Sample Paper on Cyber Security for Medical Devices & Hospital Networks

Cyber Security for Medical Devices and Hospital Networks

Project Rationale

The fundamental objective of this project is to deliver a comprehensive technique and methodology in securing the networks of hospitals and the electronic devices used in patient treatment. The project’s scope provides for ways of prevention strategies of network intrusions. However, the rise in cyber terrorism has brought significant damage to institutions that use electrical devices in giving their customers best services. These hacking activities are not limited to financial institutions but also hospitals that have transformed to online data management and patient care by use of electrical devices. The proposal on Cyber Security for Medical Devices and Hospital Networks gives a brief summary of the effects of cyber terrorism, and how to effectively manage and eliminate the threats posed by cyber thieves.

The project has created links with a significant number of legal and investigative institutions that are helpful in tackling the problems associated with cybercrime. These developed associations are essential in preparing counter-structures to be used in the case of any incidence of network disruptions. The project proposal has three sections that ensures accountability and workability of the services performed for this project. These sections are inclusive of research, legal and management departments. The integration of these crucial sectors of security management guarantees the safety of information and other persons that can be affected by hacking.

The proposal on cybersecurity is a project designed to have an integrated approach to tackling problems associated with data loss. The security criteria encompass development of new hardware and software besides using the existing programs in managing online data. The project is very critical in diverse areas of the economy as discussed below, and is a leeway for saving lives of persons that use electronic devices that are at risk of being comprised. The implementation and guidelines phases that involve standards, procedures, and guidelines are used in the creation of awareness to the staff on the importance of data security. Moreover, the security guidelines developed in the proposal creates awareness among the concerned parties thus preventing security breaches through social engineering.

Investment

The project gives an opportunity for investment in the production of several applications that are directed to securing hospitals, schools, and military networks. The competing stakeholders can unite in developing reliable softwares that are hard to compromise by hackers. This opportunity given by the project provides a constant cash flow to the company that invests in this field promoting business expansion. Notably, due to the high market demand for the cybersecurity equipment and installations, the project can pay back the amount of capital invested in its implementation within a reasonable period (Chen, Jarvis, & Macdonald, 2014).

Technical Evaluation

This security project gives the best alternative for the long-term development of any company that ventures in the production of the software and hardware. These security applications are always evolving, thus the production of latest software to prevent any incidence of a network attack is considered in this project (Chen, Jarvis, & Macdonald, 2014). The rationale for this project gives the opportunity to the investors to determine and undertake a software and hardware technology that is cost-effective and more advanced to other application offered by other competing companies. These applications are designed to prevent infringement of personal data and prevention of attack by malware to get access to various network sites of private institutions. The technical advantage of this project is supported by intensive research on gaps that are easily exploited by cyber thieves. The research undertaken gives the opportunity for upgrading of the security features accorded to these networks (Chen, Jarvis, & Macdonald, 2014). The data encryption technology that is highly recommended for use in various military and hospital systems serves to conceal and secure the real identity of the patient, hospital details, and staff that work in the company.

The project proposes the integration of application resources and their reorganization in readiness for preventing a future attack. Besides, academic scholars get the opportunity to improve on the software architecture, a factor that enhances the functionality and protection of the network system (Dawson, Leonard, & Rahim, 2014). The scholars get the opportunity in improving on the meta-programming of software that is critical in keeping the websites hack proof.

Business Expansion

The software and hardware architecture provides the production of products that offers a competitive edge in any market of cybersecurity. The integration of applications and software re-engineering that are encompassed in the software implementation phase opens opportunity for international markets for these products. An increase in the sales of these cyber security applications has the capacity of bringing a significant amount of funds that allows for the expansion and growth of small businesses (Dawson, Leonard, & Rahim, 2014). Furthermore, the production of new software products that the project allow due to new technologies developed by hackers offers best alternatives in cyber security improvements.

The inclusion of other government and non-governmental agencies in the fight against cyberterrorism opens new marketing strategies for investors in constructing new software and hardware research facilities (Dawson, Leonard, & Rahim, 2014). These alternative market strategies in the proposal, therefore, reduce the risks of market failure due to the malfunctioning of some application resulting from hacking.

System Analysis and Methodology

Current state of the project environment

Threats on stored online data have increased predominantly with some companies and institutions incapable of securing information on their networks (Pipyros, Mitrou, Gritzalis, & Apostolopoulos, p. 264, 2014). The project has proposed the development of various types of software and hardware for use in the prevention of network intrusion by unauthorized persons. Password protection and data encryption have been voiced for frequent use to avoid easy access by attackers. Currently, hospital systems use outdated programs and software with minimal security applications (Pipyros, Mitrou, Gritzalis, & Apostolopoulos, p. 265, 2014). These outdated programs offer little security to the critical information on patients and hospitals. Besides, the electrical devices used in these hospitals are easily accessed by staff that possesses passwords that are incapable of auto-updating, a factor that creates loopholes in the security system.

The software and hardware that are in current use do not offer a competing edge in the cyber security markets (Pipyros, Mitrou, Gritzalis, & Apostolopoulos, p. 266, 2014). These software applications lack the capability of giving an early warning and monitoring in case of safety breach. Moreover, system recovery of the network due to network disruptions by unscrupulous persons is ineffective given by the stretch of damage caused by the network. The factors of inefficiency in the use of weak passcodes, outdated software and hardware explain the need for a quick implementation of the recommendations made on the proposal on cybersecurity. Besides, these phenomena indicate the current environment of this project thus a need for project acceptance and financing to curb these rising cases. The current environment put patients’, doctors and all persons that their information can be compromised by hackers at risk due to the present weak security apparatus.

The direction of new threats is currently being overlooked by the security organizers. To curb these menaces, a methodology has been developed for reducing the risk factors associated with hacking of the network systems and to put a mechanism of reducing a loss of patients’ medical information.

The use of Attack Methodology for analyzing (AMA) the computer and network sites has been proposed. The AMA tool accurately evaluates any threat to the grid system by identifying the vulnerable areas that can be used by hackers for infringement (Pipyros, Mitrou, Gritzalis, & Apostolopoulos, p. 267, 2014. The dynamic and flexibility nature of this method is critical in identifying new technology and adversary that can be used by cyber terrorists to attack the computer system. This baseline tool provides for a counter-attack mechanism and offers preventive measures to be used by security personnel in reducing the effects of the attacks.

Consequently, AMA analyzes the loopholes in the defense technique and the susceptibility of the general system (Pipyros, Mitrou, Gritzalis, & Apostolopoulos, p. 268, 2014). The threat is then evaluated by comparing the level of exposure of the computer system to the value it achieves in the network. Therefore, network threat is determined as shown below:

Threat = level of susceptibility + system value

The AMA methodology makes it possible to learn about network system architecture through sourcing of open information thereby blocking all the points hackers can use in stealing medical data.

 

Gap analysis

The use of Gap analysis in directing network defenses is another methodology that can be employed in the hospital network system in securing the medical information and electronics (Pipyros, Mitrou, Gritzalis, & Apostolopoulos, p. 268, 2014). The gap analysis identifies those threats that are capable of penetrating the network security system. Defensive options, therefore, are implemented to reduce the rate of malware penetration that is commonly used by cyber terrorists in compromising most financial and medical sites (Pipyros, Mitrou, Gritzalis, & Apostolopoulos, p. 269, 2014). This system integrates the use of powerful anti-virus that monitors spyware, malware, and other IT tools that can disrupt the running of a network system. Consequently, the application of this methodology in the network system secures it for more than five years. This time frame and the inflexible nature of the method is very critical in averting the new technological threats posed by hackers to any computer and network system.

Structured System and Design Methodology (SSADM)

SSADM system improves the effectiveness of the network system due to its user-friendly component (Pipyros, Mitrou, Gritzalis, & Apostolopoulos, p. 270, 2014). The system can store information that passes through it hence can be used efficiently in restructuring and recovery of any network system. SSADM allows for quick analysis of the system and readily shows any forms of susceptibility that can be compromised by hackers (Pipyros, Mitrou, Gritzalis, & Apostolopoulos, p. 270, 2014). The system is used by less computer literate staff and any business operations thus making it possible for proper use of talents and teaching by staff.

Conclusion

The project on Cybersecurity on Medical Devices and Hospital Networks offers solutions to the threats posed by hacktivists by giving various recommendations on countering cyber threats. The implementation of the proposal by the affected stakeholders provides an assurance of the safety of individuals that store their private information electronically. In addition, the methodologies discussed in this project provide the counter-attack mechanisms to the consequences arising from the effects of cyber terrorism.

The execution of the proposal is substantially affected by the level and effects of the network disruptions, a factor that calls for quick defensive strategies in the IT sector. The use of strong passwords, up-to-date software and hardware are among the security strategies that can prevent the network system from being compromised. Protection of the network system and development of advanced software system are among the business opportunities that can be exploited by companies in the field of information technology. Vehemently, the fight against cyber terrorism requires an integrated approach to all stakeholders for pumping of all resources necessary for the elimination of the cyber threat

References

Chen, T., Jarvis, L., & Macdonald, S. (Eds.). (2014). Cyberterrorism: Understanding, Assessment, and Response. Springer.

Dawson, M., Leonard, B., & Rahim, E. (2014). Advances in Technology Project Management: Review of Open Source. Technology, Innovation, and Enterprise Transformation, 313.

Pipyros, K., Mitrou, L., Gritzalis, D., & Apostolopoulos, T. (2014, March). A cyber-attack evaluation methodology. In Proc. of the 13th European Conference on Cyber Warfare and Security (pp. 264-270).