MN502 Assignment: Overview of Network Security in Healthcare Systems
VerifiedAdded on 2020/10/05
|9
|2463
|500
Report
AI Summary
This report provides a comprehensive overview of network security within the healthcare industry. It begins by examining the architecture of healthcare networks, detailing the roles of routers, switches, firewalls, and servers. The report then explores recent technological developments, including mobile monitoring and cloud computing, and emphasizes the importance of security in safeguarding sensitive patient data. A critical analysis of current and potential security issues, such as poor funding, phishing attacks, and the risks associated with cloud computing, is presented. Furthermore, the report suggests possible solutions to these threats, including the implementation of anti-virus software, secure password management, and the use of firewalls. The conclusion reinforces the significance of robust network security to ensure the confidentiality and integrity of patient information and the smooth operation of healthcare services. The report highlights the need for proactive security measures and effective management strategies to mitigate risks and protect against cyber threats.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

OVERVIEW OF NETWORK
SECURITY
SECURITY
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

TABLE OF CONTENTS
INTRODUCTION..........................................................................................................................1
1. Health care network architecture, recent development and importance of security in
healthcare networks.....................................................................................................................1
2. Critical analyse of three current or possible future potential security issues in healthcare
networks......................................................................................................................................3
3. Possible solution for threats....................................................................................................4
CONCLUSION................................................................................................................................5
REFERENCES................................................................................................................................7
INTRODUCTION..........................................................................................................................1
1. Health care network architecture, recent development and importance of security in
healthcare networks.....................................................................................................................1
2. Critical analyse of three current or possible future potential security issues in healthcare
networks......................................................................................................................................3
3. Possible solution for threats....................................................................................................4
CONCLUSION................................................................................................................................5
REFERENCES................................................................................................................................7

INTRODUCTION
Healthcare care industry is rapidly growing enterprises of world so with a large
healthcare networks management they have to maintain huge amount of information. Health and
human services have to keep a huge bulk of patient records. These service providers must protect
confidentiality of data and reports.
Present study will be based on the challenges of healthcare security. Furthermore, it will
discuss network architecture and recent development of healthcare network. The study will also
provide a view about healthcare security threats and issues. This will present methodologies for
secured networks and focuses on developing skills by identifying network based applications.
LITERATURE REVIEW
1. Health care network architecture, recent development and importance of security in healthcare
networks
It can be a complex architecture where lot of medical information and patient data exists.
So to deal with this complexity, hospital management must plan a basic planning to ease the
work of maintaining large data.
This architecture is a basic overview which provides a comprehensive view about
patients’ discharge and their admission and it also provides an exact number of staff members
who are attending current patients etc. It is basically interconnection of those services which are
offered to people to establish a huge care network to quality services. Health and human care
service providers are concerned with multiple structural functions [1]. Considering these factors,
networking devices play an important role in linking this data to the network connections. These
devices include router, switches, firewall, server etc.
Such networking tools support in establishing connection between clients and server
system and it also helps in exchanging data and information of healthcare networking services.
Role of the following devices in building connections as follows:
Routers: It is considered as a device which is used to connect entire network to each other. This
device takes data from source to destination by adopting the most efficient and proper route.
Effective healthcare networks are established with the use of router to transmit data to all other
client systems [2]. When requests are generated to get better response from server then there will
be a great requirement of routers to take this data into small units which might help in
1
Healthcare care industry is rapidly growing enterprises of world so with a large
healthcare networks management they have to maintain huge amount of information. Health and
human services have to keep a huge bulk of patient records. These service providers must protect
confidentiality of data and reports.
Present study will be based on the challenges of healthcare security. Furthermore, it will
discuss network architecture and recent development of healthcare network. The study will also
provide a view about healthcare security threats and issues. This will present methodologies for
secured networks and focuses on developing skills by identifying network based applications.
LITERATURE REVIEW
1. Health care network architecture, recent development and importance of security in healthcare
networks
It can be a complex architecture where lot of medical information and patient data exists.
So to deal with this complexity, hospital management must plan a basic planning to ease the
work of maintaining large data.
This architecture is a basic overview which provides a comprehensive view about
patients’ discharge and their admission and it also provides an exact number of staff members
who are attending current patients etc. It is basically interconnection of those services which are
offered to people to establish a huge care network to quality services. Health and human care
service providers are concerned with multiple structural functions [1]. Considering these factors,
networking devices play an important role in linking this data to the network connections. These
devices include router, switches, firewall, server etc.
Such networking tools support in establishing connection between clients and server
system and it also helps in exchanging data and information of healthcare networking services.
Role of the following devices in building connections as follows:
Routers: It is considered as a device which is used to connect entire network to each other. This
device takes data from source to destination by adopting the most efficient and proper route.
Effective healthcare networks are established with the use of router to transmit data to all other
client systems [2]. When requests are generated to get better response from server then there will
be a great requirement of routers to take this data into small units which might help in
1

dispatching this information to correct destination with an appropriate use of the possible
shortest distance or route available.
Switches: This creates a network which is connected with server or a single network. It is used
to take data into small pieces called as packets. Switches allow communication between such
devices which are connected in a single network. Exchange of data and information between
multiple workstation of healthcare services ensures improved quality of services to patients in
hospitals. When a proper network connection is established with the purpose of communicating
and transmitting of data then it requires to switch dispatch information from one point to another
[3]. Switches take this data and information with the help of effective router.
Firewalls: This networking device is mainly used to prevent an access to unauthorised internet
users. Large amount of records is maintained in hospitals, so it would be great challenge for
those keep data and information confidential. In this case any unauthorised user will access
details and data thus firewall helps in protecting secured data. It is generally used for the purpose
of filtering incoming and outgoing network traffics. As healthcare organisations have to deal
with lot of customers on daily basis, so they must keep proper information regarding those
customers. It requires lot of data management and controlling abilities. In this situation, there is a
great possibility of threats and fraudulent activities. So healthcare needs to establish a large
networking plans to securely transmit the data. So taking this into consideration, firewall works
to prevent bulk of data and confidential information from cybercrimes.
Server: It can be considered as main channel through which client workstations access data and
information by creating a network architecture. This networking device allows flow of
information from one system to another [4]. It can be considered as the main source of
information where all the details and reports of clients are kept to establish a large healthcare
network. All the database is maintained with the help of server. It also prevents use of data from
an unauthorised user. In hospitals, generally two types of networks are found which are
categorised as file server and virtual server. File server stores data in Ram memory which
facilitates speed factor in extracting records and data of a particular patient. Virtual server is
totally based on the database storage which is available at online applications such as cloud
computing.
2
shortest distance or route available.
Switches: This creates a network which is connected with server or a single network. It is used
to take data into small pieces called as packets. Switches allow communication between such
devices which are connected in a single network. Exchange of data and information between
multiple workstation of healthcare services ensures improved quality of services to patients in
hospitals. When a proper network connection is established with the purpose of communicating
and transmitting of data then it requires to switch dispatch information from one point to another
[3]. Switches take this data and information with the help of effective router.
Firewalls: This networking device is mainly used to prevent an access to unauthorised internet
users. Large amount of records is maintained in hospitals, so it would be great challenge for
those keep data and information confidential. In this case any unauthorised user will access
details and data thus firewall helps in protecting secured data. It is generally used for the purpose
of filtering incoming and outgoing network traffics. As healthcare organisations have to deal
with lot of customers on daily basis, so they must keep proper information regarding those
customers. It requires lot of data management and controlling abilities. In this situation, there is a
great possibility of threats and fraudulent activities. So healthcare needs to establish a large
networking plans to securely transmit the data. So taking this into consideration, firewall works
to prevent bulk of data and confidential information from cybercrimes.
Server: It can be considered as main channel through which client workstations access data and
information by creating a network architecture. This networking device allows flow of
information from one system to another [4]. It can be considered as the main source of
information where all the details and reports of clients are kept to establish a large healthcare
network. All the database is maintained with the help of server. It also prevents use of data from
an unauthorised user. In hospitals, generally two types of networks are found which are
categorised as file server and virtual server. File server stores data in Ram memory which
facilitates speed factor in extracting records and data of a particular patient. Virtual server is
totally based on the database storage which is available at online applications such as cloud
computing.
2
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Recent developments
Recently healthcare centres have adopted an advanced mechanism and technology to
improve services. Hospitals have adopted a wireless networking technology in monitoring their
practices. These future trends and wireless network includes mobile monitoring, cloud
computing and various database secured online applications. Improvement in the machines and
infrastructure of hospital facilitates better quality services to patients which will be resulted in
individual’s improved health. Recent development has aimed at providing quality based services
[5]. Nowadays, hospital management mainly focus on efficient use of machines and technology
to provide better treatment facilities to customers. Improvement in communication channel in
hospitals have also contributed towards the better security management plans.
Importance of security in healthcare
Security concerns are considered as challenges for healthcare networking system. Indeed,
if these security issues are managed properly then it would provide many opportunities for
healthcare centres. Security of confidential data leads to proper functioning of hospitals.
Prevention of information and data from cybercrime will be responsible for smooth functioning
of organisations. The importance of security in healthcare has contributed towards improvement
of health by providing t required treatment with effective use of the best technology machines.
Some important features are as follows:
It facilitates MRI scanners and ventilator machines for better treatment of health care.
Potential impact of healthcare facility's has provided high quality services with
implementation of cybersecurity in healthcare enterprises.
Timely performed audits of machinery ensures the proper functioning of hospitals.
Network security is a prioritised task which maintains large source of data clients’
information regarding their disease, admitting and discharging formalities etc.
It is also helpful in tracking activities of visitors.
It will monitor practices of employees and patients inside the campus and this will also
provide orderly conduct of staff members.
2. Critical analysis of three current or possible future potential security issues in healthcare
networks
Healthcare and human services are improving day by day with this technological
advancement in the world. So, it needs large security concerns towards protecting health records
1
Recently healthcare centres have adopted an advanced mechanism and technology to
improve services. Hospitals have adopted a wireless networking technology in monitoring their
practices. These future trends and wireless network includes mobile monitoring, cloud
computing and various database secured online applications. Improvement in the machines and
infrastructure of hospital facilitates better quality services to patients which will be resulted in
individual’s improved health. Recent development has aimed at providing quality based services
[5]. Nowadays, hospital management mainly focus on efficient use of machines and technology
to provide better treatment facilities to customers. Improvement in communication channel in
hospitals have also contributed towards the better security management plans.
Importance of security in healthcare
Security concerns are considered as challenges for healthcare networking system. Indeed,
if these security issues are managed properly then it would provide many opportunities for
healthcare centres. Security of confidential data leads to proper functioning of hospitals.
Prevention of information and data from cybercrime will be responsible for smooth functioning
of organisations. The importance of security in healthcare has contributed towards improvement
of health by providing t required treatment with effective use of the best technology machines.
Some important features are as follows:
It facilitates MRI scanners and ventilator machines for better treatment of health care.
Potential impact of healthcare facility's has provided high quality services with
implementation of cybersecurity in healthcare enterprises.
Timely performed audits of machinery ensures the proper functioning of hospitals.
Network security is a prioritised task which maintains large source of data clients’
information regarding their disease, admitting and discharging formalities etc.
It is also helpful in tracking activities of visitors.
It will monitor practices of employees and patients inside the campus and this will also
provide orderly conduct of staff members.
2. Critical analysis of three current or possible future potential security issues in healthcare
networks
Healthcare and human services are improving day by day with this technological
advancement in the world. So, it needs large security concerns towards protecting health records
1

of patients [6]. In this type of situation, cybersecurity is a patient's safety concern which needs to
be prevented from an unauthorised user. There are multiple threats which are related with the
loss of confidential information and records that might be sometime responsible for patient’s
death.
So this cybercrime security is concerned with main challenges such as:
Poor healthcare funding affecting security: It is referred as those security concerns which are
related to poor funding capabilities. As technological improvement and health awareness needs
money for implementation of training programs [7]. It might be a threat to build a fair and fit
healthcare system. On the other hand, if there will be great potential source of funding available
then it may lead to the greatest medical and healthcare knowledge which in turn provides better
treatment to patients. So advanced technological knowledge contributes for effective services to
people.
Phishing: It is a cybercrime practice which is concerned with virus and malware activities. This
type of activity occurs at the time of email attachment and texts are considerably the biggest
threat to industry. In the recent survey, the Health information sharing and analyse centre have
analysed that fraudulent emails are the most dangerous threat to healthcare industries. While on
the other hand, if one see the positive side of this activity then it is generated that anti- phishing
software are designed to track websites and monitor several activities.
Increased use of cloud computing and online securities: It facilitates a huge database storage
application as the information is stored at the sever for its efficient and effective use. Cloud
computing is considered as a better way to maintain records and confidential information. It also
offers many benefits to healthcare centres such as proper use of data and services. It is also helps
in reducing the cost. On the other hand, this data needs to be correctly protected against
cybercrimes. Because it involves lot of risk because all records are stored at the server and if
these gets hacked then it will be a huge security concern as loss of information might lead to
unfair treatment of patients.
3. Possible solution for threats
Threats are considered as those known challenges which need proper planning and
strategies to control activities. Many possible solutions exist to overcome these networking
security threats in healthcare. Hospital management have to look after the secured database. For
2
be prevented from an unauthorised user. There are multiple threats which are related with the
loss of confidential information and records that might be sometime responsible for patient’s
death.
So this cybercrime security is concerned with main challenges such as:
Poor healthcare funding affecting security: It is referred as those security concerns which are
related to poor funding capabilities. As technological improvement and health awareness needs
money for implementation of training programs [7]. It might be a threat to build a fair and fit
healthcare system. On the other hand, if there will be great potential source of funding available
then it may lead to the greatest medical and healthcare knowledge which in turn provides better
treatment to patients. So advanced technological knowledge contributes for effective services to
people.
Phishing: It is a cybercrime practice which is concerned with virus and malware activities. This
type of activity occurs at the time of email attachment and texts are considerably the biggest
threat to industry. In the recent survey, the Health information sharing and analyse centre have
analysed that fraudulent emails are the most dangerous threat to healthcare industries. While on
the other hand, if one see the positive side of this activity then it is generated that anti- phishing
software are designed to track websites and monitor several activities.
Increased use of cloud computing and online securities: It facilitates a huge database storage
application as the information is stored at the sever for its efficient and effective use. Cloud
computing is considered as a better way to maintain records and confidential information. It also
offers many benefits to healthcare centres such as proper use of data and services. It is also helps
in reducing the cost. On the other hand, this data needs to be correctly protected against
cybercrimes. Because it involves lot of risk because all records are stored at the server and if
these gets hacked then it will be a huge security concern as loss of information might lead to
unfair treatment of patients.
3. Possible solution for threats
Threats are considered as those known challenges which need proper planning and
strategies to control activities. Many possible solutions exist to overcome these networking
security threats in healthcare. Hospital management have to look after the secured database. For
2

this they have to establish a secured networking channels and anti-virus software so that effective
data can be managed properly [8].
Cybercrime crime is considered as a big business in which criminals are looking for
stealing the financial details and personal data which can be further user for commercial purpose.
So proper management of healthcare and hospitals will lead to prevention of security data and
important information. Implementation of correct policies and security concepts help in proper
operational functioning of hospitals. Many possible steps are required to be taken taking these
challenges into consideration. Correct implementation will be helpful in ultimate solution of such
networking security threats.
The method is described below:
Threat of phishing can be resolved by timely installation of anti-virus in computer systems.
Preventing the virus in the system can lead to secured data of the management.
Hence, it minimises the negative impact of cybercrimes in hospitals. Absence of antivirus
application in hardware might be responsible for the harmful malicious activities thus
leads to loss of data and information. The software will identify threats and aware expert
about this. Furthermore, cloud computing can be used in this. It will provide access to
these applications and have secured password. Along with this, proper software and
applications must be installed in order to prevent phishing. If the data is used by the
authorized user than this will be secured in the hands of those people. So, resolving the
phishing, cloud computing generally need an effective management in hospitals [9]. It
will also help in tracking website traffic so that unauthorized data and information can be
detected and discard. In addition to this, reducing the phishing will provide a smooth flow
in sharing of confidential data and information in healthcare organization. Furthermore,
there will be less chances of getting data loss or theft. This will also make the website
protected from unauthorized access and entering of fraud e mails and malicious activities.
By implementation of phishing firewall can be installed. It will make the network more
protected. Thus, prevention of information and data from cybercrime will be responsible
for smooth working in healthcare and providing high quality services to people.
3
data can be managed properly [8].
Cybercrime crime is considered as a big business in which criminals are looking for
stealing the financial details and personal data which can be further user for commercial purpose.
So proper management of healthcare and hospitals will lead to prevention of security data and
important information. Implementation of correct policies and security concepts help in proper
operational functioning of hospitals. Many possible steps are required to be taken taking these
challenges into consideration. Correct implementation will be helpful in ultimate solution of such
networking security threats.
The method is described below:
Threat of phishing can be resolved by timely installation of anti-virus in computer systems.
Preventing the virus in the system can lead to secured data of the management.
Hence, it minimises the negative impact of cybercrimes in hospitals. Absence of antivirus
application in hardware might be responsible for the harmful malicious activities thus
leads to loss of data and information. The software will identify threats and aware expert
about this. Furthermore, cloud computing can be used in this. It will provide access to
these applications and have secured password. Along with this, proper software and
applications must be installed in order to prevent phishing. If the data is used by the
authorized user than this will be secured in the hands of those people. So, resolving the
phishing, cloud computing generally need an effective management in hospitals [9]. It
will also help in tracking website traffic so that unauthorized data and information can be
detected and discard. In addition to this, reducing the phishing will provide a smooth flow
in sharing of confidential data and information in healthcare organization. Furthermore,
there will be less chances of getting data loss or theft. This will also make the website
protected from unauthorized access and entering of fraud e mails and malicious activities.
By implementation of phishing firewall can be installed. It will make the network more
protected. Thus, prevention of information and data from cybercrime will be responsible
for smooth working in healthcare and providing high quality services to people.
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

CONCLUSION
The report has provided a clear vision about networking security in health care
organisations. The study had focussed on the network architecture and recent developments of
healthcare sector. It has also focused on challenges faced by healthcare networks to prevent the
reports and confidential data from an unauthorised user. This had covered critical analysis of
networking security challenges and also mentioned some possible solutions to those security
threats. It had provided a comprehensive networking devices such as router, switch, firewall and
server which were required to establish a powerful networking connection to avoid loss of
confidential data.
4
The report has provided a clear vision about networking security in health care
organisations. The study had focussed on the network architecture and recent developments of
healthcare sector. It has also focused on challenges faced by healthcare networks to prevent the
reports and confidential data from an unauthorised user. This had covered critical analysis of
networking security challenges and also mentioned some possible solutions to those security
threats. It had provided a comprehensive networking devices such as router, switch, firewall and
server which were required to establish a powerful networking connection to avoid loss of
confidential data.
4

REFERENCES
Books and Journals
1. Pathan AS, editor. Security of self-organizing networks: MANET, WSN, WMN,
VANET. CRC press; 2016 Apr 19.
1. Perlman R, Kaufman C, Speciner M. Network security: private communication in a
public world. Pearson Education India; 2016.
2. Perlman R, Kaufman C, Speciner M. Network security: private communication in a
public world. Pearson Education India; 2016.
3. Loo J, Mauri JL, Ortiz JH, editors. Mobile ad hoc networks: current status and future
trends. CRC Press; 2016 Apr 19.
4. Kavianpour A, Anderson MC. An Overview of Wireless Network Security. InCyber
Security and Cloud Computing (CSCloud), 2017 IEEE 4th International Conference on
2017 Jun 26 (pp. 306-309). IEEE.
5. White GB, Fisch EA, Pooch UW. Computer system and network security. CRC press;
2017 Dec 14.
6. Taylor RW, Fritsch EJ, Liederbach J. Digital crime and digital terrorism. Prentice Hall
Press; 2014 Mar 8.
7. Kang MJ, Kang JW. Intrusion detection system using deep neural network for in-vehicle
network security. PloS one. 2016 Jun 7;11(6): e0155781.
8. Knapp ED, Langill JT. Industrial Network Security: Securing critical infrastructure
networks for smart grid, SCADA, and other Industrial Control Systems. Syngress; 2014
Dec 9.
5
Books and Journals
1. Pathan AS, editor. Security of self-organizing networks: MANET, WSN, WMN,
VANET. CRC press; 2016 Apr 19.
1. Perlman R, Kaufman C, Speciner M. Network security: private communication in a
public world. Pearson Education India; 2016.
2. Perlman R, Kaufman C, Speciner M. Network security: private communication in a
public world. Pearson Education India; 2016.
3. Loo J, Mauri JL, Ortiz JH, editors. Mobile ad hoc networks: current status and future
trends. CRC Press; 2016 Apr 19.
4. Kavianpour A, Anderson MC. An Overview of Wireless Network Security. InCyber
Security and Cloud Computing (CSCloud), 2017 IEEE 4th International Conference on
2017 Jun 26 (pp. 306-309). IEEE.
5. White GB, Fisch EA, Pooch UW. Computer system and network security. CRC press;
2017 Dec 14.
6. Taylor RW, Fritsch EJ, Liederbach J. Digital crime and digital terrorism. Prentice Hall
Press; 2014 Mar 8.
7. Kang MJ, Kang JW. Intrusion detection system using deep neural network for in-vehicle
network security. PloS one. 2016 Jun 7;11(6): e0155781.
8. Knapp ED, Langill JT. Industrial Network Security: Securing critical infrastructure
networks for smart grid, SCADA, and other Industrial Control Systems. Syngress; 2014
Dec 9.
5
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.