Healthcare Networks: Security Issues and Threats Mitigation Techniques
Verified
Added on 2023/06/04
|8
|570
|309
AI Summary
This presentation focuses on the security issues and threats mitigation techniques in healthcare networks. It discusses the network architecture, threats faced by healthcare networks, and mitigation techniques.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Healthcare Networks Name of the student: Name of the university: Author note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Introduction to healthcare networksHealthcareorganisationshas adoptedthisnewapplicationto securethepersonaldataofthe patients. This presentation will focus on the securityissuesthatthe Healthcare industry face. Healthcarenetworksincreases efficiencyofcommunicationand collaborationbetweenthe patients and the healthcare units.
Healthcare Network Architecture Thenetworkarchitecture consistsofthreeimportant parts- TheRadioFrequency Identification(RFID)wireless sensornetworkalsocalled Hybrid Sensing Network (HSN) Interfaceoftheusersfor visualizingandmanagement data and IoT smart gateway.
Threats to Healthcare Networks Hackers attack the system to steal the information of the patients and therefore, patients will be at great risks. The main device in the network that are subjected to compromise in security are the WBAN nodes. The common security threats faced by healthcare networks are packet sniffers, denial of service (DoS), defacing, spam, man-in-the- middle attack and attacks by viruses, Trojan horses and worms.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Threats Mitigation Techniques Encryption of data Virtual Private Networks Using Antiviruses Network Monitoring systems
Conclusion Healthcare networks should ensure strong security to keep the patient information confidential. Data encryption should be done to keep the information secured. Healthcare organisationin increasingly depending on core networks for its operations. Therefore, network security should be given highest priority.
References [1] Catarinucci, Luca, Danilo De Donno, Luca Mainetti, Luca Palano, Luigi Patrono, Maria Laura Stefanizzi,andLucianoTarricone."AnIoT-awarearchitectureforsmarthealthcare systems."IEEE Internet of Things Journal2, no. 6 (2015): 515-526. [2]"Telemedicine,Telehealth,DistanceLearningmedicalsolutionstoequalizehealthcare access,toeliminatesuffering,improvethequalityoflife,andtobrightenlives",First- worldwide-internet.com,2018.[Online].Available: http://www.first-worldwide-internet.com/telemedical-telehealth-hipaa-dicom-hL7-pacs- network.html. [Accessed: 24- Sep- 2018]. [3] Chen, Min, Jiafu Wan, Sergio González-Valenzuela, Xiaofei Liao, and Victor CM Leung. "A Survey of Recent Developments in Home M2M Networks."IEEE Communications Surveys and Tutorials16, no. 1 (2014): 98-114. [4]Zafar, Humayun, Myung S. Ko, and Jan G. Clark. "Security Risk Management in Health Care: A Case Study."CAIS34 (2014): 37. [5] Rushanan, Michael, Aviel D. Rubin, Denis Foo Kune, and Colleen M. Swanson. "Sok: Security and privacy in implantable medical devices and body area networks." In2014 IEEE Symposium on Security and Privacy (SP), pp. 524-539. IEEE, 2014. [6]Abomhara,Mohamed,andGeirM.Køien."Cybersecurityandtheinternetofthings: vulnerabilities, threats, intruders and attacks."Journal of Cyber Security4, no. 1 (2015): 65-88.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.