This article discusses the use of GSM/GPRS and wireless sensor networks for data transmission in hospitals, as well as the risks associated with public key cryptography and the benefits of transport layer security applications.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: INFORMATION SECURITY TECHNOLOGIES INFORMATION SECURITY TECHNOLOGIES Name of the Student Name of the Organization Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1INFORMATION SECURITY TECHNOLOGIES In the case of hospital, some data transmission methods which can be suggested are GSM/GPRS for emergency transmission of data and data transmission via all the sensor networks.SystemswhichwillbeutilisingthetechnologyofGSM/GPRSformedical transmission of data will be mainly using a particular device which will be allowing the transmission of several important biosignals as well as still images of patients or rather scans from any emergency site to that of the site of consultation by utilising GSM (Voirin et al., 2015). Some of the risks which are seen to be associated with this technology will be involving some threats to both privacy as well as confidentiality and also in the acceptance of the technology in general. On the other hand, WSN or wireless sensor network is mainly defined as a class of systems which has been emerging and this has been made possible by all the less expensive hardware, advanced tools of programming as well as several algorithms which are very much complex. It has the capability of detecting any kinds of threats and performing sensing as well as actuation in a traditional way. All the WSN devices are seen to be excessively limited in terms of communication, power and computation and they are often seen to be deployed in a number of accessible areas (Stafford, 2013). This will be further increasing several vulnerabilities related to security. For this particular firm, GPRS can be recommended for the purpose of the transmission of data. Some of the risks which are seen to be associated with the public key cryptography are mostly the problems related to certification and the totally false sense of security. It has noticed quite often that there are a number of public key systems which mostly utilise a third party for mainly certifying the public key’s reliability (Bennett & Brassard, 2014). If the authority of certification gets compromised at any cost then the criminal who did it can even issue several false certificates and fool around a number of people into directly sending data to wrong places.
2INFORMATION SECURITY TECHNOLOGIES False sense of security mostly says that no matter how much safe us the cryptographic system is, it will be only protecting for which it has been specially designed to protect and not more than that (Zhang et al., 2015). However, it has a number of advantages like the capability of signing a number of messages by the application of the private key to a file. Some of the benefits of transport layer security applications will be involving the utilisation of much more secure key hashing for the particular code of message authentication for ensuring that a record cannot be changed while transmitting over Internet or some other open networks. TLS applications also defines PRF which utilises two algorithms of hash and these two algorithms increases the security by protecting data from being altered if any of them is compromised. One of the biggest which are seen to be associated with the applications of TLS is the insertion of malicious data by several attackers which will be very much beneficial for all the attackers. No, the recommended method does not fall under any of the categories as the particular method which has been suggested is mainly a technique of data transmissionwhich possess with the capability of sending several images directly to the consulting site.
3INFORMATION SECURITY TECHNOLOGIES References Bennett, C. H., & Brassard, G. (2014). Quantum cryptography: public key distribution and coin tossing.Theor. Comput. Sci.,560(12), 7-11. Stafford, G. A. (2013).U.S. Patent No. 8,571,624. Washington, DC: U.S. Patent and Trademark Office. Voirin, N., Payet, C., Barrat, A., Cattuto, C., Khanafer, N., Régis, C., ... & Vanhems, P. (2015). Combining high-resolution contact data with virological data to investigate influenza transmission in a tertiary care hospital.infection control & hospital epidemiology,36(3), 254-260. Zhang, X., Long, J., Wang, Z., & Cheng, H. (2015). Lossless and reversible data hiding in encrypted images with public-key cryptography.IEEE Transactions on Circuits and Systems for Video Technology,26(9), 1622-1631.