StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Dental Office Network Systems - Case Study Example

Cite this document
Summary
The author of this paper "Dental Office Network Systems" will examine network solutions relevant to the dental practice entity provided in the case study, highlighting the requirements, network solutions, and risks associated with the proposed network solution…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.9% of users find it useful
Dental Office Network Systems
Read Text Preview

Extract of sample "Dental Office Network Systems"

? Dental Office Network Systems Dental Office Network Systems The dramatic changes occurring in the technological environment posesubstantial challenges to business entities. Business entities continue to encounter the problem of finding the right network solution to cater for several business locations, whether stationary or mobile. This paper will examine network solutions relevant to the dental practice entity provided in the case study, highlighting the requirements, network solutions, and risks associated with the proposed network solution. Requirements and Network Solutions Perhaps the greatest requirement for the dental practice is the provision of extra bandwidth to cater for both the stationary and mobile dentists visiting senior citizens homes and elementary schools. This requirement can be met by advancing the firm’s Ethernet solutions to Gigabit Ethernet. This strategy will improve the firm’s Internet access speed rather substantially since Gigabit Ethernet endows higher bandwidth for many users, thereby eliminating bottlenecks. Moreover, Gigabit Ethernet grants full-duplex abilities that enhance the bandwidth’s efficiency (Jain, Bakker, & Anjum, 2004). Gigabit Ethernet reduces maintenance and ownership costs. This is because the bandwidth provided by Gigabit Ethernet has the capacity to convey high data quantities through one network at a fast rate. Furthermore, Gigabit enables east file sharing through high bandwidths, hence enabling file sharing between stationary and mobile dentists. Moreover, the firm has a sizeable requirement for all comprehensive coordination between stationary and mobile locations. The firm should, therefore, establish technologies that offer high speed Internet between the stationary and mobile locations within the metropolitan region. WiMAX 802.16a technology is sufficient for the aforementioned requirement since WiMAX allows the transmission of more than 70Mbps across a 30 mile radius (Jain, Bakker, & Anjum, 2004). WiMAX technology offers large broadband wireless connectivity between fixed and mobile devices without the need to be in line with the central station. Another viable solution is the Metropolitan Area Network (MAN) or Mimax technology, which is effectual in supporting the five multi-location dental care offices across different areas of the city. Mimax technology is appropriate since it allows fast data sending between locations in different regions of the city. The MAN technology is best suited for metropolitan regions since it allows mobility and speed of data transmission. Furthermore, the firm requires a network solution that connects all the city regions using a single network. A satellite microwave connection is the most viable option to fulfill this requirement since the technology permits connectivity across vast distances within the city. The technology sends signals from its ground station to a satellite then back to the other ground stations; hence encompassing massive distances. The firm also requires a secure and reliable network that protects confidential patient information as provided by the HIPPA requirements. HIPPA requires the protection of protected health data such as a patient’s past, current and future health condition, the health care services provided to the patient and past, current and future payment for health care (Castells, 1998). Because breaching these requirements is tantamount to a crime, the dental firm must maintain the integrity of confidential patient information. The firm’s greatest requirement is the protection of confidential patient information since a single breach or risk could result in loss of such confidential data. In order to connect the four dentists who work in the office but are also mobile, the firm should establish cloud technology, which has the capacity to connect both stationary and mobile offices. Cloud technology is an exceptional option since it delivers high storage capacity and computing to a multitude of users (Rhoton, 2009). Cloud technology will allow the four dentists who provide services in senior centers and elementary schools to connect to other dentists in stationary offices within the city. Cloud network assigns user data and software over a single network. Cloud technology allows end-users to access applications via web browsers or mobile applications and store data in remote locations. Since cloud networks use rental servers, they enhance manageability and reduce maintenance costs. However, private cloud computing encompasses the benefits of cloud technology such as speed, mobility, easy access and low maintenance with the added advantage of privacy. Private cloud computing ensures security with regard to information privacy (Smoot & Tan, 2011). This means that mobile dentists will be able to send and receive patient information while outside the office. This is a monumental requirement, i.e. the ability to send and receive patient information outside the office through a secure solution. Private cloud computing is advantageous because it maintains privacy by deterring the risks of hacking, unauthorized access and other forms of attacks. Private cloud computing adheres to HIPPA requirements for the maintenance of patient privacy. The HIPPA requirement for information protection is another integral requirement for the firm. Private cloud computing not only ensures security, but maintains data integrity (Smoot & Tan, 2011). What is more, the firm requires a solution that reduces telephone expenses when conveying information between stationary and mobile locations. The firm should shift to VoIP telephone services since VoIP will enable all dentists to make phone calls via the Internet, thereby reducing telephone expenses substantially. Risks and Risk Mitigation Strategies Although all the aforementioned network solutions offer incredible benefits such as high speed and impressive Internet connectivity, the solutions are also susceptible to risks and serious vulnerabilities. Because the WiMAX, satellite