Network Security Essay

3522 words - 14 pages

In the fast moving world of a hospital, the old days of taking out a pen and scribbling down data upon a patient’s charts that no one could read except the doctor that wrote it are gone. In today’s hospitals the use of hand held devices have replaced the clipboards. Now, doctors and nurses can up-date a patient’s chart, while they enter the data, the pharmacy is filling the prescriptions and a note is sent to the nurse that there is a change to the patient’s data. Medications are dispensed using computer aided equipment all in the name of providing better care to the patient while saving money for the hospital. Our goal is to find suitable server-side software that is required to be installed on the hospital’s servers to support access by the hospital doctors to patients’ information using their cellular phones or PDAs while they are not in the hospital. As described above this technology allows advanced and more rapid care by doctors for their patients in the hospital environment. Using their cell phones and PDA’s the care is more advanced and rapid because messages can be received faster as well as urgent matters.
Since patient’s information is private and protected by U.S. Health Insurance Portability and Accountability Act (HIPAA). How does the hospital ensure that the data is kept private? With the use of both server and client side software that protects the patient’s data. We will look at some of the software that hospitals may employ and the applications they provide. The following is a comparison of our research and our decision of what would be the optimum choice for the hospitals server side software needs.
Black BerryOne of the more widely known hand held devices is the Black Berry. In this we knew that it’s a great way to access email, text-based web browsing, calendaring and even mobile phone services. With the addition of both server and client side software applications this hand held device can become a doctor’s right arm.
Dr. Sankaran, Krishnan, Assistant Professor, Department of Pediatrics from the Children’s Hospital, Westchester Medical Center talking about the IBM Blackberry project . . . “It definitely improved the response time, and of course, medical errors would be diminished when you have more information on the patient rather than guessing as to what really happened.” (IBM E Magazine, 2005)Another use for Black Berries within the hospital environment is to enable children to keep up with there school work while have an extended stay at the hospital. One example of this is the Royal Children’s Hospital Education Institute (RCHEI) they have developed and employed an innovative model providing the continued educations of children while hospitalized. The paper written by Fels, D.I., Shrimpton, B., Robertson, M. (2003).described the statement “Kids in hospital, kids in school” and was presented during the EdMedia 2003 in Hawaii. (Fels, D.I., Shrimpton, B., & Robertson, M., 2003)The Black Berry Enterprise Server v4.1...

Find Another Essay On Network Security

Network security Essay

2852 words - 11 pages the system. This is an attack on authentication . an example of this is when the insertion of spurious messages in a network or the addition of record file. 2.4 Methods of securing business information Most of today's network needs to meet all possible security measures in terms of securing the business information. The protection against the business information is depends on how much security issues concerned and these can be distributed

Network Security. Essay

977 words - 4 pages A secured network is something that not only businesses but also regular day to day people with personal computers must have. Unless you want a computer that will start to run slow and/or is infected with many different types of viruses which will ultimately lead to the crash of your system then it is a good idea you invest in network security. "The term virus refers to malicious software that requires help from computer users to spread to other

Overview of Network Security

1050 words - 4 pages Network Security is the protection of the computer’s network though out the entire infrastructure. It can protect very important information and computer files to help prevent theft, spyware, malware, viruses, and more. Depending on if you have a public or private network, can determine what type of security settings you need for your network. All people are different on what they want to have secured or not, but most people do not know how to

Elements Of Network Security

1606 words - 6 pages Elements of Network Security Introduction The primary objective of a network security system is to, in a cost effective manner, balance convenient access to legitimate users and inaccessibility to attackers. In a nutshell, the goal is to prevent connectivity to anyone intending to cause harm to the network. The harm to which this paper refers can come in the following forms: 1. Application-level security threats, such as e-mail viruses and

Network Security Practices

810 words - 3 pages ones on the 10’oclock news you have to ensure you have proper security practices in place to secure your network. Most people in the security field agree that good security policies are necessary to keep intruders out and keep the users along with the information on their network safe. The best way to do this is to have some kind of written security policy. This policy should be made available for anyone to see and read so they have a better

Network Security Monitoring Tools

788 words - 3 pages There are numerous network security devices and tools available to aid in computer network defense, and these tools are often relied upon for protecting against increasingly sophisticated, stealthy, and damaging attacks. When acting alone, the current generation of security devices has an exceedingly difficult time providing an effective defense against such threats, and the situation is particularly grim for targeted or novel attacks. It

Network Security Sensors

922 words - 4 pages There are numerous network security devices and tools available intended to aid in computer network defense, and these tools are often relied upon for protecting against increasingly sophisticated, stealthy, and damaging attacks. This will be an analysis of the features and benefits for various Intrusion Detection/Prevention Systems (IDPS) and other network traffic monitoring tools in regards to defending high value targets against attacks from

Networking: Network Security

2472 words - 10 pages Network Design Contents Introduction – Why Are Security Protocols Are Needed? 2 What Is TLS? 2 A Diagram Detailing the TLS Handshake 3 What Is SSH? 3 A Diagram Summarising SSH 4 TLS & SSH; A Comparison 4 Similarities 4 Differences 4 Comparative Advantages 5 Network Requirements 5 TLS Requirements 5 SSH Requirements 5 TLS Example 6 SSH Example 6 Conclusion 6 Bibliography 7   Introduction – Why Are Security Protocols

Wireless Network Security

3559 words - 14 pages most importantly security features. These standards are currently in development, and will sit atop of existing ones delivering more robust performance Wireless LAN.?[5] The wireless market is expected to grow significantly over the next several years. As this growth occurs, solution providers will also be expected to address security concerns. [6] Components of a wireless network IEEE 802.11 wireless networks consist of the following

Network Security Concepts

1772 words - 7 pages Network Security Concepts File security falls into two categories, encryption and access. Access to files can mean physical access to a computer with unsecured files or access via user permissions or privileges in the form of access control lists (ACLs) (Strengthen Your Users' File Security, 2003). The files kept on a server with NTFS storage can be locked to prevent anyone who does not have the correct permissions from opening them. This


9689 words - 39 pages CHAPTER I: NETWORK SECURITY 1.1 Introduction With the spread of Hackers and Hacking incidents, the time has come, when not only system administrators of servers of big companies, but also people who connect to the Internet by dialing up into their ISP, have to worry about securing their system. It really does not make much difference whether you have a static IP or a dynamic one, if your system is connected to the Internet or an Ethernet

Similar Essays

Network Security Essay

1286 words - 5 pages Network Security Network security is a problem that network administrators face. It is something that network administrators should keep a careful eye on. For example, if the home network does not have any security measures in place, then the person is at a high risk of data loss due to hacking. Network security is something that businesses do not take very lightly because they want to protect their valuable information and network

Network Security Essay

1567 words - 6 pages Network Security 1. What is network security? Network security has changed significantly over the past years. There is more and more data to monitor and analyze in order to detect the activity of your data and systems. Securing a network has many variables. Password authentication, network access, patches, anti-virus protection, intrusion detection, firewall and network monitoring tools are just a few of the things you can do to

Network Security Essay

1735 words - 7 pages therefore can enter your computer or network and then get control and do its chosen form of damage, such as ruining the file allocation table on your hard disk. Sometimes a Trojan horse is disguised as a program that is supposed to find and destroy computer viruses, but instead introduces viruses onto your system (Barrett). With all these different types of threats, many security and defense programs have been developed to help fight these

Network Security Essay

2198 words - 9 pages Network Security You can think of network security as an insurance policy in a dangerous new world. In the good old days of centralized processing, is all you had to do was simply lock the computer room door and restrict entrance access. Those days are long gone in light of decentralized processing, the internet and vast communi-cation networks. Personal data and transaction security through networks is of paramount concern when