MN502 Healthcare Network Security: Current and Future Challenges
VerifiedAdded on 2023/06/04
|13
|3967
|210
Report
AI Summary
This report discusses healthcare network architecture, its components, recent developments, and innovations. It emphasizes the importance of security, analyzes current and future security issues, and proposes solutions. The report highlights the shift towards integrated hospital systems for clinical, financial, and management efficiency, driven by the need for organized administration, readiness, and data security. It addresses the challenges of using diverse medical data systems and the necessity for integrated and compatible resources to improve data accessibility, patient care, and cost-effectiveness. The proposed three-layer client-server design, incorporating secure sockets layer protocol and public-key cryptography infrastructure, aims to enhance authorization, information security, verification, and privacy within the healthcare network. The architecture includes a central resource distribution system with consumer, infrastructure, and server levels, ensuring secure communication and personnel management. The report also details components such as the computer server with Active Directory and Certificate Authority, the computer client with eToken verification, and security measures like VPNs and packet filtering to protect against middle-level attacks and ensure data integrity.

1
STUDENT’S NAME
COURSE
INSTITUTION
DATE
STUDENT’S NAME
COURSE
INSTITUTION
DATE
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

2
Executive Summary.
The purpose of this report is to discuss the healthcare network architecture and its components. The
report also discusses the current developments and innovations in healthcare networks, the importance
of security in healthcare networks, critical analysis of current or future security issues in the healthcare
networks and also propose a solution to the security issues identified.
Executive Summary.
The purpose of this report is to discuss the healthcare network architecture and its components. The
report also discusses the current developments and innovations in healthcare networks, the importance
of security in healthcare networks, critical analysis of current or future security issues in the healthcare
networks and also propose a solution to the security issues identified.

3
Contents
Introduction................................................................................................................................................4
Healthcare Network Architecture and Components..................................................................................5
Recent developments in Healthcare Networks........................................................................................12
Current and Future Potential Security Issues...........................................................................................13
References................................................................................................................................................15
Contents
Introduction................................................................................................................................................4
Healthcare Network Architecture and Components..................................................................................5
Recent developments in Healthcare Networks........................................................................................12
Current and Future Potential Security Issues...........................................................................................13
References................................................................................................................................................15

4
Introduction.
In the past years alternative tending establishments have enforced the hospital that is integrated system
to realize all the clinical, money and management of a hospital. This development started once the
requisite for well-organized means of administration, great readiness plus data security has become
necessary. This sorts of structures measure that is square dead successfully in varied medical
establishments, however the health system is nonetheless to adopt a homogenous answer, tons of
numerous medical data systems square measure being employed, from totally different merchants, and
frequently with mismatched structures. the necessity for associate integrated and compatible resources
attributable to parts equivalent to slow recovery or loss of important data, obscured records by
clinicians, easy period used up on dull unskilled tasks such as examining through hospital registers.
This system will allow: nationwide distribution of data, increase patient medic connection, providing
care plus recommend period, price savings. The distribution of data among clinics eases higher
treatment administration, so up patient treatment. This perfection is additionally supported entry to
comprehensive, latest, correct information that is clinical through economical collaboration between
specialists, vital selections quicker aimed at the advantage of the longsuffering. Alternative issue that
remains necessary is the cost-effective facet, associated through having a correct health record,
expenditures will be cheap. This will be attained through not taking to duplicate bound assessments of
the records lost plus so plummeting the use of clinic resources as an example.
This report shows an imaginative method for organizing a link that permits clinic practitioners to achieve
and have entry to databases at a distance and in a way that is exceedingly secure.
Introduction.
In the past years alternative tending establishments have enforced the hospital that is integrated system
to realize all the clinical, money and management of a hospital. This development started once the
requisite for well-organized means of administration, great readiness plus data security has become
necessary. This sorts of structures measure that is square dead successfully in varied medical
establishments, however the health system is nonetheless to adopt a homogenous answer, tons of
numerous medical data systems square measure being employed, from totally different merchants, and
frequently with mismatched structures. the necessity for associate integrated and compatible resources
attributable to parts equivalent to slow recovery or loss of important data, obscured records by
clinicians, easy period used up on dull unskilled tasks such as examining through hospital registers.
This system will allow: nationwide distribution of data, increase patient medic connection, providing
care plus recommend period, price savings. The distribution of data among clinics eases higher
treatment administration, so up patient treatment. This perfection is additionally supported entry to
comprehensive, latest, correct information that is clinical through economical collaboration between
specialists, vital selections quicker aimed at the advantage of the longsuffering. Alternative issue that
remains necessary is the cost-effective facet, associated through having a correct health record,
expenditures will be cheap. This will be attained through not taking to duplicate bound assessments of
the records lost plus so plummeting the use of clinic resources as an example.
This report shows an imaginative method for organizing a link that permits clinic practitioners to achieve
and have entry to databases at a distance and in a way that is exceedingly secure.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

5
Healthcare Network Architecture and Components.
This report presents a three layer client-server style to be utilised during a hospital system
implementation for a radiology system. The server solves problems with authorization, information
security, verification, privacy and privacy of entry. the tactic of verification is that the usage of secure
sockets layer protocol [1].
To verify quality of movable operators inside the setting of electronic business and electronic health
knowledge dealings, this report suggests application of public-key cryptography infrastructure (PKI) and
certificates. This methodology makes considerations for functions, for integration of knowledge} and
progress among totally different medical systems so as to determine an enterprise hospital info system
plus has a plan style structure exploitation digital link in hospital.[3]
The care system can would like resource distribution system that is central. this may guarantee resource
that is remote, personnel management and secure communication.
The design depends on the concepts of a service headed specification and is split into 3 components
that are structural consumer level, infrastructure level and server level. The service headed specification
is Cisco’s field of study tactic to vogue advanced link capabilities to the infrastructure. [4]
The consumer half incorporates a field constellation that accomodates and access that is oversized,
individually of the highest stations having specialised operating system package consecutively. Upon
work on the system, access to resources that are medical granted supported user authorizations. The
means is found at the computer server data processor. This incorporates a server topology that contains
a web site controller that comes with data server that holds the resources that are actual it manages
users. The computer server and client sites square measure connected through the structure part that
embody of entries that blend outward-bound stream of data from all locations. This part guarantees
that there’s data safety of traffic returning by either free or personal networks.[7]
Computer Server.
An authority that is central required to issue a mechanism that defines the user’s hierarchy and access
rights. There's additionally a given information that store’s the patient data from that shoppers insert or
access knowledge. To piece the server you established the Active Directory. This assures the
administration of wants with regard management of users from a installation that is central will be
distributed globally. The domain offers a principal management structure for body authority delegation
Healthcare Network Architecture and Components.
This report presents a three layer client-server style to be utilised during a hospital system
implementation for a radiology system. The server solves problems with authorization, information
security, verification, privacy and privacy of entry. the tactic of verification is that the usage of secure
sockets layer protocol [1].
To verify quality of movable operators inside the setting of electronic business and electronic health
knowledge dealings, this report suggests application of public-key cryptography infrastructure (PKI) and
certificates. This methodology makes considerations for functions, for integration of knowledge} and
progress among totally different medical systems so as to determine an enterprise hospital info system
plus has a plan style structure exploitation digital link in hospital.[3]
The care system can would like resource distribution system that is central. this may guarantee resource
that is remote, personnel management and secure communication.
The design depends on the concepts of a service headed specification and is split into 3 components
that are structural consumer level, infrastructure level and server level. The service headed specification
is Cisco’s field of study tactic to vogue advanced link capabilities to the infrastructure. [4]
The consumer half incorporates a field constellation that accomodates and access that is oversized,
individually of the highest stations having specialised operating system package consecutively. Upon
work on the system, access to resources that are medical granted supported user authorizations. The
means is found at the computer server data processor. This incorporates a server topology that contains
a web site controller that comes with data server that holds the resources that are actual it manages
users. The computer server and client sites square measure connected through the structure part that
embody of entries that blend outward-bound stream of data from all locations. This part guarantees
that there’s data safety of traffic returning by either free or personal networks.[7]
Computer Server.
An authority that is central required to issue a mechanism that defines the user’s hierarchy and access
rights. There's additionally a given information that store’s the patient data from that shoppers insert or
access knowledge. To piece the server you established the Active Directory. This assures the
administration of wants with regard management of users from a installation that is central will be
distributed globally. The domain offers a principal management structure for body authority delegation

6
plus network administration therefore granting access to all or any resources within the domain that is
native.[2]
The Authority that is certificate could a part of the server that achieves all the numerical certificates
through the area. The certificates comprise of the identity of the owner and a key that is public. A
Numerical Certificate enables it to able to prove someone's due that they need the permit to use a
means that is exact averting user impersonation, therefore providing a whole safety, guaranteeing the
characteristics of all people involved in the connections. The Credential Authority is rigid that is identical
a result of the Domain Controller at conveyance of title credentials to users hoping on their position in
the establishment, like structure components. A basic part of the computer server is that the info hold
on. The key determination of this storage is to grasp info that is patient going from individual details,
health history towards insurance strategies.[5]
Computer Client.
The operator’s communication through the verification coordination is characterized through associate
device that is eToken. This ensures user transparency and flexibility permitting the doctor entry to any
patient record from any end-point at intervals the link.
The user’s verification at intervals the operational structure is completed through moving into the
device personal identification number. Grounded on the privileges of the operator’s structure unit the
communication with the records is restricted through the rank of the operator at intervals the
establishment. The system defines several clusters of operators: management personnel, head of
section, doctors plus nurses. Each of those clusters square measure restricted to their department that
is own and on their position, they'll either correct or envision the info as of the folder.[6]
The system ought to guarantee associate intuitive graphical worm, despite the technology used, thus as
for the health staff to be capable of quickly understand all the potentials that the appliance offers. The
boundary between the operator and server begins upon logging in. There square measure several
decisions for the patron to use similar to the body workers can assign plus contemplate shifts, nurses be
able to scan what cure have to be compelled to be managed and doctors be able to scan a patient past,
order treatment plus edit patient specifics. One in each of the foremost very important features of the
system is the programme, planned to index the data thus on quickly gain access to the patient records.
The search mechanism permits users to retrieve info supported utterly totally different criteria. The
benefit of this methodology is that on condition the medic is at home by the sick individual, he be able
plus network administration therefore granting access to all or any resources within the domain that is
native.[2]
The Authority that is certificate could a part of the server that achieves all the numerical certificates
through the area. The certificates comprise of the identity of the owner and a key that is public. A
Numerical Certificate enables it to able to prove someone's due that they need the permit to use a
means that is exact averting user impersonation, therefore providing a whole safety, guaranteeing the
characteristics of all people involved in the connections. The Credential Authority is rigid that is identical
a result of the Domain Controller at conveyance of title credentials to users hoping on their position in
the establishment, like structure components. A basic part of the computer server is that the info hold
on. The key determination of this storage is to grasp info that is patient going from individual details,
health history towards insurance strategies.[5]
Computer Client.
The operator’s communication through the verification coordination is characterized through associate
device that is eToken. This ensures user transparency and flexibility permitting the doctor entry to any
patient record from any end-point at intervals the link.
The user’s verification at intervals the operational structure is completed through moving into the
device personal identification number. Grounded on the privileges of the operator’s structure unit the
communication with the records is restricted through the rank of the operator at intervals the
establishment. The system defines several clusters of operators: management personnel, head of
section, doctors plus nurses. Each of those clusters square measure restricted to their department that
is own and on their position, they'll either correct or envision the info as of the folder.[6]
The system ought to guarantee associate intuitive graphical worm, despite the technology used, thus as
for the health staff to be capable of quickly understand all the potentials that the appliance offers. The
boundary between the operator and server begins upon logging in. There square measure several
decisions for the patron to use similar to the body workers can assign plus contemplate shifts, nurses be
able to scan what cure have to be compelled to be managed and doctors be able to scan a patient past,
order treatment plus edit patient specifics. One in each of the foremost very important features of the
system is the programme, planned to index the data thus on quickly gain access to the patient records.
The search mechanism permits users to retrieve info supported utterly totally different criteria. The
benefit of this methodology is that on condition the medic is at home by the sick individual, he be able

7
to recover precisely the information that he consistently attempts to seek out. Another selection of the
programme is that the danger to manage that era amount of the sick medical past is shown. Each record
at intervals the data contains a consistent date permitting the system to recover entirely an area of the
whole medical history.[8]
The search outcomes shown among the range of the individual’s name, the operator having the
flexibility to decide on among viewing the individual’s details. The individual details frame, corresponds
to knowledge found on the uniform medical plan. This knowledge comprises demographic information
regarding the individual last name, address plus citizenship. Common health records are shown: people,
sensitivities, and, for infants, the burden at delivery. This permits medical workforce to rapidly verify
individually. The essential region in the system is the individual past record. It's shared into two sections.
The primary demonstrates all the medical appointments among the formerly selected timeframe.
Associate ID and conjointly the year it fully was created is introduced therefore on differentiate between
the visits. Every appointment relates to one of the individual’s health plans. Entirely the info is shown
among the subordinate panel. At the patient history window the user can browse body knowledge love
the date of entry, the workers taking care of the patient plus identifies a bit like the liberation standing
code [10].
Subsequent the manager knowledge, the first area gift the reason of the entry, past among consequent
two areas, one be able to browse the work settings, plus conduct of the sick individual. The latter two
area unit the foremost necessary, comprising the controlled treatment. The buyer might insert
information in the system. The data will bring up to date its contents nearly outright, thus the
probability to enter this knowledge rapidly through various operators. Supported the operator
authorizes issued through the domain, the operator can correct this chart of the patient in treatment.
Therefore on possess full management over the permissions, the system ought to bear in mind of the
shifts and thus the on-call doctors. In concurrence through this information, the domain controller allots
the obligatory consents to each fellow of the clinic workforce. This is often wiped out directive to surge
safety among the structure and to exploit the productivity of human resources’ management. Active
Directory has the prospect to cluster operators in structure components. By distribution besides
combination with the clinic plan, the system promises equivalent say from the entire workers taking
care of the individual, whereas not the prospect of apiece other’s information. Therefore on boost its
usefulness, the patron suggests the user the prospect to appear at his available schedule and the
to recover precisely the information that he consistently attempts to seek out. Another selection of the
programme is that the danger to manage that era amount of the sick medical past is shown. Each record
at intervals the data contains a consistent date permitting the system to recover entirely an area of the
whole medical history.[8]
The search outcomes shown among the range of the individual’s name, the operator having the
flexibility to decide on among viewing the individual’s details. The individual details frame, corresponds
to knowledge found on the uniform medical plan. This knowledge comprises demographic information
regarding the individual last name, address plus citizenship. Common health records are shown: people,
sensitivities, and, for infants, the burden at delivery. This permits medical workforce to rapidly verify
individually. The essential region in the system is the individual past record. It's shared into two sections.
The primary demonstrates all the medical appointments among the formerly selected timeframe.
Associate ID and conjointly the year it fully was created is introduced therefore on differentiate between
the visits. Every appointment relates to one of the individual’s health plans. Entirely the info is shown
among the subordinate panel. At the patient history window the user can browse body knowledge love
the date of entry, the workers taking care of the patient plus identifies a bit like the liberation standing
code [10].
Subsequent the manager knowledge, the first area gift the reason of the entry, past among consequent
two areas, one be able to browse the work settings, plus conduct of the sick individual. The latter two
area unit the foremost necessary, comprising the controlled treatment. The buyer might insert
information in the system. The data will bring up to date its contents nearly outright, thus the
probability to enter this knowledge rapidly through various operators. Supported the operator
authorizes issued through the domain, the operator can correct this chart of the patient in treatment.
Therefore on possess full management over the permissions, the system ought to bear in mind of the
shifts and thus the on-call doctors. In concurrence through this information, the domain controller allots
the obligatory consents to each fellow of the clinic workforce. This is often wiped out directive to surge
safety among the structure and to exploit the productivity of human resources’ management. Active
Directory has the prospect to cluster operators in structure components. By distribution besides
combination with the clinic plan, the system promises equivalent say from the entire workers taking
care of the individual, whereas not the prospect of apiece other’s information. Therefore on boost its
usefulness, the patron suggests the user the prospect to appear at his available schedule and the
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

8
individual actions. This also improves user skills, by seizing the opportunity of complete platform, that
gives operators all knowledge concerning their work [9].
Through the use of the Domain Regulator, we've a bent to ensured information security amongst the
system’s operators. But therefore on apply a completely safe answer, the association amongst the
patron plus additionally the computer server ought to even have firm group action rules and strategies.
As our network suggests, the structure includes two entries that use packet sifting methods on
information effort. Often, the association amongst the assorted sites is formed through a free network.
There is in addition the chance of installing a private communication strength, increasing the costs of the
coordination, but providing occupied management of the information movement [11].
The principal part of this resolution is that the employment of encoded channels. This will be completed
through applying Virtual private Networks among entries. By messaging over VPNs, we have a tendency
to area unit able to certify that info authorized in associate degree encoded approach over the overall
free info link. VPN approach installs its individual Credential Authority on the VPN server. This server is
found in identical data processor as a result of the Domain Regulator, that's that the server farm.
Through practice digital certificates delivered by this consultant, are going to be able to guarantee that
gateways will participate at intervals the VPN community. This technique totally removes the danger of
middle level attacks. These assaults carries with it an unwelcome person entrance way creating a shot to
appreciate entry to the VPN public, therefore seizing info movement amongst the rational sites. Through
practice durable circulation secret writing, we have a tendency to area unit able to ensure that although
the data is seized, it can't be decoded. Besides generating the VPN channels, the entries sieve the
movement, shielding sites from outside assaults. The sifting rules unit supported each institution’s
requirements, being very filmable, therefore providing safety for the opposite application utilized in
clinics. For the set-up the system enforced two answers, one being registered, and thus the various
American Standard Code for Information Interchange document. The proprietary resolution includes the
usage of stop code plus instrumentation. It is the benefit of the only group action risk accessible for
initiative environments. This set up incorporates a three level style involving of the group action 0.5
exploitation stop VPN, the firewall administration server exploitation SmartCenter, plus the
management tier exploitation the SmartConsole code. The foremost benefits is that the unified
management structure, through SmartCenter, and a very enhanced group action instrument, whereas
the foremost drawback is cost sensitive [12].
individual actions. This also improves user skills, by seizing the opportunity of complete platform, that
gives operators all knowledge concerning their work [9].
Through the use of the Domain Regulator, we've a bent to ensured information security amongst the
system’s operators. But therefore on apply a completely safe answer, the association amongst the
patron plus additionally the computer server ought to even have firm group action rules and strategies.
As our network suggests, the structure includes two entries that use packet sifting methods on
information effort. Often, the association amongst the assorted sites is formed through a free network.
There is in addition the chance of installing a private communication strength, increasing the costs of the
coordination, but providing occupied management of the information movement [11].
The principal part of this resolution is that the employment of encoded channels. This will be completed
through applying Virtual private Networks among entries. By messaging over VPNs, we have a tendency
to area unit able to certify that info authorized in associate degree encoded approach over the overall
free info link. VPN approach installs its individual Credential Authority on the VPN server. This server is
found in identical data processor as a result of the Domain Regulator, that's that the server farm.
Through practice digital certificates delivered by this consultant, are going to be able to guarantee that
gateways will participate at intervals the VPN community. This technique totally removes the danger of
middle level attacks. These assaults carries with it an unwelcome person entrance way creating a shot to
appreciate entry to the VPN public, therefore seizing info movement amongst the rational sites. Through
practice durable circulation secret writing, we have a tendency to area unit able to ensure that although
the data is seized, it can't be decoded. Besides generating the VPN channels, the entries sieve the
movement, shielding sites from outside assaults. The sifting rules unit supported each institution’s
requirements, being very filmable, therefore providing safety for the opposite application utilized in
clinics. For the set-up the system enforced two answers, one being registered, and thus the various
American Standard Code for Information Interchange document. The proprietary resolution includes the
usage of stop code plus instrumentation. It is the benefit of the only group action risk accessible for
initiative environments. This set up incorporates a three level style involving of the group action 0.5
exploitation stop VPN, the firewall administration server exploitation SmartCenter, plus the
management tier exploitation the SmartConsole code. The foremost benefits is that the unified
management structure, through SmartCenter, and a very enhanced group action instrument, whereas
the foremost drawback is cost sensitive [12].

9
Conclusion.
Several factors are taken into the thought resembling doable integration with different existing
networks, measurability, user friendliness and remote and secure resource access. Measurability is
critical so as for the structure to adjust to any well-being establishments. Because the system is adopted,
the growing quantity of knowledge needs to stay out there with no period of time on the computer
server web. This can be attained through load equalization plus clump methods that change the backup.
Another consummated objective is knowledge safety. This was attained victimization two main
methods. The primary was involved with internal safety, being enforced by user permissions plus token
primarily based verification. The second method is involved with attacks initiated outside the net. So as
to forestall system infiltrations or knowledge capture VPN tunnels plus traffic sieves were designed at
the sting of every basic part.
The utmost vital component of the design was the client application. This can be the boundary between
the health employees plus also the information servers. The applying style has included the thought of
the very detail that the workforce has no practical background, creating an easy system a key consider is
the wide receipt of the answer. The inspiration of the visualized program was the uniform individual
data, wide used all over the health coordination. This suggests an extraordinary mark of understanding
to the health employees that's now educated to utilize them. Because of the essence of applying, we
tend to enforce a structured viewpoint of an outsized quantity of individual health records, making the
likelihood to stock the complete details of an individual and to entry it in line with every user’s desires.
Addition of nearby functionalities drifted applying to associate degree a whole stand that inclines to the
executive desires within the type of producing, allocating and observing the hospital’s plan. Conjointly
derived from the dearth of a procedural background of the tip operators, all the enforced safety
methods should be as clear as potential. Thus, the system replaced the password based authentication
technique with the electronic token system. These instruments hold the operators’ qualifications. This
can be the sole communication that the operator has through the essential security tools of the
coordination, because the secret writing plus movement sifting square measure done visibly.
Recent developments in Healthcare Networks.
Some of the innovations in healthcare networks include:
Conclusion.
Several factors are taken into the thought resembling doable integration with different existing
networks, measurability, user friendliness and remote and secure resource access. Measurability is
critical so as for the structure to adjust to any well-being establishments. Because the system is adopted,
the growing quantity of knowledge needs to stay out there with no period of time on the computer
server web. This can be attained through load equalization plus clump methods that change the backup.
Another consummated objective is knowledge safety. This was attained victimization two main
methods. The primary was involved with internal safety, being enforced by user permissions plus token
primarily based verification. The second method is involved with attacks initiated outside the net. So as
to forestall system infiltrations or knowledge capture VPN tunnels plus traffic sieves were designed at
the sting of every basic part.
The utmost vital component of the design was the client application. This can be the boundary between
the health employees plus also the information servers. The applying style has included the thought of
the very detail that the workforce has no practical background, creating an easy system a key consider is
the wide receipt of the answer. The inspiration of the visualized program was the uniform individual
data, wide used all over the health coordination. This suggests an extraordinary mark of understanding
to the health employees that's now educated to utilize them. Because of the essence of applying, we
tend to enforce a structured viewpoint of an outsized quantity of individual health records, making the
likelihood to stock the complete details of an individual and to entry it in line with every user’s desires.
Addition of nearby functionalities drifted applying to associate degree a whole stand that inclines to the
executive desires within the type of producing, allocating and observing the hospital’s plan. Conjointly
derived from the dearth of a procedural background of the tip operators, all the enforced safety
methods should be as clear as potential. Thus, the system replaced the password based authentication
technique with the electronic token system. These instruments hold the operators’ qualifications. This
can be the sole communication that the operator has through the essential security tools of the
coordination, because the secret writing plus movement sifting square measure done visibly.
Recent developments in Healthcare Networks.
Some of the innovations in healthcare networks include:

10
1. Payer-provider Analytics – This is where several carriers are giving healthcare organizations
claims data, tools and analytics to help make better decisions are appropriate based on
quantitative data.
2. Competitor Analysis – Referral data is used by physical contacts to see which competitor
receives the most referrals in a certain place based on specialty, procedures offered to be able
to identify which organizations could be the best to partner with based on referral volume.
3. Artificial intelligence – While still in the early stages, it holds promise for patients today that
wish to schedule doctor appointments based on minimizing staffing challenges and monitor the
health status and also helps homecare assistants stay informed about patients’ evolution.
4. Blockchain for healthcare – This ensures a decentralized record system using blockchain
independent of electronic medical records controlling the data.
The importance of security in healthcare networks.
1. Increased mobility: Secure wireless networks and virtual private networks allow clinicians to
access patient information, lab results, and medical libraries from notebook computers,
handheld devices, and portable phones, as well as from remote and home offices.
2. Enhanced Productivity plus reduced costs - Once a secure, reliable network is in place,
healthcare providers can deploy applications that streamline resource intensive back-office
processes. Solutions can include business management applications, claims processing systems,
and systems for finance and human resources management.
3. Access to information at the point of care - A secure wired or wireless network allows clinicians
to access and update clinical records directly from an examination room or lab, providing a more
up-to-date, comprehensive view of the patient where caregivers need it most.
4. Improved safety and patient care - Digital clinical applications and real-time information sharing
enabled by a secure network provide a more unified, up-to-date view of the patient, which
results in faster, more accurate, less redundant care. When clinicians can securely update
records and digitally write orders and prescriptions at the point of care, they can substantially
reduce errors associated with handwritten, paper-based systems.
Current and Future Potential Security Issues.
1. Cloud threats – As hospitals use cloud-based applications to improve patient care and
collaboration, they should be concerned of data privacy and security concerns.
1. Payer-provider Analytics – This is where several carriers are giving healthcare organizations
claims data, tools and analytics to help make better decisions are appropriate based on
quantitative data.
2. Competitor Analysis – Referral data is used by physical contacts to see which competitor
receives the most referrals in a certain place based on specialty, procedures offered to be able
to identify which organizations could be the best to partner with based on referral volume.
3. Artificial intelligence – While still in the early stages, it holds promise for patients today that
wish to schedule doctor appointments based on minimizing staffing challenges and monitor the
health status and also helps homecare assistants stay informed about patients’ evolution.
4. Blockchain for healthcare – This ensures a decentralized record system using blockchain
independent of electronic medical records controlling the data.
The importance of security in healthcare networks.
1. Increased mobility: Secure wireless networks and virtual private networks allow clinicians to
access patient information, lab results, and medical libraries from notebook computers,
handheld devices, and portable phones, as well as from remote and home offices.
2. Enhanced Productivity plus reduced costs - Once a secure, reliable network is in place,
healthcare providers can deploy applications that streamline resource intensive back-office
processes. Solutions can include business management applications, claims processing systems,
and systems for finance and human resources management.
3. Access to information at the point of care - A secure wired or wireless network allows clinicians
to access and update clinical records directly from an examination room or lab, providing a more
up-to-date, comprehensive view of the patient where caregivers need it most.
4. Improved safety and patient care - Digital clinical applications and real-time information sharing
enabled by a secure network provide a more unified, up-to-date view of the patient, which
results in faster, more accurate, less redundant care. When clinicians can securely update
records and digitally write orders and prescriptions at the point of care, they can substantially
reduce errors associated with handwritten, paper-based systems.
Current and Future Potential Security Issues.
1. Cloud threats – As hospitals use cloud-based applications to improve patient care and
collaboration, they should be concerned of data privacy and security concerns.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

11
2. Encryption blind spots – Hackers have found a way to hide in encrypted traffic. By using
encrypted tunnels like virtual private networks in our system we ensure data is passed in an
encrypted way but it’s more difficult for security analytics to detect or monitor breaches and
targeted attacks.
3. Malware and Ransomware – Malware is able to infiltrate into a network like the hospital
information system through encrypted traffic. Ransomware is becoming more popular and
hospitals are the primary targets whereby they pay a certain amount of money mostly in
bitcoins in order to unlock patient medical records.
Solution.
In order to solve the encryption blind spots problem, hospitals should have a layer of security to
monitor traffic to ensure there are no blind spots for hackers to take advantage. This will enable the
IT department within the hospital to analyze all network traffic for any suspicious activity taking
place. Suspicious and malicious traffic can be selectively decrypted and inspected in rapid fashion,
while allowing known good traffic to pass through in its encrypted state. This ability to selectively
decrypt and inspect network traffic ensures data privacy and compliance while bolstering security
against an increasingly common threat, which should always be top of mind for hospital IT
department and security staff.
Conclusion.
In this report I presented the architecture of the hospital Information System and its components and
the recent development and innovations around healthcare networks and also the importance of
security in the network and analyzed the potential security issues in healthcare networks and
recommended solutions.
2. Encryption blind spots – Hackers have found a way to hide in encrypted traffic. By using
encrypted tunnels like virtual private networks in our system we ensure data is passed in an
encrypted way but it’s more difficult for security analytics to detect or monitor breaches and
targeted attacks.
3. Malware and Ransomware – Malware is able to infiltrate into a network like the hospital
information system through encrypted traffic. Ransomware is becoming more popular and
hospitals are the primary targets whereby they pay a certain amount of money mostly in
bitcoins in order to unlock patient medical records.
Solution.
In order to solve the encryption blind spots problem, hospitals should have a layer of security to
monitor traffic to ensure there are no blind spots for hackers to take advantage. This will enable the
IT department within the hospital to analyze all network traffic for any suspicious activity taking
place. Suspicious and malicious traffic can be selectively decrypted and inspected in rapid fashion,
while allowing known good traffic to pass through in its encrypted state. This ability to selectively
decrypt and inspect network traffic ensures data privacy and compliance while bolstering security
against an increasingly common threat, which should always be top of mind for hospital IT
department and security staff.
Conclusion.
In this report I presented the architecture of the hospital Information System and its components and
the recent development and innovations around healthcare networks and also the importance of
security in the network and analyzed the potential security issues in healthcare networks and
recommended solutions.

12
References.
[1] Cordos, A., Studies and research on management, processing and transmission of information in
healthcare applications, Doctoral thesis, Technical University of ClujNapoca, 2008.
[2] Rankl, W., Effing, W., Smart Card Handbook, Third Edition, Wiley, 2003.
[3] Tan, J., Wen, H., Gyires, T., M-commerce security: The impact of wireless application protocol (WAP)
security services on e-business and e-health solutions, International Journal of M-Commerce, 1(4), 2003.
[4] Xudong, L., Huilong D., Haomin L., Chenhui Z., Jiye, A., The Architecture of Enterprise Hospital
Information System, Engineering in Medicine and Biology Society, 2005, pp. 6957-6960.
[5] S. Park, B. Aslam, D. Turgut, and C. C. Zou, “Defense against sybil attack in vehicular ad hoc network
based on roadside unit support,” in MILCOM 2009 - 2009 IEEE Military Communications
Conference, Oct 2009, pp. 1–7.
[6] “ETSI TS 102 940 v1.2.1: Intelligent Transport Systems (ITS); Security; ITS communications security
architecture and security management,” ETSI WG5 Technical Specification, pp. 1–38, November
2016.
[7] “Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the
protection of natural persons with regard to the processing of personal data and on the free
movement of such data, and repealing Directive 95/46/EC (General Data Protection
Regulation),” Official Journal of the European Union, vol. L119, pp. 1–88, May 2016.
[8] C. Chen, X. Wang, W. Han, and B. Zang, “A robust detection of the sybil attack in urban vanets,” in
2009 29th IEEE ICDCSW, June 2009, pp. 270–276.
[9] “ETSI TR 103 415 V0.1.9: Intelligent Transport Systems (ITS); Security; Pre-standardisation study on
pseudonym change management ,” ETSI WG5 Technical Specification, pp. 1–31, November 2
[10] Y. Hao, J. Tang, and Y. Cheng, “Cooperative sybil attack detection for position based applications in
privacy preserved vanets,” in IEEE - GLOBECOM 2011, Dec 2011, pp. 1–5.
[11] B. Xiao, B. Yu, and C. Gao, “Detection and localization of sybil nodes in vanets,” in DIWANS 2006,
2006, pp. 1–8.
References.
[1] Cordos, A., Studies and research on management, processing and transmission of information in
healthcare applications, Doctoral thesis, Technical University of ClujNapoca, 2008.
[2] Rankl, W., Effing, W., Smart Card Handbook, Third Edition, Wiley, 2003.
[3] Tan, J., Wen, H., Gyires, T., M-commerce security: The impact of wireless application protocol (WAP)
security services on e-business and e-health solutions, International Journal of M-Commerce, 1(4), 2003.
[4] Xudong, L., Huilong D., Haomin L., Chenhui Z., Jiye, A., The Architecture of Enterprise Hospital
Information System, Engineering in Medicine and Biology Society, 2005, pp. 6957-6960.
[5] S. Park, B. Aslam, D. Turgut, and C. C. Zou, “Defense against sybil attack in vehicular ad hoc network
based on roadside unit support,” in MILCOM 2009 - 2009 IEEE Military Communications
Conference, Oct 2009, pp. 1–7.
[6] “ETSI TS 102 940 v1.2.1: Intelligent Transport Systems (ITS); Security; ITS communications security
architecture and security management,” ETSI WG5 Technical Specification, pp. 1–38, November
2016.
[7] “Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the
protection of natural persons with regard to the processing of personal data and on the free
movement of such data, and repealing Directive 95/46/EC (General Data Protection
Regulation),” Official Journal of the European Union, vol. L119, pp. 1–88, May 2016.
[8] C. Chen, X. Wang, W. Han, and B. Zang, “A robust detection of the sybil attack in urban vanets,” in
2009 29th IEEE ICDCSW, June 2009, pp. 270–276.
[9] “ETSI TR 103 415 V0.1.9: Intelligent Transport Systems (ITS); Security; Pre-standardisation study on
pseudonym change management ,” ETSI WG5 Technical Specification, pp. 1–31, November 2
[10] Y. Hao, J. Tang, and Y. Cheng, “Cooperative sybil attack detection for position based applications in
privacy preserved vanets,” in IEEE - GLOBECOM 2011, Dec 2011, pp. 1–5.
[11] B. Xiao, B. Yu, and C. Gao, “Detection and localization of sybil nodes in vanets,” in DIWANS 2006,
2006, pp. 1–8.

13
[12] S. Chang, Y. Qi, H. Zhu, J. Zhao, and X. Shen, “Footprint: Detecting sybil attacks in urban vehicular
networks,” IEEE TPDS, vol. 23, no. 6, pp. 1103–1114, June 2012.
[12] S. Chang, Y. Qi, H. Zhu, J. Zhao, and X. Shen, “Footprint: Detecting sybil attacks in urban vehicular
networks,” IEEE TPDS, vol. 23, no. 6, pp. 1103–1114, June 2012.
1 out of 13
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.