logo

Group Research Report MANAGEMENT OF INFORMATION SECURITY Student Name Student Number E-mail Address Student Name Student Number E-mail Address

   

Added on  2020-03-16

16 Pages4641 Words349 Views
 | 
 | 
 | 
Group Research ReportMANAGEMENT OF INFORMATION SECURITYStudent NameStudent NumberE-mail AddressStudent NameStudent NumberE-mail AddressABSTRACTInformation Security and Network Database privacy is a major issue in today’s world. Theincrease in regulation, adoption of digital patient records, provided consolidation and thus theincrease in the requirement for data and information in between patients, providers andpayers. At every point the main target ifs toward the betterment of information security andmanagement of the system network. There has been many critical survey of researchliterature on healthcare privacy, information system and its security. This survey has beenpublished for both non-informationsecurities, information security disciplines that mayinclude health datasets, public and private data database, laws, medicine information andmany more. Though this incremental adoption of these electronic and digital media inhealthcare also creates many security risks and violation of privacy in the organization. Keywords:Information Security, Healthcare, Privacy Risk, Database, Research Literature.
Group Research Report MANAGEMENT OF INFORMATION SECURITY Student Name Student Number E-mail Address Student Name Student Number E-mail Address_1
Table of ContentsABSTRACT...............................................................................................................................1INTRODUCTION......................................................................................................................41. Data Storage Infrastructure....................................................................................................52. Network Infrastructure...........................................................................................................63. Privacy and Security Protection Mechanisms........................................................................73.1. Health Information Privacy Regulations.........................................................................83.2. Threats to Information Privacy........................................................................................84. Policies that Ensure Operations Security...............................................................................94.1. Providing a Safe Workplace............................................................................................95. Potential Risks......................................................................................................................106. Disaster Recovery................................................................................................................11CONCLUSION........................................................................................................................12REFERENCES.........................................................................................................................13
Group Research Report MANAGEMENT OF INFORMATION SECURITY Student Name Student Number E-mail Address Student Name Student Number E-mail Address_2
INTRODUCTIONA Cloud storage infrastructure is basically the combination of hardware and softwareframework that supports requirement of the public and private storage in cloud services.Afew associations may need the control that private cloud frameworks offer, however wouldprefer not to management of lodging, running and keeping up an in-house distributed storagefoundation. There is a chance that they can contract with a distributed storage specialist tohelp cloud operations. In this provisioning model, that refers to the Infrastructure-as-a-Service (IaaS), the specialist organization possesses the equipment like the storage, serversand systems administration segments. The customer ordinarily is charged on a for eachutilization premise. A disaster recovery plan (DRP) thus depicted as a structured approachalong with instructions in order as a responding to any unplanned incident. This well-organized process helps in maintaining the prevention of thedisaster,such that the associationcan keep track on the operation or the rapidly continue to target the goals. Commonly,management approval of recuperation arranging includes an examination of businessprocedures and coherence needs. Administration endorsement of recuperation procedures isvital. All techniques ought to line up with the association's objectives. When disasterrecovery systems have been created and endorsed, they can be converted into calamityrecuperation designs.In this report we are going to discuss about the role of business continuity and disasterrecovery plans to recover the information and operational systems when in the case ofsystems and hardware failure. Analysis the vulnerabilities and threats of information securityand thus determining appropriate controls which can be applied for mitigation of the potentialrisks. Designing an appropriate medical data storage infrastructure and a networkinfrastructure and explaining the ethical and privacy issues that plays vital role in managingthe information security communication in a health organization. Explaining the risksassociated with the infrastructure development and how these disasters can be managed andrecovered by some potential planning in the system.
Group Research Report MANAGEMENT OF INFORMATION SECURITY Student Name Student Number E-mail Address Student Name Student Number E-mail Address_3
1. Data Storage InfrastructureMedical AreaPotential Customer patientEnrolled patientPatient/End-User Area Cloud Computing analyzerIndustry Service partnerCloud ServerPrescriptioncontrolSupervision/ControlCoachingFigure 1: Data Storage infrastructure for Health centre(Source: By the author)Some of the cloud servers are present that allows the healthcare professionals toutilize the connection of medical devices in the diagnosis, body composition evaluation andtreatment of the patients in some other location. These kinds of devices can also be enhancedby the usage of telecommunication technology, data storage devices, specialized applicationbased network computer, database management software, and medical devices that arecapable of collecting electronic data, transmission and storages are the main components ofthe organization’s data infrastructure. Not like the traditional database system, which is blockbased, distributed cloud storage foundations are normally object based. Accessibility to thequestion based capacity is made conceivable through a Web administrations applicationprogramming interface (API) utilizing the Simple Object Access Protocol (SOAP) orRepresentational State Transfer (REST) convention. The foundation is frequently workedwith product equipment and servers are bunched so the capacity limit of each can beaccumulated into a solitary pool. In this framework arrangement, limit extension is madeconceivable by adding another server to the bunch.There are Cloud computing analysers (hardware solution: connected device) based onthe sensor tele-monitoring deviceswhich is combined by hand in hand configuration and the
Group Research Report MANAGEMENT OF INFORMATION SECURITY Student Name Student Number E-mail Address Student Name Student Number E-mail Address_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
(Doc) Cloud Storage : Essay
|8
|2120
|273

Implications of Cloud Computing in Business and Finance
|12
|3073
|76

Identification of Security Breaches
|2
|1667
|355

Advantages and Disadvantages of Cloud Computing for Businesses
|10
|1777
|149