Main Menu

My Account
Online Free Samples
   Free sample   Health care assignment security challenges of iot

Health Care Assignment: Security Challenges of IoT

Question

Task
Prepare a health care assignment explaining and demonstrating various components of Internet of Things (IoT). Also, analyze the role and importance of IoT in health care in the modern world.

Answer

1. Analyze the task
IoT is a leading communication technology that delivers a way where companies can connect numbers of computer devices and networks easily and perform data transmission operations easily. IoT plays a major role in healthcare where IoT based devices allows to perform healthcare operations in a reliable manner. The uses of IoT devices in healthcare systems are beneficial but also lead the problem of hacking because IoT connects computer devices with the internet where criminals are able to transfer unusual data or signals to the servers. Most of the hackers target communication networks and computer devices used by healthcare communities and access their computer devices effectively.

The purpose of this report is to find security threats and challenges linked with the IoT in healthcare by conducting systematic literature. My position on the selected topic is to find security risks and threats related to the IoT technology used by healthcare communities. In this era, healthcare communities are using computer devices and IoT systems that help to examine business problems and maintain the level of performance easily. IoT enabled devices are more effective by which patients can interconnect with the health professionals and manage health-related problems significantly (Ammar, Russello, & Crispo, 2018).

Security is a serious problem that impacts on the performance and data of healthcare systems by which data breach and cyber-crimes can be produced. Major three risk factors that are producing security challenges in IoT in healthcare for example lack of awareness, improper security plans and miss-configuration of IoT servers with the systems. More than 70% of the healthcare companies are moving towards the IoT and AI-based devices where proper training to employees needs to be delivered so that security threats and understanding related problems can be managed.

The expected format of this report contains various sections for example introduction, objectives, literature review, discussion and findings. The literature review will help to obtain effective information about IoT security threats and also review the findings of recent papers related to the research topic. The major research problem is securing IoT devices from the cyber-crimes and attacks in healthcare because there is no systematic research that highlights security risks related to IoT in healthcare. This research will deliver depth information and address this research problem by reviewing previous studies and proposing effective mitigation techniques.

2. Literature review
It is found that previous studies provided a way to examine security issues related to the IoT and helped to improve understanding but this literature will provide depth examination about risk factors leading cyber-crimes in IoT in healthcare. The intention of the literature review is to find effective points in regards to the IoT security threats and its implications on healthcare systems.

Alaba, et al., (2017) reported that IoT is now including in healthcare in order to provide more reliable patient care and reduce problems from healthcare. IoT is able to handle numbers of computing devices and networks by which complexity from the healthcare can be reduced. However, securing data from IoT networks is very critical for healthcare because many criminals target computing networks and communication systems of IoT and reduce the security of healthcare systems

The presence of unusual activity can help to send and perform hacking-related operations in healthcare companies. More than 70% of healthcare companies are now using IoT devices and systems where hacking and data breach issues can be performed in less time. Balte, Kashid, & Patil, (2015) proposed research and determined that there are major three risk factors leading cyber-crimes and risks in IoT in healthcare. These risk factors include lack of knowledge, inconsistent production standards and poor maintenance and updates. In the case of healthcare, IoT enabled devices are less capable to identify and examine the security risks from the systems.

The security attacks are more effective by which the criminals can collect sensitive data and information from healthcare sectors. Due to lack of proper knowledge, employees and nurses in healthcare companies are not capable to identify frauds and unwanted signals sent by the criminals. Chen, et al., (2017) agreed and reported that more than 70% of the workers in healthcare access computing devices and communication networks where criminals can easily share malicious codes and frauds easily. Numerous kinds of cyber-crimes and threats occur in the IoT in healthcare companies such as malware, spyware, phishing, ransomware and many more.

It is determined that malware is a common security threat which is capable to send viruses and unwanted signals to the computing networks and IoT devices and allows to access healthcare systems. Dalipi, & Yayilgan, (2016) agreed and reported that malware is a leading cyber-crimes that has the ability to reduce confidentiality and availability of the computing networks linked with the IoT devices. Therefore, it is important for healthcare communities to address malware threats from the devices so that data can be protected and secured effectively. DoS attack is another cyber-attack that provides a way where IoT connected devices in healthcare can be hacked and accessed effectively. In the case of IoT and healthcare, DoS allows the criminals to transfer traffic signals and risks by which private details can be hacked in less time.

