Security challenges in emerging networks

Assignment Help Computer Networking
Reference no: EM132206737

Overview of Network Security Assessment - Security Challenges in Emerging Networks

Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following ULOs:

  • Explain the major methodologies for secure networks and what threats they address;
  • Identify and report network threats, select and implement appropriate countermeasures for network security.

Assignment Description

The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging network-based applications, and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

The use of network technologies is rapidly growing in healthcare sector. Now, healthcare is considered as one of the emerging application of network-based applications. Different network scenarios using wireless, wired, and mobile communications can provide efficient solutions to access electronic medical records (EMRs), medical management systems, imaging, biomedical information, material management, patient accounting, admitting information, and online claims submissions. Today, healthcare systems can combine these tools into one network-based infrastructure to more effectively communicate and collaborate, reduce errors, and improve patient care and efficiency. As healthcare providers adopt new technologies, they also face new security threats. Hackers, malicious software (malware), disgruntled employees, and human error present real dangers to healthcare networks [1]. Security of healthcare networks is a prime concern in today's World.

This assignment includes four parts

1. Literature review on Healthcare Networks.

The literature review should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

Your discussion should include:

i. Healthcare network architecture (consider networking devices such as routers, switches, firewalls, servers etc.)

ii. Recent developments in healthcare networks

iii. The importance of security in healthcare networks

2. Analyse critically, three current or possible future potential security issues in Healthcare Networks.

In this section you will analyse critically, three security issues in Healthcare Networks. These issues should be taken from the current state of the art literature. This section must be supported by at least three (3) references.

3. Propose a possible solution for one of the threats identified in section-2. In this part you need to choose one of the issues identified in the previous section and propose a possible solution to the particular security issue.

4. Create a 3 - 5 minutes presentation and present your work during the Lab.

You have to create a 3 - 5 minutes presentation to present your work in front of your class fellows and tutor during the Lab in Week 11.

Reference no: EM132206737

Questions Cloud

Most likely to be effective for implementing major change : Which is most likely to be effective for implementing major change? Which statement about transformational and charismatic leadership is most accurate?
Reputation for manufacturing high-quality automobiles : For decades, Toyota has earned a reputation for manufacturing high-quality automobiles.
Explain a disease of the reproductive system : Explain a disease of the reproductive system that has a genetic basis - risk factors, prevention, maintenance of health, treatment
Elevating society ability to address complex problems : Most important, what might be the role of liberal education in elevating society’s ability to address complex problems?
Security challenges in emerging networks : Explain the major methodologies for secure networks and what threats they address - Identify and report network threats, select and implement appropriate
Exemplifies ideal organizational structure : ind one you thing exemplifies an ideal organizational structure.
Collaborative approaches to cost management allow the buyer : Collaborative approaches to cost management allow the buyer and seller to use their resources to achieve cost goals.
Value chain actually enhance the traditional supply chain : How does the value chain actually enhance the traditional supply chain?
What would happen to the capital-labor ratio in production : Suppose that the price or rental rate of capital rises. Explain how producers would respond, using the isocost/isoquant framework.

Reviews

len2206737

1/3/2019 2:01:17 AM

Marking Criteria: Your assignment will be assessed on the extent and quality to which it meets each of the following criteria: No Attributes (%) 1 Introduction 2 2 Body 31 i) Identification of root cause(s) of the problems o Choice and correct application of tools and techniques (12 marks) o Assumptions made (3 mark) ? 2 assumptions will attract 1 mark ? 4 or more assumptions will attract 2 mark ? More than 4 assumption will attract 3 marks 15

len2206737

1/3/2019 2:00:53 AM

Analyse Critically Analyse critically, three potential security issues in Healthcare Networks. 12 Threat Mitigation Technique Discuss in detail a threat mitigation technique for one of the security threat 10 Report layout The report layout should be appropriate (following the submission guidelines and containing all the sections mentioned above) 3 Reference Style Follow IEEE reference style 5 Presentation Slides The presentation slides should be well organised and clear. 5 Oral Presentation Delivery of the presentation (quality of the presentation, depth of knowledge on the material presented and ability to answer questions asked by the audience) 5 Total 60

len2206737

1/3/2019 2:00:44 AM

Marking criteria: Section to be included in the report Description of the section Marks Introduction Introduction of Healthcare Networks. Introduction should also discusses the report outline. 5 Literature Review Literature review of Healthcare Networks ? Healthcare network architecture (consider networking devices such routers, switches, firewalls, servers etc.) ? Recent developments in healthcare networks ? The importance of security in healthcare networks 15

Write a Review

Computer Networking Questions & Answers

  Process by which ip addresses are assigned to computers

How would you control the process by which IP addresses are assigned to individual computers? You will have to make some assumptions to answer both questions, so be sure to state your assumptions."

  Survey network

Question 1: How many people are in your network? Question 2: Do you have strategic connections across industries? Question 3: Do you know people at different stages in their careers?

  The irreducible polynomial is the one used

Compute in  GF (28): ( x 4+ x +1) / ( x 7+ x 6+ x 3+ x 2) , where the irreducible polynomial is the one used by AES, P ( x )= x 8+ x 4+ x 3+ x +1.

  Determine the security risks with respect to phishing

Mobile banking features have added several advantages for customers however; there are security risks that come with them. Determine the security risks with respect to phishing, smishing, vishing, cloning, and a lost or stolen smartphone that have..

  Calculate the end-to-end transit time for a packet

Calculate the end-to-end transit time for a packet for both GEO (altitude: 35,800 km), MEO (altitude: 18,000 km) and LEO (altitude: 750 km) satellites

  Theories of human factors as related to network design

What kinds of questions would you ask to better understand their environment and each group of users - assessment plan of the applications for performance

  What kind of company would implement a peer-to-peer network

How are client/server networks different from peer-to-peer networks? Why would a company want to implement a client/server network? What kind of company would implement a peer-to-peer network

  What is the router command used to configure a static route

What is the difference between a router's running-configuration and startup configuration?

  Design a detailed network in netsim

MN503 - Overview of Internetworking - Network design with configuration - Discuss a roadmap process to use internetworking architecture to support long- term

  Ipsec gives security at network layer

If IPSec gives security at network layer, why is it that security mechanisms are still require at layers above IP?

  Network management in organisations

MN501 - Discuss ethical and social issues pertaining to IT systems administration and Discuss ethical behaviour in accordance with professional codes

  Comparison of pptp, l2tp and sstp

Provide a brief comparison of PPTP, L2TP and SSTP, outlining the advantages and disadvantages of each. Which organizations might choose to implement a VPN service hosted on a Windows Server 2012 system?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd