Analysis of Information Security Technologies for Hospitals

Verified

Added on  2023/03/20

|4
|805
|44
Homework Assignment
AI Summary
This assignment analyzes information security technologies, focusing on data transmission methods suitable for hospitals. It explores the use of GSM/GPRS for emergency data transmission and wireless sensor networks (WSN). The paper discusses the risks associated with these technologies, including threats to privacy, confidentiality, and the potential for vulnerabilities. It recommends GPRS for data transmission and examines the risks of public key cryptography, such as certification problems and a false sense of security. The assignment also discusses the benefits and risks of Transport Layer Security (TLS) applications, including secure key hashing and the potential for malicious data insertion. The paper concludes that the recommended data transmission method is a technique capable of sending images directly to a consultation site, with references to relevant literature.
Document Page
Running head: INFORMATION SECURITY TECHNOLOGIES
INFORMATION SECURITY TECHNOLOGIES
Name of the Student
Name of the Organization
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1INFORMATION SECURITY TECHNOLOGIES
In the case of hospital, some data transmission methods which can be suggested are
GSM/GPRS for emergency transmission of data and data transmission via all the sensor
networks. Systems which will be utilising the technology of GSM/GPRS for medical
transmission of data will be mainly using a particular device which will be allowing the
transmission of several important biosignals as well as still images of patients or rather scans
from any emergency site to that of the site of consultation by utilising GSM (Voirin et al., 2015).
Some of the risks which are seen to be associated with this technology will be involving some
threats to both privacy as well as confidentiality and also in the acceptance of the technology in
general. On the other hand, WSN or wireless sensor network is mainly defined as a class of
systems which has been emerging and this has been made possible by all the less expensive
hardware, advanced tools of programming as well as several algorithms which are very much
complex. It has the capability of detecting any kinds of threats and performing sensing as well as
actuation in a traditional way. All the WSN devices are seen to be excessively limited in terms of
communication, power and computation and they are often seen to be deployed in a number of
accessible areas (Stafford, 2013). This will be further increasing several vulnerabilities related to
security. For this particular firm, GPRS can be recommended for the purpose of the transmission
of data.
Some of the risks which are seen to be associated with the public key cryptography are
mostly the problems related to certification and the totally false sense of security. It has noticed
quite often that there are a number of public key systems which mostly utilise a third party for
mainly certifying the public key’s reliability (Bennett & Brassard, 2014). If the authority of
certification gets compromised at any cost then the criminal who did it can even issue several
false certificates and fool around a number of people into directly sending data to wrong places.
Document Page
2INFORMATION SECURITY TECHNOLOGIES
False sense of security mostly says that no matter how much safe us the cryptographic system is,
it will be only protecting for which it has been specially designed to protect and not more than
that (Zhang et al., 2015). However, it has a number of advantages like the capability of signing a
number of messages by the application of the private key to a file.
Some of the benefits of transport layer security applications will be involving the
utilisation of much more secure key hashing for the particular code of message authentication for
ensuring that a record cannot be changed while transmitting over Internet or some other open
networks. TLS applications also defines PRF which utilises two algorithms of hash and these
two algorithms increases the security by protecting data from being altered if any of them is
compromised. One of the biggest which are seen to be associated with the applications of TLS is
the insertion of malicious data by several attackers which will be very much beneficial for all the
attackers.
No, the recommended method does not fall under any of the categories as the particular
method which has been suggested is mainly a technique of data transmission which possess with
the capability of sending several images directly to the consulting site.
Document Page
3INFORMATION SECURITY TECHNOLOGIES
References
Bennett, C. H., & Brassard, G. (2014). Quantum cryptography: public key distribution and coin
tossing. Theor. Comput. Sci., 560(12), 7-11.
Stafford, G. A. (2013). U.S. Patent No. 8,571,624. Washington, DC: U.S. Patent and Trademark
Office.
Voirin, N., Payet, C., Barrat, A., Cattuto, C., Khanafer, N., Régis, C., ... & Vanhems, P. (2015).
Combining high-resolution contact data with virological data to investigate influenza
transmission in a tertiary care hospital. infection control & hospital epidemiology, 36(3),
254-260.
Zhang, X., Long, J., Wang, Z., & Cheng, H. (2015). Lossless and reversible data hiding in
encrypted images with public-key cryptography. IEEE Transactions on Circuits and
Systems for Video Technology, 26(9), 1622-1631.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]