Security of healthcare networks

Assignment Help Computer Networking
Reference no: EM132120423

Security Challenges in Emerging Networks

Assignment Description

The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging network-based applications, and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue.

The use of network technologies is rapidly growing in healthcare sector. Now, healthcare is considered as one of the emerging application of network-based applications. Different network scenarios using wireless, wired, and mobile communications can provide efficient solutions to access electronic medical records (EMRs), medical management systems, imaging, biomedical information, material management, patient accounting, admitting information, and online claims submissions. Today, healthcare systems can combine these tools into one network-based infrastructure to more effectively communicate and collaborate, reduce errors, and improve patient care and efficiency. As healthcare providers adopt new technologies, they also face new security threats. Hackers, malicious software (malware), disgruntled employees, and human error present real dangers to healthcare networks [1]. Security of healthcare networks is a prime concern in today's World.

This assignment includes four parts

1. Literature review on Healthcare Networks.

The literature review should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art.

Your discussion should include:
i. Healthcare network architecture (consider networking devices such as routers, switches, firewalls, servers etc.)
ii. Recent developments in healthcare networks
iii. The importance of security in healthcare networks

2. Analyse critically, three current or possible future potential security issues in Healthcare Networks.

In this section you will analyse critically, three security issues in Healthcare Networks. These issues should be taken from the current state of the art literature. This section must be supported by at least three (3) references.

3. Propose a possible solution for one of the threats identified in section-2.

In this part you need to choose one of the issues identified in the previous section and propose a possible solution to the particular security issue.

4. Create a 3 - 5 minutes presentation and present your work during the Lab.

You have to create a 3 - 5 minutes presentation to present your work in front of your class fellows and tutor during the Lab in Week 11.

Note: Need powerpoint ppt of this assignment

Verified Expert

The work is in ms word and ppt where he focus is on handling the network security and the measures are taken in the healthcare. It helps in analysis of properly working with the system.It also helps in working with the system specifications in health care and improving the demands which are important and highlights about the different factors.

Reference no: EM132120423

Questions Cloud

Explain how ocbc approach to talent management : Explain how OCBC's approach to talent management and employee development been a primary contributing factor to the firm's success.
How mark portrays jesus of nazareth : Mark's writing style so that you will begin to recognize a few differences/similarities between Mark and the other gospels.
What is a good analogy of subnetting : What is a good analogy of Subnetting? What's a break down of how it is used within a company?
Positions from before the decimal point : Extract all digits at even positions from before the decimal point. Print them in reverse order.
Security of healthcare networks : Security of healthcare The literature review should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of art
What are some advantages of artificial intelligence : What are some advantages of artificial intelligence?In your responses to others, discuss some of the disadvantages of AI.
Describe the data encoding that is required for task : COSC2110/COSC2111 Data Mining Assignment, RMIT University, Australia. Describe the data encoding that is required for this task
How does diversity affect social justice : How does diversity affect Social justice? What adjustments need to be made to facilitate participation by people with a disability in a workplace?
Prepare a presentation highlighting the accomplishments : Prepare a presentation highlighting the accomplishments and challenges faced by Whittle, who is known today as the "Father of the Modern Jet Engine."

Reviews

urv2120423

11/2/2018 4:34:28 AM

Hi kindly read the full assignment they have asked for the report and PPT. If I need one more solution for this assignment, how much time will you take to submit it back? dear I need one more different solution for this assignment. It was excellent work and I have received an A for the assessment. Thank you heaps a lot. Price was fair for that kind of assignment. Thanks once again.

urv2120423

11/2/2018 4:32:01 AM

Marking criteria:Section to be included in the report Description of the section: Introduction Introduction of Healthcare Networks. Introduction should also discusses the report outline.Literature Review Literature review of Healthcare Networks ? Healthcare network architecture (consider networking devices such routers, switches, firewalls, servers etc.) ? Recent developments in healthcare networks ? The importance of security in healthcare networksAnalyse Critically Analyse critically, three potential security issues in Healthcare Networks.Threat Mitigation Technique Discuss in detail a threat mitigation technique for one of the security threatReport layout The report layout should be appropriate Reference Style Follow IEEE reference style. Presentation Slides The presentation slides should be well organised and clear.

urv2120423

11/2/2018 4:30:23 AM

Purpose of the assessment (with ULO Mapping) The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following ULOs: c. Explain the major methodologies for secure networks and what threats they address; d. Identify and report network threats, select and implement appropriate countermeasures for network security. Submission Guidelines ? All work must be submitted on Moodle by the due date along with a title Page. ? The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. ? Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Networking Questions & Answers

  Riverina auto parks assembles components that are needed

riverina auto parks assembles components that are needed for a new model produced by an international car manufacturer.

  Set up a network consisting of pc

You are required to set up a network consisting of PCs, routers and servers. You need to configure routing between routers - Perform the activities and support

  Demonstrate how the icmp redirect attack works

Demonstrate how the ICMP redirect attack works, and describe the observed consequence. To check the routing information in Linux, you can use the command route

  How to install dns and configure it including dns tree

How to install DNS and configure it including DNS tree. Explain ongoing monitoring and management of server installation. Recommendations for utilizing Hyper-V.

  Describe link-state and distance-vector routing compare and

as a lead network administrator you need to review a few things with your team before implementing the next phase of

  Your neighbor is starting a small billing business and has

your neighbor is starting a small billing business and has asked you to design the network. currently you neighbor has

  Among the following devices

Among the following devices, which one can you not use full duplex connection? Switch, router , hub

  Determine average streaming media data rate

Assume we can accurately forecast set of WAPs that the taxi will visit. Determine average streaming media data rate that we can sustain by downloading prefetched data from WAPs?

  Prepare a cost analysis and develop a proposal for company

Create a cost analysis, and develop a proposal for the company. DesignIT has requested the consideration of all interconnected devices and wiring, along with speeds, for best performance.

  What routing protocols and protocol features will you use

How can you accomplish your objectives? What routing protocols and protocol features will you use to do so? Provide detailed examples.

  Prerequisite information for modules

STAGE 2 - XML/XQueryConstruct XML representations for the following. Express your design using a diagram and/or a schema.1. Composition of courses, i.e. a list of the modules that make up a course. You may assume that the composition of a course does..

  How do we calculate network cost when using ospf

1. What happens when two routers have the same router ID in an OSPF domain 2. How do we calculate network cost when using OSPF?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd