Information Systems Infrastructure Cyber Security


BA 633: Information Systems Infrastructure

Sairam Majji


Dr. Charles Abiodun Robert

April 18, 2018

Visit the Net Motion Web site and access and read other Mobility XE success stories. Discuss the patterns that can be observed in the benefits that Mobility XE users have realized via its deployment and use.

Mobility XE solves many issues which were prevalent before its existence. Conventional VPNs were not built with mobile devices in mind. When a network tunnel is interrupted the application disconnects or the device crashes as this happens when a mobile device runs into a dead spot. Mobility XE makes sure you do not lose the session through temporary dead spots and intermissions and the feature is termed “True Application Persistence” and can retain sessions through suspend-and-resume-cycles, connectivity losses and network switches. It also provides several security features like two-factor authentication, device authentication, FIPS 140-2 AES encryption and several other features. It also provides a console to monitor connected devices. It also features the ability to diagnose network issues faced by your user through network tools.

One success story is with JEA which is one of the largest municipal utilities in the United States. In their effort to improve their customer service and effort to optimize wireless communication networks over their entire 841 sq miles of their service area. Mobility XE provided instant integration with all of their existing applications They had an existing problem every time their mobiles technician’s wireless connection dropped, it would take them 20-30 minutes to log back into the system and hence caused lot of productivity issues. Mobility Xe made their servers reliable even when they moved from one network to another.

Main pattern that can be observed when organizations try Mobility XE is that it solves the main issues of inconsistent network connectivity through providing a stable connection. Hence, it makes those companies more productive and their customer happy through better service.

Do some Internet research on the security implications of HIPAA requirements for hospital networks? Discuss the major types of security mechanisms that must be in place to ensure hospital compliance with HIPAA requirements.

As every health organization of any size has to depend on utilizing wireless technology for their day to day operations. Suppliers are likely understanding that none of the particular difficulties protection, security, dependability, and speed while getting to patient records and clinical information that the human services condition faces when exchanging full operational dependence to remote systems can be tended to by customer technologies. This is because consumer wireless were never intended to work with HIPAA compliance in mind. Most importantly medicinal services associations are organizations with an extraordinary duty to secure patients private data no matter what. An attack on private medicinal services records presents extreme implications for both the hospital and the patient. That is the reason a similar level of attention must be given to the advancement of reason constructed, reliable networks with regards to the patients whose lives rely on upon the data being shared—and at last ensured—by means of these systems. Consumer grade wireless networks cannot guarantee security required by the regulatory and federal requirements. The first step that a hospital must take to ensure compliance with HIPAA is the security management process which includes risk analysis, risk management and Information technology review. A risk analysis involves an accurate and thorough assessment of the potential vulnerabilities posed to the integrity of the available electronic health information. Risk management thereafter should be practiced to implement security measures sufficient to reduce the risk posed by the system. Protecting and safeguarding the individual’s PHI should be the highest priority while building out security for the Information Systems.

Do some Internet research on the use of VLANs in hospitals? Summarize the benefits of using VLANs in hospitals and identify examples of how St. Luke’s could further enhance its wireless network by implementing VLANs.

Virtual LANs is a group of devices on different LAN segments which work and communicate with each other as if they are on the same LAN. Although there are few limitation to it like device and port constraints they have several benefits like improved performance and manageability and better security options. Benefits of using VLAN in hospitals is that it makes the network infrastructure more secure and it expands the security boundaries for that hospital. As such Firewall can placed at the end of the VLANS thereby increasing security across all the VLAN segments spanned across different departments and data centers.

St Luke’s Hospital could have further improved their Information Systems Security and Performance by implementing VLAN. On the top of using Mobility XE, implementing VLAN could have made their security reliability to another level.