Get Similar Asssignment Answers, Essays & Custom Paper Writing Services

To hire a writer, fill the order form with details from your nursing assessment task brief—assignment instructions.

Posted: August 11th, 2022

Facility Network Security: Assessment and Recommendations

Facility Network Safety: Assessment and Recommendations
You’re the chief data expertise officer at a small outpatient well being care facility in Riyadh. The medical facility employs 5 specialist physicians, ten licensed nurses, 5 administrative Helpants, and two technicians. There are 25 scientific rooms. Every room is provided with a pc. As well as, 5 computer systems are utilized by the executive Helpants for sufferers’ appointments and information. All these computer systems are related utilizing a neighborhood space community. Physicians are equipped with transportable units that they will use to jot down e-prescriptions. These units are related wirelessly to the remainder of the community.

Because the chief data expertise officer, you’re charged with the duty of evaluating the safety standing of the ability community and growing a report back to advocate the instructions that needs to be adopted quickly.

Your report ought to embrace the next supplies:

Current and potential vulnerabilities and threats
Ideas and discussions of strategies or instruments that can be utilized to beat the prevailing and potential safety threats
Dialogue of encryption methods that can be utilized for the wi-fi community and the choice and justification of a correct approach for this facility
Dialogue of the prevention of cyber-attacks and the right upkeep wanted to attain this aim.

Facility Network Safety: Assessment and Recommendations
Current and Potential Vulnerabilities And Threats
The potential community vulnerabilities that may face the well being care facility embrace malware, which is malicious software program that may be inserted within the computer systems to discover vulnerabilities within the community programs. The widespread malware consists of viruses, Trojans, and worms (Firch, 2020). One other vulnerability of the community of the well being facility is social engineering assaults. Social engineering entails the usage of psychological manipulation to trick customers into performing in a approach that exposes the community to vulnerabilities. A few of the widespread social engineering varieties embrace phishing emails, spam, spear phishing, and whaling. The opposite community vulnerability is outdated or unpatched software program, which might permit attackers to entry the community. The misconfiguration of the firewalls and working programs can allow menace actors to simply spy the visitors on the community, comprise the community’s functioning, or steal information.
The threats to the well being facility community embrace reconnaissance threats, which contain the attacker analyzing the community to find particulars similar to IP addresses, providers and protocols, and open ports. Frequent reconnaissance assault threats embrace packet sniffers, port scan and ping sweep, and web data queries (Ahmad & Habib, 2010). One other menace to the community is the entry assault, which is utilized by hackers who discover vulnerabilities inside the community to entry confidential data of the well being care facility. The widespread entry threats that may face the well being facility community embrace password assaults, belief exploitation, port redirection, and man-in-the-middle assault. Denial of Service (DoS) menace faces virtually all networks. DoS assault entails overwhelming the hosted servers or community with ineffective visitors ensuing them to reply slowly or change into utterly inoperable. A few of the widespread DoS that is perhaps utilized by attackers embrace Distributed Denial of Service (DDoS) and buffer overflow.
Countermeasure Methods and Instruments to Overcome Safety Threats
A number of methods and instruments are urged to make sure the community of the well being facility stays secured and able to resisting safety threats. The safety countermeasures that needs to be carried out embrace establishing robust safety insurance policies for each staff and people to entry the community to facilitate safe and clean community functioning (RSI Safety, 2019). Assigning authority of sources is one other approach that needs to be utilized, which entails a stage of authorization being assigned for system or community entry. The well being facility also needs to set up an intrusion detecting system within the system. The intrusion detection system helps the system or community safety by finding out and analyzing log information and malicious actions.
The safety countermeasure instruments that may defend the system in opposition to threats and vulnerabilities embrace cryptography, which protects information from interception. The Cryptography approach entails sending information in an unrecognizable type to make sure solely the meant receiver and person can entry or learn the message. The information can be despatched utilizing the uneven encryption or public-key, which makes use of two separate keys to safe and authenticate the communication on the community (Ahmad & Habib, 2010). One other software important in overcoming safety threats is anti-malware software program. Putting in anti-malware within the community system will defend its means to determine and stop malicious applications from spreading within the system or interfering with its functioning.
Encryption Methods for Wi-fi Network
A number of encryption methods for wi-fi networks exist, together with Wired Equal Privateness (WEP), which makes use of 802.11 encryption and authentication normal. WEP encompass two variations, together with 64-bit that makes use of a 40-bit key, and the 128-bit model that makes use of a 140-bit key. The opposite wi-fi community encryption approach is the Wi-Fi Protected Entry (WPA), which implements the IEEE 802.11i normal and makes use of the Temporal Key Integrity Protocol (TKIP) to enhance LAN safety. The opposite encryption approach for a wi-fi community is the Pre-Shared Key Mode (PSK), which comprises a standard key or password required to achieve entry to wi-fi hosts. In PSK, all customers that share the community are supplied with a key or password that they will use to attach their units to the wi-fi community. Nonetheless, the approach is taken into account to be much less secured for the reason that greater the variety of individuals related to the community, the upper the probabilities of somebody shedding or exposing the password to unauthorized people. The advisable encryption approach for the well being facility wi-fi community is the Enterprise Mode, which entails purchasers authenticating to the wi-fi community with a username and password. The authentication is very prioritized within the enterprise mannequin, as customers are divided into entry teams permitting them to solely entry sources assigned. Customers additionally develop their usernames and passwords, guaranteeing nothing are shared and making it straightforward to watch the time the customers logged within the system.
Prevention of Cyber-Assaults and the Correct Upkeep Wanted
the advisable methods of stopping cyber-attacks that needs to be carried out by the well being facility embrace coaching customers in cybersecurity panorama together with find out how to mitigate cyber dangers, dangers related to unsecured networks, find out how to keep away from cyber threats, and password administration. The opposite prevention measure advisable is putting in, utilizing, and common updates of antivirus, anti-malware, and antispyware software program on each pc and system inside the well being facility related to the ability community. The well being facility can also be advisable to make sure the is secured and refined, password-protected, and backed up by a multi-authentication (Goud, 2020). The information is transferred and shared inside the community also needs to be encrypted to make sure its security if it falls into the fallacious palms. The correct upkeep wanted to attain cyber-attacks prevention features a common replace of safety instruments put in, similar to antivirus and anti-malware software program. The customers also needs to frequently change their password and guarantee they’re robust sufficient. Updating and patching software program needs to be carried out well timed to keep away from exposing the programs operating functions or the community to assault actors.
References
Ahmad, N. & Habib, Ok. (2010). Assessment of Network Safety Threats and Vulnerabilities by Growth & Implementation of a Safety Network Monitoring Resolution. Grasp Thesis Electrical Engineering. https://www.researchgate.web/publication/202784990_Analysis_of_Network_Security_Threats_and_Vulnerabilities_by_Development_Implementation_of_a_Security_Network_Monitoring_Solution
Firch, J. (2020). What Are The Most Frequent Sorts Of Network Vulnerabilities? Purplesec. Retrieved from https://purplesec.us/common-network-vulnerabilities/
Goud, N. (2020). Methods to forestall cyber assaults in your firm. Cyber Insiders. Retrieved from https://www.cybersecurity-insiders.com/ways-to-prevent-cyber-attacks-on-your-company/
RSI Safety. (2019). Network Safety Threats. Retrieved from https://weblog.rsisecurity.com/top-10-network-security-threats/

Order | Check Discount

Tags: Facility Network Security: Assessment and Recommendations

Online Nursing Papers—Assignment Help For You!

Special Offer! Get 20-30% Off Your Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the most qualified writers are selected to be a part of our research and editorial team, with each possessing specialized knowledge in specific subjects and a background in academic writing.

Affordable Prices

Our prices strike the perfect balance between affordability and quality. We offer student-friendly rates that are competitive within the industry, without compromising on our high writing service standards.

100% Plagiarism-Free

No AI/chatgpt use. We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you decide to place an order with Nursing Study Bay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much guidelines - instruction details as possible.

Assignment of Writer

We assess your order and pair it with a skilled writer who possesses the specific qualifications for that subject. They then start the research/writing from scratch.

Order in Progress and Delivery

You and the assigned expert writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also review testimonials from other clients, from where you can select your preferred professional writer to assist with your homework assignments.

For Similar Answers, Custom Essay Writing & Assignment Help Services

Find an expert by filling an order form for your nursing paper. We write AI-plagiarism free essays and case study analysis. Anytime!

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00