Network Security Assignment: Security Challenges in Emerging Networks

Verified

Added on  2023/06/07

|6
|319
|184
Report
AI Summary
This report examines the security challenges faced by healthcare networks, focusing on threats like Distributed Denial of Service (DDoS) attacks, man-in-the-middle attacks, and network manipulation. The report details the vulnerabilities within these networks and proposes mitigation techniques to enhance security. It highlights the importance of robust security measures to safeguard sensitive data and ensure the availability of network resources. The report also explores the application of encryption and enterprise-wide certificate management as countermeasures. The assignment draws on references to support its claims and provides a comprehensive overview of network security in the healthcare sector.
Document Page
Security Challenges
in Emerging
Networks
Name of the Student
Name of the University
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
The healthcare networks provide connections
for better communication within the healthcare
sector.
The architecture of these networks comprise
of server farm, clients, gateway and OAM
server [2].
The recent developments in these networks
help to mitigate the existing security issues.
The importance of security within the health
care network is that it would detect as well as
prevent the entry of viruses or other threats.
Healthcare Networks
Document Page
Distributed Denial of Service Attacks:
In this attack, the perpetrator gets in the
network resource for making it unavailable
for the users [1].
Man in the Middle Attacks: In this
attack, an attacker secretly hears or alters
the data that is to be sent.
Network Manipulation: In this attack,
the network is manipulated by the attackers
for hacking of data.
Three Security Issues in
Healthcare Networks
Document Page
DDoS mitigation is the collection of tools and techniques to
resist or mitigate the attack.
The comparison of signatures is the next technique for
mitigation.
The employment of encryption technique is the third
technique [2].
Management of enterprise wide certificates is the fourth
mitigation technique for DDoS attacks.
Mitigation Technique for DDoS Attacks
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
[1] Roman, Rodrigo, Jianying Zhou, and
Javier Lopez. "On the features and
challenges of security and privacy in
distributed internet of things." Computer
Networks 57, no. 10 (2013): 2266-2279.
[2] Mahmood, Muhammad Adeel, Winston
KG Seah, and Ian Welch. "Reliability in
wireless sensor networks: A survey and
challenges ahead." Computer Networks 79
(2015): 166-187.
References
Document Page
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]