The Dangers Of Network Security

Improved Essays
A network allows computers to exchange data. In computer networks, devices exchange data using a data link. The connections are made using cable or wireless connection. Maintaining network security throughout an organization can be quite challenging and is indeed a tough job, but it is attainable and can be achieved. Network security is all about keeping the network safe for all devices and computers on the system. There are certain measures and skills needed to keep a network safe. There are several people and illegal groups whose aim is to compromise network systems. The hackers or attackers themselves have a lot of procedures they use to compromise networks and cover up their mess in order for the network crime to go undetected. So not only …show more content…
To secure servers, all unnecessary services and resources have to be disable and removed. The more software running on an operation system, the more ports are open [3]. This creates passages for attacks to occur. Least privileges should assigned to any network service. It should also be assigned to any random user that needs to access the hospitals website and database. All of the hospitals log files should be checked and saved in a separate and safe database. The log files give good detail of an attack or an attack attempt, if any. If anything suspicious is noted on the hospitals’ log files, an investigation should commence immediately. All application extensions and unused modules should be disabled and removed. When dealing with servers, a very good thing to do is to scan the server. This is a detection method that helps and aims to keep the hospital’s network safe from any suspicious activity. There are also web servers and file …show more content…
The hospital possesses multiple file servers which store very valuable information. There are some steps that can be taken to harden and keep these servers safe from any form of unauthorized access. The file server needs to be physically secure and all drives need to be encrypted. BitLocker can be used to encrypt the drives in the hospital [6]. It makes sure that files are secure even if they were stolen and confidentiality of patients and staff of the hospital are safe. The file server should not be on the internet often either. A firewall can be used to restrict access from outside the LAN. The file sever should constantly be updated and an active antivirus should be installed. It is important that the hospital stops the use of all unnecessary services and software. File access needs to be controlled and logged such that every use of the file server is known and any suspicious traits can be traced. Auditing should be set up which will monitor who reads, write and delete files. To this, in a folders properties, the security tab is clicked and “Auditing” under the advanced options is enabled. The mechanism of least privileges can also be used for file

Related Documents

  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Describe 3 ways a hacker can try to intrude a system. To protect from unwanted intrusion, viruses or hacking, we should consider the following points: Antivirus protection: This program scans our computer from any miscellaneous files or viruses and delete them or to move to quarantine. There are lot of antivirus available in market. Move rover most of ISPs also provide antivirus.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Here are some basic requirement to have a company network that can be fast and reliable I would like to have some time to talk to your IT manager to know where we are, and know the needs. Your IT manager might have most of this suggestion deployed already, in that case this can be used as a check list I will try to help as much as possible and I will be open to do any configuration of any device when you need me to ( I can do that from here) 1. The size of the company needs to be taken in consideration as well as the potential grown ( for space requirements)…

    • 485 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Abstract: With a specific end goal to outline and fabricate the secured network system, numerous elements must be thought seriously about, for example, the topology and position of hosts inside of the system, the determination of equipment and programming innovations, what's more, the cautious arrangement of every part. My paper will be an examination of the issues percentage in outlining a safe Local Area Network (LAN) and a best's portion practices proposed by security specialists. I will examine securing a LAN from network's perspective. [1] Introduction: With most complex innovations, there's not one size-fits-all arrangement regarding the matter of network administration. The needs and assets of every one of a kind association will relate…

    • 877 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    To combat these concerns, the team focused on four different controls. Insider Attack: The setting on the firewalls was set to maximum. The setting allowed the network reject, block, or deny potentially malicious payloads that would allow access. Authentication, RBAC, IDPS, and firewalls were used in conjunction to reduce insider threat opportunities. Additionally, these systems notified network administrators of any foreign presence within the boundary.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Opening Statement Written policies provide a means of security within organization. It establishes the regulations that all faculty must adhere to in order to protect important company and client information. The organizational policies should be read by and signed by each employee as a consensus that all regulations will be followed once joining the organization. And, for those who are current employees, to keep abreast of any amendments made to current policy, so that all employees are in compliance. These policies should be kept in an accessible place for everyone to read, so no one will be left out of the loop.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Wyoming Medical Center, Los Angeles County, and Raymond James all share similar struggles with how to secure the network, computers and mobile devices. Control and security are a concern from both inside and outside of the facilities and organizations. Each organization deployed a multi-level/tier approach was needed to protect the data. The Novell ZenWorks agents are used to manage the operating systems and software that is installed on the desktops/workstations; it allows the information technology group to customize the software for installation and patch management.…

    • 302 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Remote access to the UHS FUSION/Cerner Millennium Application Portal is available with the use of Citrix Web-Plugin once the user requests access through the Information Technology department. All passwords created to access the portal, which expires every 90 days, must be strong passwords in order maintain secure and protection from unauthorized access, as well as confidentiality. Since electronic health records are easier to access, making them also easer to exploit, access to patient information is based on criteria that is relevant to an individual’s position. As an additional measure of security, an Information Technology Security Officer conducts audits to the computer system’s activity at Summerlin Hospital Medical Center to check for any signs of abuse of the security policy. Other improved patient information security measures have been bar code technology in order to verify the medication and dosage, as well as warnings that alert healthcare providers about allergies and…

    • 1863 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    In the profession of IT a key component in your job will be looking after networks keeping them operational (for the users whom use the network), safe (clean out any corrupt files, check security measures, look for a virus. Etc…) and secure (making sure only authorise users are accessing the network). But first what is a network in a general meaning? A network consists of two or more computers that are connected in order to share resources (such as printers), exchange files, or electronically communicate. The computers on a network can be linked through various ways such as cables, telephone lines, radio waves, satellites, or infrared light beams.…

    • 673 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    In the case of a static residential gateway or home personal computer implementation, the personal server may be connected directly to a broadband Internet connection. The patient authentication information is carried by the personal server and is configured with IP address or domain name of the medical server so that it can access services over the World Wide Web. The PS schedules upload of health monitoring session files and data at periodic intervals or defers transmission in the event an Internet connection is unavailable [46]. In such cases, the personal server may be unable to propagate indicators of serious changes in health status. Because processing is performed on the personal server and on sensor nodes, the system should be capable of recognizing abnormalities and alerting the user to potential threatening physiological conditions.…

    • 683 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    EHR And PMS Analysis

    • 312 Words
    • 2 Pages

    EHR and PMS Electronic medical record and medical practice management software are both important in a medical office. Their demand is based on what is the medical office needs. Medical practice management software deals with the day-to-day operations of a medical practice. The risk of using this is when they need to use the server to share data and everyone can work. There can be a security risk by doing it.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Happy Hospital Case Study

    • 1226 Words
    • 5 Pages

    But the messengers does not have enough to send the medical records from department the other department. So the Happy Healthy Hospital board have a questionnaires to asked with the patients, it showed the patients use more time to waiting the process of seeing a doctor until receiving drug were completed. Although Happy Healthy Hospital used the IT system or any technology but it is not enough for all process of the Hospital because of Happy Healthy Hospital uses IT only in some department for instance Outpatient Department, Inpatient Department, Internal Medicine Department, Finance and Pharmacy. Although Happy Healthy Hospital have a IT depatment worked about network, developed application same as the other comapanies but IT system does not applied to all department in the hospital for now. The records for each patient,The Happy Healthy Hospital keep the data on the paper-based only.…

    • 1226 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    HIPAA Code Of Privacy

    • 1119 Words
    • 5 Pages

    Computer with patient information on them should also be put in a place where patients and visitors could not view them. This meant the doctors’ offices needed to place their computers in a secured location away from other patients and or visitors. If a computer was going to be used in a public place where other might be able to see. Then a 3M privacy screen should be used in order to keep other patients and or visitors from seeing what might be on the screen at any giving…

    • 1119 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Access the healthcare information you need using only your own user ID and password. * Sign off a workstation whenever you leave it when it has medical information on it. * Do not write down any passwords or post passwords near the computer for logins. *…

    • 1016 Words
    • 5 Pages
    Improved Essays