question archive O Nurses and physicians will be using laptop and tablet for data entry Some offices may incorporate limited medical scanning devices which will require high bandwidth and EM resistant media

O Nurses and physicians will be using laptop and tablet for data entry Some offices may incorporate limited medical scanning devices which will require high bandwidth and EM resistant media

Subject:Computer SciencePrice: Bought3

O Nurses and physicians will be using laptop and tablet for data entry Some offices may incorporate limited medical scanning devices which will require high bandwidth and EM resistant media. Imaging/Laboratories OO These are to be considered high bandwidth need departments There will need to be limited wireless use due to probable electromagnetic (EM) interference Pharmacy 0 Traditional and thin-client desktop units will be deployed for administrative needs Patients/Guests O Standard guest access to the hospital Wi-fi should be permitted in restricted areas such as the cafeteria, waiting rooms, and counseling centers on nursing floors. Patients would generally not have access to Wi-fi except in guest areas Security Review For the Part 1 overview, the discussion on security measures is a more general review of current security technologies and policies. Your general discussion should include some aspect of these topics as they relate to the needs for security in a medical environment: Antivirus protection - you need to consider things like central server updates and end point protection Automated patch management - not only end-user but servers and security devices such as firewalls and intrusion detection devices need to be keep up-to date Wireless network security - ease of use may be important but the risks will outweigh the advantages. Include a discussion of how access control and network- monitoring tools must be used to make sure that the network is not being exploited. This includes a review of the various networking protocols that can provide inherent encryption and password-protection point. Hardware review - Include a review of security hardware that could be implemented including: O Firewalls Proxy servers Virtual Private Networks Intrusion Detection Sensors and System Legal Issues

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE