logo

Implementation of Secure Encryption Technologies

   

Added on  2023-01-13

11 Pages2460 Words38 Views
Running head: IMPLEMENTATION OF SECURE ENCRYPTION TECHNOLOGIES
Implementation of Secure Encryption Technologies
Name of the Student
Name of the University
Author Note:

1IMPLEMENTATION OF SECURE ENCRYPTION TECHNOLOGIES
Table of Contents
Introduction......................................................................................................................................2
Discussion........................................................................................................................................2
Analysis of requirement of Royal Children Hospital (RCH) Data Security...............................2
New Security Plan for RCH........................................................................................................3
Five Encryption Technologies for RCH and choice of Two best one.........................................4
Cost associated with two Encryption Technologies and implementation in RCH......................5
Method to application of the chosen Encryption Technologies in RCH.....................................7
Consequence of Chosen encryption technologies.......................................................................7
New Encryption Technologies and its effect on daily duties in hospitals...................................8
Conclusion.......................................................................................................................................8
Bibliography....................................................................................................................................9

2IMPLEMENTATION OF SECURE ENCRYPTION TECHNOLOGIES
Introduction
In the year 1870, the Royal Children Hospital (RCH) was established at Parkville in
Melbourne. In between the year 2010-2011, RCH has provided treatment to around 33,560 in
patients1. Around 210,956 outpatient clinic appointments and 10,741 have gone for surgery. In
the emergency department, RCH comes up with 70,036 children with approximate around 200
children. Being a healthcare provider, children hospital aims to understand the trust which is not
based on dedication2. It aims to produce best kind of medical attention for children care and
dedication for ensuring the records of the patient. Apart from this, RCH has another kind of
sensitive data of medical information which is protected in most of the cases.
In the coming pages of the report, an idea has been provided with respect to requirements
of data security at RCH. The current problem in RCH along with security plan for tackling it.
After that, an idea has been provided with respect to various encryption technologies.
Discussion
Analysis of requirement of Royal Children Hospital (RCH) Data Security
Royal children Hospital (RCH) focuses on dedication to ensuring the patient records
along with sensitive information is incomplete protection3. With increase in the number of
medical staff that travels beyond the extent of main campus along with emergency location.
RCH aims to be very much certain that it can protect all the required data that is stored in their
laptops.
1 Kaplan, David, Jeremy Powell, and Tom Woller. "AMD memory encryption." White paper (2016).
2 Liang, Kaitai, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu, and Anjia
Yang. "A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing." Future
Generation Computer Systems 52 (2015): 95-108.
3 Batalla, Jordi Mongay, Athanasios Vasilakos, and Mariusz Gajewski. "Secure smart homes: Opportunities and
challenges." ACM Computing Surveys (CSUR) 50, no. 5 (2017): 75.

3IMPLEMENTATION OF SECURE ENCRYPTION TECHNOLOGIES
Doctors and Nurses at RCH aim to travel in Melbourne City on regular interval. The
hospital needs to assured about the data of patient that is collected on laptops is completely
secured. On regular basis, RCH doctors and nurses need to travel to Melbourne City on everyday
interval4. RCH needs to assured about the fact that the stored patient data is completely secured
with them. Laptops of Doctors and patient need to carry sensitive information and so they ensure
that lost or stolen data does not provide any kind of unauthorized access to important data.
New Security Plan for RCH
All the current issue in RCH can be easily tackled with the help of proper security plan in
RCH (Royal Children Hospital). The security plans in RCH compromises of four steps that are
Run Risk Assessment: Prior to development of effective security plan, an initial
assessment of risk is done. It is needed for analyzing the assets, system and associated devices of
doctor and nurse that require protection.
Building a Security Culture: At present, security plan and checklist are not enough for
developing a strong posture of security5. Protecting the vital data of the patient should be very
first aspect of healthcare organization.
Reviewing of IT Policies and Procedure: Analysing the security trends and overall
threats can be considered to be very much difficult. Policies should be there for proper protection
of data along with proper control measures of patient information.
Educating employees about security best practices: System hackers mainly look up for
weakest link in the overall security plan and their employees. Hackers can prey on hospital by
sending phishing emails.
4
Pancholi, Vishal R., and Bhadresh P. Patel. "Enhancement of cloud computing security with secure data storage
using AES." International Journal for Innovative Research in Science and Technology 2, no. 9 (2016): 18-21.
5 Rachmawanto, Eko Hari, and Christy Atika Sari. "Secure Image Steganography Algorithm Based on DCT with
OTP Encryption." Journal of Applied Intelligent System 2, no. 1 (2017): 1-11.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Secure Encryption Technologies Assignment
|13
|2437
|101

Project Management Plan
|16
|1976
|1

Permission Letter from the Manager Assignment
|8
|1219
|41

Information Security: The Royal Children's Hospital
|11
|3171
|107

Planning and Formulation of Security Policy for Royal Melbourne Hospital
|12
|3310
|420

Cleveland Hospital Network Proposal.
|10
|484
|296