microwave, VoIP and Gigabit Ethernet solutions use the Internet, these solutions fall susceptible to risks like equipment disturbances and attacks like rogue access points, eavesdropping, Trojan Horses and denial-of-service. WiMAX technologies have substantial security risks in the physical and MAC layers. WiMAX grows on a security sub-layer that is unsecure and unprotected from attacks like water torture, jamming and scrambling attacks (Nguyen, 2009). WiMAX technologies are also susceptible to replay attacks, as well as forgery. All these security risks emanate from the defects with the technology’s physical layers. The MAC layer is also prone to defects capable of causing attacks such as man-in-the-middle and DoS. One of the main risks with regard to WiMAX technologies is the fact that information can be cut off and altered before retransmission. This is quite risky considering that the firm handles a vast array of confidential patient information. In addition, the technology can be attacked by bogus traffic, which deters authorized personnel from accessing the network. Since MAN technology covers a large area, it is susceptible to attacks such as unauthorized access and data sharing. Mimax technology demands data entry at base stations rather than at individual end devices. In order to mitigate these risks posed by the physical and MAC layers of WiMAX devices, the firm should establish technical and non-technical strategies. Technical strategies include security controls such as firewalls, strong anti-virus mechanisms, OS updates and patched. Non-technical strategies include rules, policies and laws that deal with user behavior, operation and design of WiMA technologies (Castells, 1998). These strategies should assert preventative strategies and ensure all personnel adhere to the laws. Non-technical strategies are ineffective on their own and require technical strategies to maintain data integrity against attacks such as eavesdropping. The firm should develop strong encryption algorithms and key lengths and continually change secret keys to deter compromise. The firm can also use Public Internet Network (PIN) to transfer sensitive patient information over WiMAX networks. The installation of antivirus software and strong firewalls are also crucial to mitigate the risks. Mitigating the risks of MAN or Mimax technologies involves ensuring that data sharing is possible from all devices despite the location. Cloud network uses rented servers, which run the risk of data leakage to other servers within the cloud. In order to mitigate this risk, the firm could establish an internal cloud network to link all dentist offices, both stationary and mobile (Rhoton, 2009). Cloud network is an excellent solution because it allows rapidly adjustable IT resources to cater for fluctuating business demands (Castells, 1998). Private cloud computing entails the risk of unauthorized access, which could diminish privacy. Mitigating this risk involves the establishment of strong access codes and changing code keys as often as possible. Gigabit Ethernet technologies are also multi-layered and are hence susceptible to risks of network insecurity. This is because the solution entails complex security features that are insufficiently scalable. This causes unauthorized admissions since the solution suffers from low access protection. This augments the chances of malware, hacking and security threats (Paul, 2010). In order to mitigate these risks, the firm must establish standardization protocols for all its network security through the repair of network software and hardware. These protocols are enforceable at the chip level through the installation of software for access authentication, prevention of DoS attacks and standard-based access control lists (ACLs). Mitigating security risks involve the deterrence of disclosure of confidential patient information and monitoring unauthorized access. Satellite microwaves operate via space thus encounter distinct threats such as solar and cosmic radiation, solar disruptions, temperature shifts and collision with space objects like other satellites and meteoroids (Castells, 1998). With regard to viable security solutions for VoIP and microwave satellite technologies, the firm should establish security protocols such as Advanced Encryption Standards (AESs), which carry large key sizes, install fierce surveillance cameras, employ a combination of symmetric and asymmetric encryptions, carry out regular network audits and constant software updates. With regard to space-based risks encountered by the satellite microwave solution, the firm should set up strong satellite hardware, physical security, and encryption signals to monitor hacking and access control for data sent and received from satellites. Principally, the firm should initiate strong data backup and recovery mechanisms and robust business continuity strategies for instances when any of the aforementioned risks occur. This illustration shows the architecture of the order of the technologies within a converged system. References Castells, M. (1998). The rise of the network society: The information age, economy, society and culture. London: Blackwell Publishers. Jain, R., Bakker, J. L., & Anjum, F. (2004). Programming converged networks: Call control in Java, XML, and Parlay/OSA. Massachusetts: Wiley-Blackwell Publishing. Nguyen, T. (2009). A survey of WiMAX security threats. Retrieved from http://www.cse.wustl.edu~jain/cse571-09/ftp/wimax2/index.html Paul, S. (2010). Digital video distribution in broadband, television, mobile and converged networks: Trends, challenges and solutions. New Jersey: Wiley & Sons. Rhoton, J. (2009). Cloud computing explained: Implementation handbook for enterprises. Chicago: Recursive Press . Smoot, S. R., & Tan, N. K. (2011). Private cloud computing: Consolidation, virtualization, and service-oriented infrastructure. California: Morgan Kaufmann. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Dental Office Network Systems Case Study Example | Topics and Well Written Essays - 1000 words”, n.d.)
Dental Office Network Systems Case Study Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1454039-dental-office-network-systems
(Dental Office Network Systems Case Study Example | Topics and Well Written Essays - 1000 Words)
Dental Office Network Systems Case Study Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1454039-dental-office-network-systems.
“Dental Office Network Systems Case Study Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1454039-dental-office-network-systems.
  • Cited: 0 times

CHECK THESE SAMPLES OF Dental Office Network Systems

Network Technology Specification

4 Pages (1000 words) Essay

Requirements for Dental Office Network Design

dental office network design Name Professor Institution Course Date Analyze the given case and provide a clear set of requirements for the network solution Operation of a single dental office does not require a lot of attention in terms of network solutions as compared to several offices.... The design of the network solution will require careful attention in order to develop effective computer systems for fostering operations by dentists in different locations (Plant & Murrell, 2007)....
4 Pages (1000 words) Case Study

Successful information security management

The security incident of different computing systems will have dissimilar effects and escort to different consequences, bureau, departments the Internal Revenue Service need to tailor the security incident handling plan according to specific operational requirements.... Information systems security is a challenge for executives and the information technology professionals.... The information technology professionals are not only responsible for securing the information systems, all the employees of the organization are responsible....
9 Pages (2250 words) Research Paper

The Information Security Officer in a Well-Defined Process

It has been calculated that approximately half of the breaches to the security of the information systems are made by the internal staff or employee of the organization (Spears et al.... The security incident of different computing systems will have dissimilar effects and escort to different consequences, bureau, departments the organization needs to tailor the security incident handling plan according to specific operational requirements.... Information systems security is a challenge for executives and information technology professionals (Dhillon et al....
6 Pages (1500 words) Assignment

Huffman Trucking Company Inc. Telephony Service Profiling

A gateway is needed to communicate with others within the network.... A Voice enabled talk switch model is used to integrate VOIP and handle the traditional telephone network.... network ProtocolsA.... Identifying network ProtocolsOn locations CA office and CA Plant, MO Plant, NJ Office, NJ Plant, OH Plant uses the TCP/IP protocols.... PBX means Private Branch Exchange, privately owned and is created to function as a box referred to as the central office made to handle anywhere from 100-20,000 lines within a 20 - 30 miles radius large scale....
14 Pages (3500 words) Essay

Building a Business Network

An office network can allow employees to share files and other data and print documents more easily.... This essay discusses a computer network, which is simply a system of interconnected computers.... This essay analyzes that a computer network is a collection of autonomous computers interconnected by a single technology, plus peripherals (printers, CD-ROM drives, scanners, and so on) so that all computers can communicate and share resources with each other....
16 Pages (4000 words) Essay

Successful Information Security Management and Computer Security

It has been calculated approximately half of the breaches to the security of the information systems are made by the internal staff or employee of the organization (Spears et al.... The security incident of different computing systems will have dissimilar effects and escort to different consequences, bureau, departments the organization needs to tailor the security incident handling plan according to specific operational requirements.... Information systems security is a challenge for executives and the information technology professionals (Dhillon et al....
8 Pages (2000 words) Assignment

The Concept of Paperless Office

Giuliano envisioned the paperless office as an environment in which record handling is through proper electronic systems.... Office equipment manufacturers envisioned improving office productivity through enhancing proper information systems.... Key among the implications of advancements in information systems is the emergence of network organizations.... network organizations use technological infrastructure in coordinating communication and control of their activities....
8 Pages (2000 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us