logo

Information Security Technologies

This page contains the Learning Resources for this unit.

4 Pages805 Words44 Views
   

Added on  2023-03-20

About This Document

This article discusses the use of GSM/GPRS and wireless sensor networks for data transmission in hospitals, as well as the risks associated with public key cryptography and the benefits of transport layer security applications.

Information Security Technologies

This page contains the Learning Resources for this unit.

   Added on 2023-03-20

ShareRelated Documents
Running head: INFORMATION SECURITY TECHNOLOGIES
INFORMATION SECURITY TECHNOLOGIES
Name of the Student
Name of the Organization
Author Note
Information Security Technologies_1
1INFORMATION SECURITY TECHNOLOGIES
In the case of hospital, some data transmission methods which can be suggested are
GSM/GPRS for emergency transmission of data and data transmission via all the sensor
networks. Systems which will be utilising the technology of GSM/GPRS for medical
transmission of data will be mainly using a particular device which will be allowing the
transmission of several important biosignals as well as still images of patients or rather scans
from any emergency site to that of the site of consultation by utilising GSM (Voirin et al., 2015).
Some of the risks which are seen to be associated with this technology will be involving some
threats to both privacy as well as confidentiality and also in the acceptance of the technology in
general. On the other hand, WSN or wireless sensor network is mainly defined as a class of
systems which has been emerging and this has been made possible by all the less expensive
hardware, advanced tools of programming as well as several algorithms which are very much
complex. It has the capability of detecting any kinds of threats and performing sensing as well as
actuation in a traditional way. All the WSN devices are seen to be excessively limited in terms of
communication, power and computation and they are often seen to be deployed in a number of
accessible areas (Stafford, 2013). This will be further increasing several vulnerabilities related to
security. For this particular firm, GPRS can be recommended for the purpose of the transmission
of data.
Some of the risks which are seen to be associated with the public key cryptography are
mostly the problems related to certification and the totally false sense of security. It has noticed
quite often that there are a number of public key systems which mostly utilise a third party for
mainly certifying the public key’s reliability (Bennett & Brassard, 2014). If the authority of
certification gets compromised at any cost then the criminal who did it can even issue several
false certificates and fool around a number of people into directly sending data to wrong places.
Information Security Technologies_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Digital Forensics in Mobile Devices
|25
|4299
|83

Internet of Things: A Review of Literature and Security Issues
|8
|810
|321

Method for Countering Snooping-Based Side Channel Attacks in Smart Home Applications
|8
|3781
|311

Critical Analysis of Blockchain Architecture
|18
|5267
|383

Internet of Things (IoT) Assignment Paper
|4
|764
|342

Engineering and Computing Master of Science
|6
|4182
|211