tailieunhanh - Wired Network Security: Hospital Best Practices
If we lived in a static world, developing effective solutions for known attacks might be achievable over time. However, in today's complex cyber business environment, there is no static state. Too often, attackers are ahead of the curve, continually innovating effective attack strategies and schemes, while security professionals and enterprise IT continue to struggle to keep pace with malicious developments. Today's enterprise threat environment has evolved and exploded into an assortment of blended attack vectors that effectively work in concert to breach existing security defenses. Because intruders are stealthy, they are able to take advantage of gaps in security to. | Wired Network Security 1 Running Head Wired Network Security Hospital Best Practices Wired Network Security Hospital Best Practices Jody Barnes East Carolina University Wired Network Security 2 Abstract With an ever increasing amount of information in hospitals transmitted electronically it is important that security be considered in every phase of network design and maintenance. Although much emphasis has been placed on such things as wireless networks and remote access it is imperative that the core network not be overlooked. Because the wired network is the nervous system of a hospital s Information Systems great care must be taken to properly secure it. Also with legislation such as the Health Insurance Portability and Accountability Act HIPAA requiring security measures in healthcare environments securing the network infrastructure has become mandatory to ensure compliance. This paper begins by looking at HIPAA and it s implications for the wired network infrastructure security. A look is then taken at an organizations first line of defense perimeter security. Although many think that as long as the perimeter is secure the job is done perimeter security is only a small piece of overall security. Next network segmentation and traffic isolation will be discussed. By using segmentation and isolation there is the increased opportunity for security boundaries. Another concept that will be discussed is the security of the network equipment. The network is only functional if the core equipment is operational so securing equipment is an important part of any security strategy. To conclude restriction of network access will be investigated and an organizational approach will be discussed. Because more and more users need access to network resources there must be a way to identify and restrict who is allowed on the network and what access they are granted. In wired network infrastructure security hospitals must remember they are only as secure as their weakest point. By
đang nạp các trang xem trước