction /5 Introduction is very well written and the report outline is also discussed Introduction is well written and the report outline is also discussed Introduction is generally presented along with the report outline Introduction is presented briefly and is missing the report outline Poor Introduction with irrelevant details Literature review /15 Excellent literature review with proper referencing Well written literature review presented with correct references Good literature review presented with references Brief literature review with proper referencing Poorly written literature review

len2110078

9/11/2018 3:15:21 AM

Threat Mitigation Technique Discuss in detail a threat mitigation technique for one of the security threat 10 Report layout The report layout should be appropriate (following the submission guidelines and containing all the sections mentioned above) 3 Reference Style Follow IEEE reference style 5 Presentation Slides The presentation slides should be well organised and clear. 5 Oral Presentation Delivery of the presentation (quality of the presentation, depth of knowledge on the material presented and ability to answer questions asked by the audience) 5 Total 60

len2110078

9/11/2018 3:15:16 AM

Marking criteria: Section to be included in the report Description of the section Marks Introduction Introduction of Healthcare Networks. Introduction should also discusses the report outline. 5 Literature Review Literature review of Healthcare Networks • Healthcare network architecture (consider networking devices such routers, switches, firewalls, servers etc.) • Recent developments in healthcare networks • The importance of security in healthcare networks 15 Analyse Critically Analyse critically, three potential security issues in Healthcare Networks. 12

len2110078

9/11/2018 3:15:04 AM

Submission Guidelines All work must be submitted on Moodle by the due date along with a title Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd