This report discusses the implementation of network-based technology in the healthcare sector, potential security issues, and solutions to mitigate them. It covers topics such as server, firewall, router and switches, and security in healthcare.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: OVERVIEW OF NETWORK SECURITY OVERVIEW OF NETWORK SECURITY Name of the Student Name of the University Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2OVERVIEW OF NETWORK SECURITY Table of Contents Introduction.................................................................................................................................................3 Heath care network architecture................................................................................................................3 Server......................................................................................................................................................3 Firewall....................................................................................................................................................3 Router and switches................................................................................................................................3 Development in health care network..........................................................................................................4 Security in health.........................................................................................................................................4 Potential security issue................................................................................................................................4 Solution to potential security issue.............................................................................................................5 Conclusion...................................................................................................................................................6 References...................................................................................................................................................7
3OVERVIEW OF NETWORK SECURITY Introduction The health care sector can be stated as one of the most important sectors which is relating to the life of the common people. Whenever there is linking of heath care sector with any technological aspect it should be taken into consideration that security aspects are high enough in the sector of operation. A device which can directly reduce the overall risk factor can be stated as one of the most advantageous related to any technological aspect. It can be stated here that in the heath sector if any risk factor is identified it can directly impact the overall system which is related to the concept. The report takes into consideration the sector of the health care which is connected to the field of implementation in the network based technology. In this sector there can be different types of problem or issue faced which are majorly discussed in the report. On the other hand, the report also takes into consideration the mitigation aspects which can be related to the concept. Heath care network architecture In recent times it can be stated that the sector of the health care is improving due to the invent of the different types of technology into the concept. This is due to the factor that most of the institutes which are related to the health care is implementing computer based network and the technology of hospital information technology (HIS) into the internal working. The main advantage which can be related to the concept is the remote access and the distribution of the medical record to the medical community. In the sector of the deployment of the health care into the network architecture different devices should be used which would be executing the internal functionality of the system. Server It is proposed in the most of the institution that a three-layer client server architecture solution should be implemented. The implementation of the server would be very much beneficial in the sector of the improved authorization, data security, authentication, the sector of privacy access and protection of the overall system. The authentication methods which would be implemented within the process is the secure socket layer (SSL) protocol based TCP/IP. Firewall The main aspect which is related to the implementation of the firewall is to protect the overall system and secure the patient data which would be present in the system. It can be stated as one of the most important security measure which can be implemented at the entry point of the data. The data
4OVERVIEW OF NETWORK SECURITY which would be entering the network would be checked for the purpose of the authentication and it would be restricting those data which would be harmful for the system. Router and switches The implementation of thee router and the switches are directly done in the access layer which is directly linked with the aspect of two distributed layer of switches which is related to the purpose of redundancy. The access layer which is robust would be directly be beneficial in the sector of the supporting the software and the hardware attributes [11]. The main components of the attribute are the power redundancy and the path redundancy. Development in health care network It can be stated here that in the recent few years it can be majorly seen that the implementation of the hospital information system is very much important which bring different kinds of advantage. The main sector of the advantage which can be related to the concept is in the sector of the financial, administrator and clinical documentation part [7]. The need of such a system directly arose when the need of an efficient resource management, security of the data and the high availability of the data arose. The implementation of such a system can be seen in most of the areas which is related to the health care. One of the disadvantage which can be related to the context is that it does not include a proper standard solution. The main advantage of networking the health care sector is that it gives the access of national sharing of the information in an authenticated manner, directly improves the doctor and patient relationship, time and cost saving and convenience. Security in health The security in the concept of the health care can be considered as one of the most important factorswhichshouldbetakenintoconsideration[6].Itcanbestatedherethatduetothe implementation of the domain controller the security of the data is usually maintained in the system. In order to get a complete solution relating to the security the connection which is between the server and the client must have a strict enforcement policy and rules. As stated by [1] the infrastructure network which is related to the health care usually has two gateways. The main function which is related to the gateways is to provide packet filtering technique on data which is entering or leaving the cline side to the server farm side ad very much vice versa. The connection which is created from the sector of the different sites are mainly done through an open network which is the internet. The possibility of the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
5OVERVIEW OF NETWORK SECURITY deployment of a private network backbone can also be done which would be directly raising the cost which is related to the concept. The main aspect which can be stated in context of the securing of the channel would be the use of channels which are encrypted. The concept is achieved by means of deployment of virtual private network (VPN) between the deployment of the gateway [9]. The main functionality which is related to the communication which is done thorough VPN is that it directly ensures that the data which is passed through the concept is encrypted so that no activity which is related to the intruders are enforced into the process. The use of the digital authority it can be directly be assured which VPN community can participate in the different sectors which is related to the VPN [12]. This approach can be very much beneficial in the sector of mitigation aspect which is related to the man in the middle attack. The main components which is related to the man in the middle attack mainly consist of an attempt to intercept the traffic of data which is between the different logical sites. As stated by [4] Strong process of encryption can be very much beneficial in the aspect which directly ensure that even if the data is intercepted it cannot be directly be deciphered [1]. The aspect of the encryption can be very much beneficial in the sector of the implementation of a security mechanism which would be directly securing the system. Potential security issue Some of the potential problem which is faced in the sector area as follows: Issue 1:More devices which can increase risk factor In the concept of the health care sector it can be stated that there are many devices which are connected in the concept of internet in order to communicate with each other. According to [2] It can be stated that most of the devices in this sector are very much vulnerable to the security issue. One of the major issue which can be related here is the loss of the data which can occur [9]. The security of the data can be considered as one of the most important factor which can be related to the technology. Issue 2:Embedded devices In the concept of the heath care it can be stated that there are different components such as the patient monitoring system, medication scanner and imaging devices. These devices help in the sector of the identification, tracking and monitoring of the record of the patient [11]. However, these devices directly put strain on the aspect of the bandwidth and exposes the network to the different types of
6OVERVIEW OF NETWORK SECURITY viruses in by means of new connected devices that are different from the traditional personal computers. Issue 3:Consumer friendly IT It can be stated here that the aspect of the employees and the physician need to directly access thenetworkofthefacilityinordertoconducttheirbusinessneeds[5].Inthissectorthe consumerization can be stated to one of the biggest problem which can be playing a very much important role. Due to the involvement of more users in the sector of the own device manipulation, health care would be directly seeing more security threats [6]. As a fact it can be stated that the aspect of the consumerization of the IT is directly driving the need of the network security solution that directly covers up the multiple layer devices and the components of the infrastructure. Solution to potential security issue Solution 1:more devices which can increase risk factor The main solution which can be stated here is that use of the network access control (NAC) solution. This directly offers the ability to identify each of the type of user and the connected devices and the scan for threat identification. On the other hand, the NAC solution would be directly offering a standard which is related to the network security status across all the devices which are connected. Solution 2:Embedded devices The main aspect which should be taken into consideration in the aspect is the incorporation of security solution that would directly reduce protect the integrity of the critical data which is often referred as private data [3]. On the other hand, it should also reduce the vulnerability gap which exact in the sector of the network in which the devices are connected. Solution 3:Consumer friendly IT One of the main solution which can be related to the consumer friendly IT is the adaptation of a good NAC system which can stave off each of the threats which are related to the concept [5]. The concept of the response of the security solution would be identifying any consumer service which is adopted. It should always take into consideration the aspect of generation of a scan when a new data tries to enters the network.
7OVERVIEW OF NETWORK SECURITY Conclusion The report main focus point was the heath care sector when relating to the network manipulation. Whenever a device is connected to the network device vulnerability aspects play a very vital role which has to be taken into consideration so that the overall system is kept safe and the data which is present in the system is very much safe from the intruders. The devices should be safe so that the data which is generated from the system is authenticated.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
8OVERVIEW OF NETWORK SECURITY References [1] Betancourt, Joseph R., et al. "Defining cultural competence: a practical framework for addressing racial/ethnic disparities in health and health care."Public health reports(2016). [2] Acharya, Bibhav, et al. "Partnerships in mental healthcare service delivery in low-resource settings: developing an innovative network in rural Nepal."Globalization and health13.1 (2017): 2. [3] Hutton, B., Salanti, G., Caldwell, D. M., Chaimani, A., Schmid, C. H., Cameron, C., ... & Mulrow, C. (2015). The PRISMA extension statement for reporting of systematic reviews incorporating network meta-analysesofhealthcareinterventions:checklistandexplanations.Annalsofinternal medicine,162(11), 777-784. [4] Rojas, Eric, et al. "Process mining in healthcare: A literature review."Journal of biomedical informatics61 (2016): 224-236. [5]Chen,Feng,etal."Dataminingfortheinternetofthings:literaturereviewand challenges."International Journal of Distributed Sensor Networks11.8 (2015): 431047. [6] Brett, Jo, et al. "Mapping the impact of patient and public involvement on health and social care research: a systematic review."Health Expectations17.5 (2014): 637-650. [7] Martínez-Pérez, Borja, Isabel De La Torre-Díez, and Miguel López-Coronado. "Privacy and security in mobile health apps: a review and recommendations."Journal of medical systems39.1 (2015): 181. [8] Grajales III, Francisco Jose, et al. "Social media: a review and tutorial of applications in medicine and health care."Journal of medical Internet research16.2 (2014). [9] Nilsen, Per. "Making sense of implementation theories, models and frameworks."Implementation Science10.1 (2015): 53. [10]Popp,Janice,etal."Inter-organizationalnetworks:areviewoftheliteraturetoinform practice."IBM Center for the Business of Government(2014). [11] Bekelman, Justin E., et al. "Comparison of site of death, health care utilization, and hospital expenditures for patients dying with cancer in 7 developed countries."Jama315.3 (2016): 272-283.
9OVERVIEW OF NETWORK SECURITY [12] Couët, Nicolas, et al. "Assessments of the extent to which health‐care providers involve patients in decision making: a systematic review of studies using the OPTION instrument."Health Expectations18.4 (2015): 542-561.