Prepared by: Dr Wanod Kumar XXXXXXXXXXModerated by: Dr Tony Jan August, 2018 Assessment Details and Submission Guidelines Trimester 2, 2018 Unit Code MN502 Unit Title Overview of Network Security...

1 answer below »
Hi, I need this assignment by 28th September and the marking criteria is in the attached file. Thanks.


Prepared by: Dr Wanod Kumar Moderated by: Dr Tony Jan August, 2018 Assessment Details and Submission Guidelines Trimester 2, 2018 Unit Code MN502 Unit Title Overview of Network Security Assessment Type Individual Assignment (Assignment Two) Assessment Title Security Challenges in Emerging Networks Purpose of the assessment (with ULO Mapping) The purpose of this assignment is to develop skills to independently think of innovation. Students will be able to complete the following ULOs: c. Explain the major methodologies for secure networks and what threats they address; d. Identify and report network threats, select and implement appropriate countermeasures for network security. Weight 20% Total Marks 60 Word limit 1500 - 2000 Due Date 11:55PM, Friday 28/09/2018 Submission Guidelines  All work must be submitted on Moodle by the due date along with a title Page.  The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings.  Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Extension  If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School's Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/specialconsiderationdeferment Academic Misconduct  Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy- Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description. http://www.mit.edu.au/about http://www.mit.edu.au/about http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure Unit Code: MN502 Unit Name: Overview of Network Security Page#2 of 4 Prepared by: Dr Wanod Kumar Moderated by: Dr Tony Jan August, 2018 Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging network-based applications, and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue. The use of network technologies is rapidly growing in healthcare sector. Now, healthcare is considered as one of the emerging application of network-based applications. Different network scenarios using wireless, wired, and mobile communications can provide efficient solutions to access electronic medical records (EMRs), medical management systems, imaging, biomedical information, material management, patient accounting, admitting information, and online claims submissions. Today, healthcare systems can combine these tools into one network-based infrastructure to more effectively communicate and collaborate, reduce errors, and improve patient care and efficiency. As healthcare providers adopt new technologies, they also face new security threats. Hackers, malicious software (malware), disgruntled employees, and human error present real dangers to healthcare networks [1]. Security of healthcare networks is a prime concern in today’s World. This assignment includes four parts 1. Literature review on Healthcare Networks. The literature review should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art. Your discussion should include: i. Healthcare network architecture (consider networking devices such as routers, switches, firewalls, servers etc.) ii. Recent developments in healthcare networks iii. The importance of security in healthcare networks 2. Analyse critically, three current or possible future potential security issues in Healthcare Networks. In this section you will analyse critically, three security issues in Healthcare Networks. These issues should be taken from the current state of the art literature. This section must be supported by at least three (3) references. 3. Propose a possible solution for one of the threats identified in section-2. In this part you need to choose one of the issues identified in the previous section and propose a possible solution to the particular security issue. 4. Create a 3 - 5 minutes presentation and present your work during the Lab. You have to create a 3 - 5 minutes presentation to present your work in front of your class fellows and tutor during the Lab in Week 11. Unit Code: MN502 Unit Name: Overview of Network Security Page#3 of 4 Prepared by: Dr Wanod Kumar Moderated by: Dr Tony Jan August, 2018 [1] Cisco Healthcare Security Perspectives: Protect Your Patients, Your Practice, Yourself. [Online]. Available: https://www.cisco.com/c/dam/global/en_ca/solutions/strategy/healthcare/assets/docs/health _security_impgd.pdf, accessed July 25, 2018. Submission Guidelines The assignment should be submitted on the Moodle in two separate files: 1. The report should be submitted as a Word file 2. The presentation should be submitted as a PPT file Marking criteria: Section to be included in the report Description of the section Marks Introduction Introduction of Healthcare Networks. Introduction should also discusses the report outline. 5 Literature Review Literature review of Healthcare Networks  Healthcare network architecture (consider networking devices such routers, switches, firewalls, servers etc.)  