Identify what parts of the organization are affected by the problem and what benefits might be gained by the resolution of the problem.

Identify what parts of the organization are affected by the problem and what benefits might be gained by the resolution of the problem.

Project

by

Student Name

Abstract

This section should include a short summary of the issues addressed by the project, the approach used, the lessons learned, and recommendations. This section should be single spaced and not exceed one page in length.

i

Section 1

Introduction

1.1 Description of Organization (Template guide: Do not identify the name specific name of your organization)

Clearly and concisely describe the organization that is the focus of your paper. You should use an anonymous name for the organization and describe it as best as possible using at least the following attributes:

1.1.1 Evolution of the organization (history)

1.1.2 Core Functions

1.1.3 Enabling Technologies

1.2 Business Problem

Describe the business problem that is being faced or perceived by the organization you work for or are studying. Identify what parts of the organization are affected by the problem and what benefits might be gained by the resolution of the problem. Do not present solutions here; just describe what the problem is, its affects, and how a solution to it will improve the situation.

1.3 Supporting Research (Template guide: You must include a minimum of 3 sources)

In this section, present information about the extent to which this type of problem affects other companies. Determine whether this is perceived as a larger problem that affects companies providing similar products or services. Use the library or other online resourcesto determine if anything has been published that describes the problem or offers an understanding of how significant it is beyond the individual company you are investigating. Remember to cite your sources within your narrative and in your reference list!

Section 2

Impact

2.1 Organizational Impact

In this section discuss how the overall impact of the problem on this organization.

2.2 Key Stakeholders (Template guide: Identify roles of the organization affected by the problem – do not name the individuals)

In this section, describe the effects of the problem on the employees and/or customers. If there are financial or operational implications, discuss them here. This section may require you to interview someone in the organization that is directly affected by the problem, or someone who has been given responsibility to address the problem.

Section 3

Solutions

3.1 Potential Solutions (Template guide You may use a table to show how you evaluated your options)

There is usually more than one way to address a problem. However, the results and risks vary with each proposed solution. Investigate possible solutions by using the online library or interviewing people given the responsibility to resolve the problem. Describe as well as possible at least 2-3 different approaches to the problem. Remember to cite the sources of your information both within the narrative and the reference list, including interviews!

3.2 Previous Attempts to Solve Problem (if applicable)

In this section describe any previous attempts the organization has made to resolve this problem. Describe the success or failure of these attempts. Analyze why these attempts may have or have not worked. This section may require you to conduct interviews from different perspectives to get a true picture of what went right or wrong.

Section 4

Recommendations

4.1 Recommended Solution

In this section describe the solution you are proposing and the rationale you have from making this recommendation. If there is evidence of this solution being used to solve similar problems that you have found in articles, cite them here. Identify the resources needed to implement this solution (people, technology, financial).

4.2 Implementation Considerations

In this section describe how you think the implementation of solution will benefit the organization. Make sure you describe this in context of business measures (financial gain, employee productivity). If there is evidence from literature where the solution has provided specific benefits to similar organizations or in other contexts cite them here.

Section 5 (3 pages max)

Contribution from Coursework

5.1 Application of Learning

In this section identify courses within your program (I am going with technology and networking classes) that have had a direct impact on your ability to understand the problem and recommend the solution. If there were specific assignments within any course that helped you reach this recommendation, identify them and describe how that learning activity was relevant to this study.

5.2 Significance of Project

In this section describe how you have benefited from conducting this study. Describe any new learning that occurred and how you applied past learning. Discuss whether this experience has helped you focus on a career path, or has opened up any new employment opportunities for you.

5.3 Reflections

In this section, summarize your perspective by reflecting on this project experience and describe the lessons you learned during the process.

Section 6

Conclusions

6.1 Conclusions

In this section summarize your project and reflect on the importance of your recommendation with respect to resolving the identified problem. Discuss the implications with respect to the organization, products or services, or clients as a result of implementing the proposed solution.

References

SAMPLE:

Klimoski, R., & Palmer, S. (1993). The ADA and the hiring process in organizations. Consulting Psychology Journal: Practice and Research, 45(2), 10 – 36.

Klimoski, R., & Palmer, S. (1993b). The ADA and the hiring process in organizations. Consulting Psychology Journal: Practice and Research, 45(2), 10 – 36.

IoT SECURITY 2

How to Secure IoT Devices in XYZ Hospital

Student’s Name

Institutional Affiliation

Running head: IoT SECURITY 1

Abstract

XYZ hospital was established in 1995 and focuses on patient care, research, and education. Enabling technologies include remote healthcare monitoring, healthcare solutions using smart phones, ambient assisted living, and wearable devices. The problem faced by XYZ hospital is insecurity of IoT devices. The insecurity of IoT devices in the hospital compromises the confidentiality, integrity, and availability of information and information systems, which contribute to poor service delivery and financial losses. XYZ should impalement a radio frequency identification authentication protocol based on elliptic curve cryptography to eliminate vulnerabilities.

