Literature review on healthcare networks

Assignment Help Computer Networking
Reference no: EM132120417

Security Challenges in Emerging Networks

Assignment Description

The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging network-based applications, and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

The use of network technologies is rapidly growing in healthcare sector. Now, healthcare is considered as one of the emerging application of network-based applications. Different network scenarios using wireless, wired, and mobile communications can provide efficient solutions to access electronic medical records (EMRs), medical management systems, imaging, biomedical information, material management, patient accounting, admitting information, and online claims submissions. Today, healthcare systems can combine these tools into one network-based infrastructure to more effectively communicate and collaborate, reduce errors, and improve patient care and efficiency. As healthcare providers adopt new technologies, they also face new security threats. Hackers, malicious software (malware), disgruntled employees, and human error present real dangers to healthcare networks [1]. Security of healthcare networks is a prime concern in today's World.

This assignment includes four parts

1. Literature review on Healthcare Networks.

The literature review should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

Your discussion should include:
i. Healthcare network architecture (consider networking devices such as routers, switches, firewalls, servers etc.)
ii. Recent developments in healthcare networks
iii. The importance of security in healthcare networks

2. Analyse critically, three current or possible future potential security issues in Healthcare Networks.

In this section you will analyse critically, three security issues in Healthcare Networks. These issues should be taken from the current state of the art literature. This section must be supported by at least three (3) references.

3. Propose a possible solution for one of the threats identified in section-2.

In this part you need to choose one of the issues identified in the previous section and propose a possible solution to the particular security issue.

4. Create a 3 - 5 minutes presentation and present your work during the Lab.

You have to create a 3 - 5 minutes presentation to present your work in front of your class fellows and tutor during the Lab in Week 11.

Note: Need powerpoint ppt of this assignment

Verified Expert

In this assignment we have discussed literature review in healthcare network and its emerging trends for security. Further to this we have discussed threats in health care network and its solution.

Reference no: EM132120417

Questions Cloud

Describe the data encoding that is required for task : COSC2110/COSC2111 Data Mining Assignment, RMIT University, Australia. Describe the data encoding that is required for this task
How does diversity affect social justice : How does diversity affect Social justice? What adjustments need to be made to facilitate participation by people with a disability in a workplace?
Prepare a presentation highlighting the accomplishments : Prepare a presentation highlighting the accomplishments and challenges faced by Whittle, who is known today as the "Father of the Modern Jet Engine."
A summary report on the impact of the 1925 air mail act : Review the website Airmail Service from the Smithsonian National Postal Museum that is dedicated to the history of the U.S. Air Mail Service.
Literature review on healthcare networks : Network technologies is rapidly growing in healthcare sector. Now, healthcare is considered as one of the emerging application of network-based applications
What changes are needed for unions to maintain support : What changes are needed for unions to maintain support from their membership, the community, and the employers? Labor unions are experiencing a decline.
What are the benefits of retaining qualified employees : What are the benefits of retaining qualified employees? How is labor relations used to establish an effective and efficient relationships between employees.
Develop critical analysis rather than descriptions : Develop critical analysis rather than descriptions. I want you to support your statements with text book references and outside sources when applicable.
What are the organizational implications of the issues : Using your knowledge of the stages of life and career development, explain how the career issues of a 27-year-old differ from those of a 45-year-old.

Reviews

urv2120417

11/2/2018 8:59:33 PM

I need intext references and references should be in IEEE style. The first part that is literature review needs to be changed. Literature review on Healthcare Networks. The literature review was supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art. Your discussion also included: i. Healthcare network architecture (consider networking devices such as routers, switches, firewalls, servers etc.) ii. Recent developments in healthcare networks iii. The importance of security in healthcare networks. Very happy with this assignment It has met my requirements. I would highly recommend this service. Five out of five. The quality, timeliness and price of ExpertsMind can not be matched.

urv2120417

11/2/2018 8:57:25 PM

Well-designed layout and proper formatting following the submission guidelines and containing all the sections Well-designed layout following the submission guidelines and containing all the sections Good layout following the submission guidelines and containing all the sections Report layout following the submission guidelines and missing some sections Report lacks a proper layoutClear styles with excellent source of references Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors Well organised and resourceful Organised and resourceful Resourceful but could be better organised Resourceful slides Neither resourceful nor well organised Good delivery, easy to follow and good interaction Delivered, easy to follow and provided a level of interaction Delivered and provided a level of interaction Delivered No oral presentation

urv2120417

11/2/2018 8:56:10 PM

Excellent literature review with proper referencing Well written literature review presented with correct references Good literature review presented with references Brief literature review with proper referencing Poorly written literature review Exceptional discussion on security issues in healthcare networks. Identifying highly sophisticated and well referenced vulnerabilities Exceptional discussion on security issues in healthcare networks. Good Discussion on three security issues Discussion on Two security issues Unable to identify security issues A very clear and in-depth discussion about threat mitigation technique Very clear discussion about threat mitigation technique Generally good discussion threat mitigation technique Brief discussion about threat mitigation technique Poor discussion about threat mitigation technique with irrelevant information

urv2120417

11/2/2018 8:50:17 PM

Analyse critically, three potential security issues in Healthcare Networks.Discuss in detail a threat mitigation technique for one of the security threatThe report layout should be appropriate (following the submission guidelines and containing all the sections mentioned above)Follow IEEE reference styleThe presentation slides should be well organised and clear.Delivery of the presentation (quality of the presentation, depth of knowledge on the material presented and ability to answer questions asked by the audience)Introduction is very well written and the report outline is also discussed Introduction is well written and the report outline is also discussed Introduction is generally presented along with the report outline Introduction is presented briefly and is missing the report outline Poor Introduction with irrelevant details

urv2120417

11/2/2018 8:49:13 PM

Submission Guidelines Page. ? The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. ? Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. 1. The report should be submitted as a Word file 2. The presentation should be submitted as a PPT file Marking criteria: Introduction of Healthcare Networks. Introduction should also discusses the report outline. Literature review of Healthcare Networks ? Healthcare network architecture (consider networking devices such routers, switches, firewalls, servers etc.) ? Recent developments in healthcare networks ? The importance of security in healthcare networks

Write a Review

Computer Networking Questions & Answers

  Define the tsp problem

The traveling salesman problem (TSP) is a popular problem in combinatorial optimization with applications in various domains, from fast-food delivery.

  What is value in the identification field and the ttl field

What is the value in the Identification field and the TTL field - How many fragments were created from the original datagram?

  Why is it important to select student interface in wireshark

How does Wireshark differ from NetWitness Investigator? Why is it important to select the student interface in the Wireshark? What is the command line syntax for running an Intense Scan with Zenmap on a target subnet of 172.30.0.0/24?

  Explaining factors of various ups systems

What factors of the various UPS systems must concern you? What would you suggest as the lowest cost solution for this situation?

  Explain nefarious computer activities

Write a short description of what they are and include your assessment of whether this activity is something to worry about or not.

  Internet technologies

The convergence of communications and computing technologies has increased the tools available to create completely new media possibilities and experiences. This module aims to explore the Internet technology and examine its applications, including t..

  Study carefully the following network topology it is

study carefully the following network topology. it is required that the small business smart office services pty ltd

  Research three recent information security breaches

Research three recent information security breaches. Do main targets seem to be larger or smaller companies? Is there a particular industry which seems predominately targeted?

  What is the value of the sequence number

What is the value of the sequence number in each of the following segments sent by the client? The SYN segment? The data segment? The FIN segment?

  Complete understanding wan technology modules in pluralsight

Complete the following modules in the Pluralsight course, "Network Architecture for CompTIA Network+ (N10-006)": Understanding WAN Technologies and Installing and Terminating Network Cables and Connectors.

  CNET network simulator - developing a simple protocol

CMPUT 313 - The CNET Simulation Environment - Explain the recorded value of delta given the default settings of the various parame- ters in the topology file

  Why do some businesses have separate data warehouse and

why do some businesses have separate databases and a data warehouse? why wouldnt most businesses have just one large

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd