Sample Essay on Cyber Security for Medical Devices and Hospital Networks

Cyber Security for Medical Devices and Hospital Networks

Due to the increased use of technological devices in hospitals, there have been a lot of concerns raised regarding the security issues of the network systems. This is not only a problem to the health sector but also to the business world where people have lost crucial information to unscrupulous individuals who take advantage of unprotected networks to deprive unaware people off their privacy. This is why hospitals have to implant some of the infrastructures to cater for the security wellbeing of the patients as well as the entire hospital. The project aims at protecting hospitals networks from attacks from hackers and unauthorized persons.

From July 1 to July 15: Design and development

The projects involve a number of parties expected to make adjustments in order to promote security of the devices. Installation of software to the system that will detect the user’s personality is deemed to take a period of six days. This is because the system operation needs to be reevaluated with the installation of the new software consecutively taking place. Downloading new files and documents from emails and internet will require authorization from the program coordinator if the source is unrecognized. In order to use the devices, one will be required to sign in with authorized user name and password. Only authorized personnel will access and operate the devices. This will enhance the security as well as the instillation of responsibility upon the users.

From July 16- august 1: Goals and Objectives for Manufactioners

The installation of the firewalls in the organization that will take a period of six days will commence after the installation of new and advanced software. This wall helps to control networks traffic in the sense that it prevents unauthorized incoming networks from connecting to the institutions network. In addition, it helps detect unauthorized users and prevent them from accessing the organization’s network. This program may take approximately six days to be fully installed and work to meet the expected standards. Moreover, hospital employees need to be informed about the new structural development and measures to undertake when using the infrastructure to enhance privacy. This goes hand in hand with the installation of Mobile Technology to enhance the Voice Mail Answering and Beeper Service in Hospital Settings. It will facilitate communication between workers in the premises. This action creates efficiency and effectiveness of service delivery by the stakeholders through timely consultation and feedback management.

From Aurgust1-Aurgust 15: Goals and Objectives for Health Care Facilities

Monitoring for the usage of companies data will be done through the administration of a procedural authorization setup to the hospitals network. By doing this, all the user will follow a particular path authorized by the regulator. In case of any irregularities or suspicious dealings, the system will alert the regulator/administrator who will intervene and disable the transaction. Here, hospitals are required to establish a control panel that will monitor all the activities. This process needs at least two weeks to be fully established. Constant evaluating and checking of the devices should be left to the manufacturers so that they can operate at the highest efficiency level.

Project Outcomes and Deliverables

There are numerous advantages of having a protected network; they includes the following. One is that the company will reduce the number of attacks from outside and unauthorized networks that expose confidential information to unwarranted people who misuse it for selfish interests. Another advantage is that the cost of operation is reduced by a great deal due to reduced cases of fraudulent cyber attacks.

From august 16-september1: Implementation and Evaluation    

The project is deemed to cost the hospital a total of $200,000 in terms of acquiring new software and training all the employees. Employee training will commence prior to the inception of the new system so that they are familiar with the demand of the system. This is a positive move towards safety measures implementation and operation of the initiative meant to change the way business is conducted by all the stakeholders. The implementation will be in three phases.

From 1 September to 12 September: The first phase involves the replacement of old software with the new software that is more advanced and keeps on updating data from time to time. The process will take two to three week to be implemented by technicians helped by the manufacturing company.

From 13 September to 20 September: The second phase involves the inception and establishment of a control panel by the hospital management. These are computer design experts trusted to undertake protective measures as well as monitor all the activities carried out by the organization staff members. One week will be enough for these activities to be through.

From 20 September to 1 October: The third phase incorporates the process of software development to host the user identification procedures that asks for user ID, password and department or category of job group. It keeps off the intruders from accessing the system in the sense that they are unfamiliar with the working of the new system. This is the final stage in the implementation of changes thus need to be taken with a lot of care. It takes a maximum of one month to be fully functional depending on the size of the institution.