Recent developments in healthcare networks  The importance of security in healthcare networks 15 Analyse Critically Analyse critically, three potential security issues in Healthcare Networks. 12 Threat Mitigation Technique Discuss in detail a threat mitigation technique for one of the security threat 10 Report layout The report layout should be appropriate (following the submission guidelines and containing all the sections mentioned above) 3 Reference Style Follow IEEE reference style 5 Presentation Slides The presentation slides should be well organised and clear. 5 Oral Presentation Delivery of the presentation (quality of the presentation, depth of knowledge on the material presented and ability to answer questions asked by the audience) 5 Total 60 https://www.cisco.com/c/dam/global/en_ca/solutions/strategy/healthcare/assets/docs/health_security_impgd.pdf https://www.cisco.com/c/dam/global/en_ca/solutions/strategy/healthcare/assets/docs/health_security_impgd.pdf Unit Code: MN502 Unit Name: Overview of Network Security Page#4 of 4 Prepared by: Dr Wanod Kumar Moderated by: Dr Tony Jan August, 2018 Marking Rubric for Assignment #2: Total Marks 60 Grade Mark HD 80% D 70%-79% CR 60%-69% P 50%-59% Fail<50% excellent very good good satisfactory unsatisfactory introduction /5 introduction is very well written and the report outline is also discussed introduction is well written and the report outline is also discussed introduction is generally presented along with the report outline introduction is presented briefly and is missing the report outline poor introduction with irrelevant details literature review /15 excellent literature review with proper referencing well written literature review presented with correct references good literature review presented with references brief literature review with proper referencing poorly written literature review analyse critically /12 exceptional discussion on security issues in healthcare networks. identifying highly sophisticated and well referenced vulnerabilities exceptional discussion on security issues in healthcare networks. good discussion on three security issues discussion on two security issues unable to identify security issues threat mitigation technique /10 a very clear and in-depth discussion about threat mitigation technique very clear discussion about threat mitigation technique generally good discussion threat mitigation technique brief discussion about threat mitigation technique poor discussion about threat mitigation technique with irrelevant information report layout /3 well-designed layout and proper formatting following the submission guidelines and containing all the sections well-designed layout following the submission guidelines and containing all the sections good layout following the submission guidelines and containing all the sections report layout following the submission guidelines and missing some sections report lacks a proper layout reference style /5 clear styles with excellent source of references clear referencing style generally good referencing style sometimes clear referencing style lacks consistency with many errors presentation slides /5 well organised and resourceful organised and resourceful resourceful but could be better organised resourceful slides neither resourceful nor well organised oral presentation /5 good delivery, easy to follow and good interaction delivered, easy to follow and provided a level of interaction delivered and provided a level of interaction delivered no oral presentation excellent="" very="" good="" good="" satisfactory="" unsatisfactory="" introduction="" 5="" introduction="" is="" very="" well="" written="" and="" the="" report="" outline="" is="" also="" discussed="" introduction="" is="" well="" written="" and="" the="" report="" outline="" is="" also="" discussed="" introduction="" is="" generally="" presented="" along="" with="" the="" report="" outline="" introduction="" is="" presented="" briefly="" and="" is="" missing="" the="" report="" outline="" poor="" introduction="" with="" irrelevant="" details="" literature="" review="" 15="" excellent="" literature="" review="" with="" proper="" referencing="" well="" written="" literature="" review="" presented="" with="" correct="" references="" good="" literature="" review="" presented="" with="" references="" brief="" literature="" review="" with="" proper="" referencing="" poorly="" written="" literature="" review="" analyse="" critically="" 12="" exceptional="" discussion="" on="" security="" issues="" in="" healthcare="" networks.="" identifying="" highly="" sophisticated="" and="" well="" referenced="" vulnerabilities="" exceptional="" discussion="" on="" security="" issues="" in="" healthcare="" networks.="" good="" discussion="" on="" three="" security="" issues="" discussion="" on="" two="" security="" issues="" unable="" to="" identify="" security="" issues="" threat="" mitigation="" technique="" 10="" a="" very="" clear="" and="" in-depth="" discussion="" about="" threat="" mitigation="" technique="" very="" clear="" discussion="" about="" threat="" mitigation="" technique="" generally="" good="" discussion="" threat="" mitigation="" technique="" brief="" discussion="" about="" threat="" mitigation="" technique="" poor="" discussion="" about="" threat="" mitigation="" technique="" with="" irrelevant="" information="" report="" layout="" 3="" well-designed="" layout="" and="" proper="" formatting="" following="" the="" submission="" guidelines="" and="" containing="" all="" the="" sections="" well-designed="" layout="" following="" the="" submission="" guidelines="" and="" containing="" all="" the="" sections="" good="" layout="" following="" the="" submission="" guidelines="" and="" containing="" all="" the="" sections="" report="" layout="" following="" the="" submission="" guidelines="" and="" missing="" some="" sections="" report="" lacks="" a="" proper="" layout="" reference="" style="" 5="" clear="" styles="" with="" excellent="" source="" of="" references="" clear="" referencing="" style="" generally="" good="" referencing="" style="" sometimes="" clear="" referencing="" style="" lacks="" consistency="" with="" many="" errors="" presentation="" slides="" 5="" well="" organised="" and="" resourceful="" organised="" and="" resourceful="" resourceful="" but="" could="" be="" better="" organised="" resourceful="" slides="" neither="" resourceful="" nor="" well="" organised="" oral="" presentation="" 5="" good="" delivery,="" easy="" to="" follow="" and="" good="" interaction="" delivered,="" easy="" to="" follow="" and="" provided="" a="" level="" of="" interaction="" delivered="" and="" provided="" a="" level="" of="" interaction="" delivered="" no="" oral="">
Answered Same DaySep 25, 2020MN502

Answer To: Prepared by: Dr Wanod Kumar XXXXXXXXXXModerated by: Dr Tony Jan August, 2018 Assessment Details and...

Ankit answered on Sep 28 2020
144 Votes
Student Id    
                    Student Name
                    Security Challenges in Emerging Networks
Abstract
There is rapid growth in healthcare technologies. Security is vital for healthcare organization and if not inferred appropriately it might have a major effect on its general working network of healthcare. Healthcare is now regarded a
s one of the emerging application of network-based applications. Today healthcare organization adopts network applications and software so data of patient and doctors must always safe and private. The purpose of this literature review is to describe following:
· To address recent developments in healthcare networks
· To discuss security in healthcare network
· To discuss healthcare network architecture
This paper discuses current or future security issues in healthcare network and also recommends security solution to this security issues.
Keywords
Healthcare technologies, healthcare network, healthcare, healthcare security, healthcare systems
Introduction
As innovation keeps on creating and directions move toward electronic data saving in healthcare as innovation is winding up progressively imperative in this domain. With this development comes the requirement for healthcare staff who can oversee technology of healthcare and healthcare network or information system. The two most important things in healthcare network system is hardware and software which aids medical or hospital staff to collect, save, maintain and secure the electronic data. So things to study in this document are to healthcare network architecture or technology and security issues in healthcare network.
The purpose of this literature review is to describe following:
· To address recent developments in healthcare networks
· To discuss security in healthcare network
· To discuss healthcare network architecture
This paper discuses current or future security issues in healthcare network and also recommends security solution to this security issues.
Literature review on Healthcare Networks
Healthcare network architecture
During network architectures design, there must be evaluation of each field of healthcare network by service providers in order to measure potential vulnerabilities or issues and develop security measures. The network architecture of any healthcare network consists of networking devices such routers, switches, firewalls, servers etc as explained below:
Firewall
“Firewall is a program that acts as interface between a local network and the Internet and filters traffic that might be dangerous.” The purpose of Firewall program is to stop and permit activity through while IDS/IPS distinguish and take a gander at that movement in close detail to check whether it is a threat. IDS/IPS frameworks are developed of sensors, analyzers and graphical UI with a specific end goal to do play out their work. [6]
Router
A router is a device which examined data packets transmitted within networks. The connectivity of router is with at least two networks that consist either of two LANs, WANs or a LAN and its ISP's network. Routers are placed at gateways which is the locations where one or more networks connect. A router requires headers and forwarding tables to...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here