MN502: Security Challenges and Solutions for Healthcare Networks

Verified

Added on  2023/06/04

|8
|570
|309
Report
AI Summary
This report provides an overview of security challenges in healthcare networks, focusing on the increasing reliance on these networks for efficient communication and collaboration. It highlights the architecture of healthcare networks, including RFID wireless sensor networks, user interfaces, and IoT smart gateways. The report identifies key threats such as hackers, compromised WBAN nodes, packet sniffers, denial of service attacks, and malware. Mitigation techniques discussed include data encryption, virtual private networks, and network monitoring systems. The conclusion emphasizes the importance of strong security measures to maintain patient data confidentiality and prioritizes network security in healthcare organizations. References to various IEEE publications and online resources support the analysis and recommendations.
Document Page
Healthcare Networks
Name of the student:
Name of the university:
Author note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Introduction to healthcare
networks Healthcare organisations has
adopted this new application to
secure the personal data of the
patients.
This presentation will focus on the
security issues that the
Healthcare industry face.
Healthcare networks increases
efficiency of communication and
collaboration between the
patients and the healthcare units.
Document Page
Healthcare Network
Architecture
The network architecture
consists of three important
parts-
The Radio Frequency
Identification (RFID) wireless
sensor network also called
Hybrid Sensing Network (HSN)
Interface of the users for
visualizing and management
data and
IoT smart gateway.
Document Page
Threats to Healthcare
Networks
Hackers attack the system to steal the information of the patients
and therefore, patients will be at great risks.
The main device in the network that are subjected to compromise in
security are the WBAN nodes.
The common security threats faced by healthcare networks are
packet sniffers, denial of service (DoS), defacing, spam, man-in-the-
middle attack and attacks by viruses, Trojan horses and worms.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Threats Mitigation
Techniques
Encryption of data
Virtual Private Networks
Using Antiviruses
Network Monitoring systems
Document Page
Conclusion
Healthcare networks should ensure strong security to keep the
patient information confidential.
Data encryption should be done to keep the information secured.
Healthcare organisation in increasingly depending on core networks
for its operations.
Therefore, network security should be given highest priority.
Document Page
References
[1] Catarinucci, Luca, Danilo De Donno, Luca Mainetti, Luca Palano, Luigi Patrono, Maria Laura
Stefanizzi, and Luciano Tarricone. "An IoT-aware architecture for smart healthcare
systems." IEEE Internet of Things Journal 2, no. 6 (2015): 515-526.
[2] "Telemedicine, Telehealth, Distance Learning medical solutions to equalize healthcare
access, to eliminate suffering, improve the quality of life, and to brighten lives", First-
worldwide-internet.com, 2018. [Online]. Available:
http://www.first-worldwide-internet.com/telemedical-telehealth-hipaa-dicom-hL7-pacs-
network.html. [Accessed: 24- Sep- 2018].
[3] Chen, Min, Jiafu Wan, Sergio González-Valenzuela, Xiaofei Liao, and Victor CM Leung. "A
Survey of Recent Developments in Home M2M Networks." IEEE Communications Surveys and
Tutorials 16, no. 1 (2014): 98-114.
[4] Zafar, Humayun, Myung S. Ko, and Jan G. Clark. "Security Risk Management in Health Care:
A Case Study." CAIS 34 (2014): 37.
[5] Rushanan, Michael, Aviel D. Rubin, Denis Foo Kune, and Colleen M. Swanson. "Sok: Security
and privacy in implantable medical devices and body area networks." In 2014 IEEE Symposium
on Security and Privacy (SP), pp. 524-539. IEEE, 2014.
[6] Abomhara, Mohamed, and Geir M. Køien. "Cyber security and the internet of things:
vulnerabilities, threats, intruders and attacks." Journal of Cyber Security 4, no. 1 (2015): 65-88.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Thank You
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]