How to Secure IOT Devices in XYZ Hospital

Introduction

1.1 Description of the Organization

1.1.1 Evolution of the Organization

XYZ hospital was established in 1995 to provide healthcare services to residents. The hospital started with one doctor and three nurses who would provide health care services to residents from the local church. In 2005, the hospital was expanded when a facility was put up solely for providing healthcare services. The number of doctors increased to five while the number of nurses increased to twenty. Today, XYZ is a 500-bed hospital that focuses on improving the wellbeing residents.

1.1.2 Core Functions

The core functions of XYZ hospital include patient care, research, and education. The hospital offers highly specialized medical care, including serving patients referred from smaller clinics and hospitals. XYZ hospital researchers play a vital role in understanding disease processes, promoting best clinical practices, translating findings into clinical practice. The XYZ College of Science and Medicine was established in 2006 to offer educational programs embedded in the hospital’s clinical practice and biomedical research activities.

1.1.3 Enabling Technologies

Enabling technologies include remote healthcare monitoring, healthcare solutions using smart phones, ambient assisted living, and wearable devices. The four technologies make up the Internet of Health Things, which is an IoT-based solution made up of a network of architecture that connect patients to the healthcare facility (Rodrigues, Segundo, & Sabino, 2018).

1.2 Business Problem

The problem faced by XYZ hospital is insecurity of IoT devices. There is an increased rate at which connected devices in the hospital are hacked, which compromises system and information security. The fact that IoT devices are network-connected poses threats of attack and are vulnerable to physical attacks. The insecurity of IoT devices compromises confidentiality, integrity and availability, and affects all departments in the institution.

1.3 Supporting Research

The growing presence of IoT devices fosters new attack methods and surfaces for hackers to exploit, which poses serious privacy and security issues. Physical attacks, including side channel attacks that help in extracting the secret key from electronic devices are common in organizations (O’Neill, 2016). The increase in the use of IoT devices in healthcare contributes to security breaches, which threaten technology development in the field and financial loses when not addressed (Jeyanthi & Thandeeswaran, 2017). A 2015 study found that 68,000 medical systems were exposed online because the devices were connected to the internet through computers running very older versions of Windows XP (Chacko & Hayajneh, 2018).

Impact

2.1 Organizational Impact

The insecurity of IoT devices has adverse effects on XYZ hospital. The insecurity of IoT devices in the hospital compromises the confidentiality, integrity, and availability of information and information systems, which contribute to poor service delivery and financial losses. An attack on the enabling technologies, such as remote healthcare monitoring, healthcare solutions using smart phones, ambient assisted living, and wearable devices, which connect patients to the facility limits service delivery and results in financial losses in restoring the devices. This results in infectiveness and inefficiencies, which result in poor healthcare and patient outcomes.

2.2 Key Stakeholders

The insecurity of IoT devices in XYZ hospital affects most of the stakeholders, including customers, physicians, and employees in the IT department. An attack on IoT devices makes it difficult for healthcare consumers to contact the facility for healthcare services because of connectivity problems. This implies that patients do not get timely healthcare assistance, which negatively impacts their health. Physicians experience problems, such as delays in delivering healthcare services to clients because when the availability, confidentiality, and integrity of information are experienced. Constant attacks on IoT devices demotivate employees in the IT department.

Solutions

3.1 Potential Solutions

There are several potential solutions to the problem of insecurity of IoT devices in XYZ hospital. these include incorporating security measures into the design of IoT devices, including conducting a risk assessment before releasing the device in the market, ensuring that authentication is strictly adhered to and access to devices is limited, and implementing a defense in depth strategy to include several layers of security for protection against specific risks (Chacko & Hayajneh, 2018). Other potential solutions include putting in place proper access controls to limit unauthorized access to IoT devices and networks, testing the security of devices and monitoring security throughout the lifecycle, and establishing a culture of security where employees recognize vulnerabilities.

3.2 Previous Attempts to Solve the Problem

To promote the security of IoT devices, XYZ hospital implemented access controls and promoted a culture of security. Access controls limited unauthorized access to data, IoT devices, and networks, but hackers would still attack the devices. Promoting a culture of security where employees recognize threats to the security of IoT devices is less effective because most of the employees are not experts in IT.

Recommendation

XYZ should impalement a radio frequency identification authentication protocol based on elliptic curve cryptography to eliminate vulnerabilities. A shared key should be developed to encrypt the transmitted messages. The new protocol achieves various security properties, such as anonymity, mutual authentication, forward security, resistance of replay attack, and confidentiality (Dewangan & Mishra, 2018).

References

Chacko, A., & Hayajneh, T. (2018). Security and Privacy Issues with IoT in Healthcare. EAI Endorsed Transactions on Pervasive Health and Technology , 4 (14), 1-7.

Dewangan, K., & Mishra, M. (2018). A Review: Security of IOT Based Healthcare System. CCET Journal of Science and Engineering Education , 3, 25-28.

Jeyanthi, N., & Thandeeswaran, R. (2017). Security Breaches and Threat Prevention in the Internet of Things. Hershey, PA: IGI Global.

O’Neill, M. (2016). Insecurity by Design: Today’s IoT Device Security Problem. Engineering , 2, 48–49.

Rodrigues, J., Segundo, D., & Sabino, M. H. (2018). Enabling Technologies for the Internet of Health Things. EEE Access , 1 (1), 1-14.

Leave a Comment

Your email address will not be published. Required fields are marked *