• Required bandwidth to support the application even at peak usages
• Secure connections all the time with proper and regular updates and patches
• Good reliable and performance guaranteed all the time
• Good precision is provided which is having a growing importance across all fields
• Support for a variety of devices ranging from mobiles to computers
2.Do some Internet research on the security implications of HIPPA requirements for hospital networks. Discuss the major types of security mechanisms that must be in place to ensure hospital compliance with HIPPA requirements.
Administrative Safeguards
Implementation of Wi-Fi under HIPAA requires you look at all sections of the Security Rule. This includes looking at the administrative safeguards of risk assessment, risk management, and the policies and procedures governing use.
There are three crucial steps that need to be taken to work toward HIPAA Compliance with the HIPAA Security Rule:
1. Perform a Risk Analysis: A risk analysis forms the basis for your organization’s ongoing risk management.
You will identify your organization’s deficiencies and establish a framework to
Develop appropriate security measures.
2. Select a Security Officer this seems like a simple mandate, but the person designated must participate in the risk analysis and be involved in all the ongoing security management.
3. Develop or Update Policies and Procedures As part of your organization’s risk analysis, include another column for evaluating your current policies and procedures. The gaps discovered with this review will fit into your plan to complete your HIPAA security work.
Wireless LANs (WLAN) is subject to several methods of DOS. An attacker can create a device that produces noise at 2.4 GHz effectively jamming the band. A rogue access point could broadcast a false SSID luring Wi-Fi clients into associating incorrectly and then monitor or save all traffic from the hapless client. An attacker could associate with an access point and then send floods of traffic such as an ICMP flood to overwhelm the wireless network
Man-in-the-Middle-Attacks (MITM) can consist of either eavesdropping attacks where an attacker listens in on the wireless network and collects data or eavesdropping plus manipulation of the data.
Illicit use occurs when an attacker uses the wireless network to connect to other networks such as the Internet. Uses of an illicit wireless connection include sending spam, hacking local servers, hacking other networks or just defying onerous network rules.
Theft or loss of wireless portable devices could result in compromise of patient data on the device. Saved passwords and encryption keys could allow unauthorized access into the network and applications.
3.Do some Internet research on the use of VLANs in hospitals. Summarize the benefits of using VLANs in hospitals and identify examples of how St. Luke’s could further enhance its wireless network by implementing VLANs.
Using VLANs in hospitals has many advantages. Usage of VLANs can make the whole system functionality easier. With the ever-growing size of hospitals, staff, patients and the treatments it is always useful to have access to Internet. Using VLANs also can give the managements advantages like:
• Performance improvements
• Making maintenance easy
• Increased security
As discussed in St. Luke’s case study, more usage of networks for running things also increases the chances of data being hacked or altered. This could also lead to severe damages. So, using VLANs also increases the security along with reducing the maintenance that needs to be spent on networks. Using VLANs also drastically reduces downtime. With having more reach to the networks the quality of treatments can be notably increased as there is so much data regarding science that is handy over the web.
References
https://www.giac.org/paper/gsec/3214/implementing-hipaa-compliant-wireless-network/105333
https://www.massmed.org/Physicians/Legal-and-Regulatory/HIPAA—Basic-Elements-for-Compliance-with-the-Security-Regulations-(pdf)/
e…