Create network security for the organization that covers the whole of the organization
Outline and show in detail the susceptibilities and threats that the strategies you have devised will address.
Include protection for the physical and hardware feature of the network
Identifies areas that may be prone to attack and strengthen them.
Show the stages that will be followed to guarantees the safety of networking files and operating systems.
Show the actions that need to be taken to secure data being transferred from employees in remote areas.
Use the concepts acquired in the hands-on virtual labs.
Introduction.
Installation of a network at HealthCare Inc. is designed to allow for the sharing of information and communication by the people who may be in need of it. The confidentiality of hospital information like the patients’ records, should always be maintained. Because of this fundamental reason, the network should be built in a way that guarantees integrity and privacy is not compromised. Security safeguard should be installed to protect the sensitive information when installing the hospital network.
Risk and vulnerabilities.
Regarding security, the focus should be placed on the risk and susceptibility that the network is likely to encounter so that these risks can be addressed well in advance. Four categories that must be evaluated exists. To begin with, there will require a physical security check to address attacks to the hardware and software that is a result of access by unauthorized people. An example of this would be the introduction of malware to hardware and software using an infected USB device. If the infected USB is allowed to penetrate the compute, then the infection may be spread to the entire network.
The next step is to check the security of the operating system. This will involve putting control to ensure that software installation that is not authorized does not happen. Of importance also to check for spoof links to fish. If this is not identified, the network can be attacked silently without the knowledge of the people using it.
Finally, close attention should be paid when restoring the system after a failure, as this is a place where a threat can be easily obtained. System administration, privileges, software usage, and user right should also be closely monitored.
Security of physical Hardware/ data transfer.
Health Insurance Portability and Accountability Act has guidelines that must be adhered to when sharing information by the hospital through the network. HIPAA gives detailed guidelines on the standards that need to be met to protect sensitive patient data. One of the ways outlined is the encryption of data that is being transmitted. Different kind of transcription technology exists, some of the examples are Laptops and VPN, Website encryption, Email encryption, Application encryption, and wireless encryption.
One can send private messages using encryption through Email encryption. A link is sent that provides the key to access the information sent if the recipient is not on the same network. File Transfer Protocol (FTP) is a necessity when using a clearinghouse to process claims and remittances.
For website encryption, when transmitting encrypted data, Secure Socket Layer or SLL is used here. This mode prevents confidential information from being accessed by people outside of the network.
When it comes to the relaying of patient’s confidential data, these data, while being transmitted, should be encrypted. Depending on the application or software that a system is using, then suitable application encryption should be considered. Often times, this added software can be purchased from third party suppliers.
Since the provision of a wireless connection will be made, then it will be prudent to provide encryption to prevent attacks to the network from hackers. The device that will use wireless connection like laptops will also be encrypted to seal all areas that may be susceptible to attack while connected to the network. In addition to this, due to the portability of laptops and this making it ways to steal them, it will be important to put encryptions into these devices, so that in case of them being stolen. The data in them cannot be accessed or even read.
Should there be a need to use remote access, then a VPN will be installed into the devices to ensure that they are encrypted. The VPN works by encoding the data being shared between two people so that that data can only be decoded by the person using the same network and VPN. A good example is in the case of the use of a VPN where intranet can only be used when signed to one, and access will be denied if an attempt is made from a public computer without login.
Protection of Hardware.
It is important to protect hardware in a network. The starting point for this should be in the server room, where it should be built securely and access restricted to a few people that are authorized like the system administrator. The following guides should be instituted in the server rooms;
- The ceiling should not be less than 9 inches in height.
- The room should be big enough to allow for future growth and additional space for cooling units.
- The temperature should be regulated and maintained at 72 degrees Fahrenheit.
- An AC system should be installed to prevent the overheating of the equipment.
- The room should be made soundproof and without windows.
- To ensure movements in an out is restricted, a badge entry should be put to entry and alarm systems.
- Video cameras for surveillance.
- There should be alarms for warning against floods, and a system for prevention of fire should be put in place.
- A strict access policy for monitoring.
User Accessibility.
To protect sensitive data, only authorized personnel will be given access to enable them to complete their task. This will ensure the security of the system is guaranteed. Access information should be identifiable based on the job function, and the data one wants to access. To establish user behavior that may put the network at risk, it is important to monitor access of the users to the system, and the best way to accomplish this is to carry out an audit trail. Any external or internal abuse of the system will be easily picked by the system administrator or the security specialist.
One other policy with regard to access to the network would be to put a no sharing and group sign-on. The best way to go about it is to have everyone sing on practices and carrying out an authentication system with a password or a username.
Security Policies.
A checking balance within the existing policy must be instituted within the network. A use policy UAP that is acceptable must be put in place. The policy shows what is satisfactory in relation to incoming data, received data, and type of data being transmitted. UAP should address all spheres exhaustively, leaving no doubt about security risks that would necessitate the prohibition of some websites. Web browsing should only be done when necessary to keep the likely hood of attacks at a minimum. There should be a prohibition of sharing of user access data, and access should be allowed at a particular time to ensure that the network is not accessed during the normal by associates.
Summary.
The following is a summary of the policies that will need to be instituted to ensure safe and secure networks in hospitals.
- Guarantee a secure room for the servers that is closely monitored, as has been discussed.
- Hardware items such as routed should be encrypted to ensure data is filtered while being transmitted. WPA should never be switched off when wireless routers are installed.
- There should be strict enforcement of company standards regarding user access, and this should be monitored and audit trails done.
- Express approval should be sought for one to insert external devices like USB into computers.
- Fires both software and hardware should be accessed.