Exploring the Architecture and Security Threats in Healthcare Networks

Verified

Added on  2023/06/05

|7
|338
|124
Report
AI Summary
This report provides an overview of healthcare networks, highlighting the critical role computer networks play within the healthcare system. It details the architecture of these networks, including essential components like routers, switches, firewalls, and servers, explaining their functions in maintaining network operations and security. The report further identifies key security threats such as data breaches, configuration conflicts, DOS attacks, system interoperability issues, and malware. Finally, it proposes several steps to mitigate these security risks, including limiting login attempts, using authorized servers, adopting encryption technologies, implementing proper configuration processes, blocking unwanted traffic, using antivirus software, adding routers for improved performance, and adopting biometric authentication methods. The document concludes by citing references that support the information presented.
Document Page
HealthCare Networks
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction
Computer networks play a significant role in
the healthcare system.
There are many types of communication
networks used by the health care system like
wireless, wired and mobile networks [1].
Patients can communicate with medicals from
any location [2].
Document Page
The architecture of Healthcare networks
Any computer network consist four types of
network devices-
Router
Switches
Firewall
Servers
Router-
It is also known as Gateway
It provide internet connectivity to peripheral devices
[2].
Document Page
The architecture of Healthcare networks
Switches:
It does not require any external routers.
Generate communication process between two devices.
Both public and private access points use the same
subnets [1].
Firewall:
It protects personal servers from hackers.
Reduce unwanted signals from computer networks
Servers:
It is used to control and monitor various programmes
and network components [2].
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Security threats of healthcare networks
There are following security issues occur in
health care networks-
Data Breach
Configuration conflict
DOS attack
System interoperability
Malware and malicious attacks
Document Page
Steps to reduce security issues
Limited login attempts
Use authorized servers and websites
Adopt encryption and cryptography technologies
Use proper configuration process
Use the robust process to block traffic signals
Use of antivirus and firewall software's
Add numbers of routers to improver
performance of the system
Adopt biometric systems like iris, fingerprint,
and password based process.
Document Page
References
[1]. J.H., Ziegeldorf, O.G. Morchon and K., Wehrle. “Privacy in
the Internet of Things: threats and challenges.” Security and
Communication Networks, 7(12), pp.2728-2742, 2014.
[2]. A., Whitmore, A. Agarwal, and L., Da. “The Internet of
Things—A survey of topics and trends.” Information Systems
Frontiers, 17(2), pp.261-274, 2015.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]