The recent literature examined that IoT enabled devices are less capable to handle traffic signals due to which healthcare companies can suffer from data loss related problems. Deogirikar, & Vidhate, (2017) examined that more than 60% of the healthcare communities are using limited security measures which are not able to detect and defend cyber-crimes linked with the IoT networks and systems. In terms of security, IoT technology is less effective and reliable due to which healthcare companies cannot handle privacy-related concerns.

Ransomware is a part of a malware attack that can be performed in IoT enabled devices used by healthcare communities. Most of the criminals perform ransomware related attacks in the workplace due to their capability to provide accessibility of computing devices used in healthcare. The major part of the ransomware attack is that it is capable to transfer to get login credentials of the IoT devices in less time and healthcare companies can lose database and private details. Ransomware threats could not only lock consumers out of IoT networks and related platforms but disable computing networks along with the user’s credentials.

The rapid development of IoT devices and systems in healthcare can produce serious problems and issues in the workplace for which proper implementation need to be developed. Healthcare companies require hiring IT experts so that risk factors and issues can be determined and privacy of IoT enabled devices can be improved in a reliable manner. According to Derhamy, et al., (2015) one of the privacy problems with IoT systems is that healthcare businesses producing them are often too careless when it comes to significant testing and delivering timely software updates. Phishing is a common process used by the criminals to send frauds and spam emails to the healthcare communities and IoT devices are less capable to protect and secure servers from the phishing threats. It is true that the presence of the phishing process can help the criminals to reduce confidentiality and security of the IoT devices for which it is important for healthcare to examine and address phishing mails and frauds.

Khan, & Salah, (2018) examined that lack of awareness need to be managed from the healthcare communities for which proper training programs should be developed so that healthcare companies can improve the level of security and privacy. The recent literature determined that the healthcare companies need to update computing software and networks related to the IoT devices because most of the hackers are capable to target IoT enabled devices. Li, et al., (2015) agreed and reported that security vulnerabilities and risks are capable to reduce the security of IoT devices and systems for which healthcare companies need to propose security plans and policies. Malware is main digital wrongdoing that can decrease classification and accessibility of the registering networks connected with the IoT gadgets.

Subsequently, it is significant for medical care networks to address malware dangers from the gadgets so information can be ensured and made sure about viably. DoS assault is another digital assault that gives away where IoT associated gadgets in medical care can be hacked and gotten to successfully. On account of IoT and medical care, DoS permits the hoodlums to move traffic lights and dangers by which private subtleties can be hacked in less time. The ongoing writing inspected that IoT empowered gadgets are less proficient to deal with traffic lights because of which medical care organizations can experience the ill effects of information misfortune related issues. As IoT devices do not contain any security features, it is very simple for criminals to enter into the servers and reduce the privacy of the healthcare communities where users can lose their sensitive data.

It is determined that criminals may exploit privacy vulnerabilities in IoT networks for executing cyber-attacks in healthcare. Such IoT concerns may be more concerning for individuals as they are not aware of their existence. Cyber-criminals may use botnets for targeting IoT enabled devices and systems which are linked to the computing networks in healthcare companies for example desktops, mobile devices and many more. Denial of service attack may be utilized to reduce the performance and effectiveness of the IoT devices used in the healthcare companies.

MITM is another security threat which is defined as a man in the middle attack that may intercept communication among computing devices and IoT servers leading to critical device malfunction. Criminals are more effective that develop malicious programs and servers in order to target IoT devices and networks so that data breach and loss related issues can be performed in a reliable manner. The criminals are capable to gain control over their interaction and transfer illegitimate signals for participating devices and private details can be exploited in less time. Aggressors can likewise abuse weaknesses in IoT gadgets that are associated with different gadgets and endeavour frameworks. For example, programmers can assault a weak IoT sensor in an association and access their business organization. Thusly, aggressors can invade various endeavour frameworks and acquire delicate business information.

Subsequently, IoT security dangers can offer ascent to information breaks in numerous organizations. Programmers utilize social designing to control individuals into surrendering their touchy data, for example, passwords and bank subtleties. Then again, cybercriminals may utilize social designing to get to a framework for introducing malignant programming covertly (Li, et al., 2018). Normally, social designing assaults are executed utilizing phishing messages, where an assailant needs to create persuading messages to control individuals.

Nonetheless, social designing assaults can be fewer complexes to execute if there should be an occurrence of IoT devices. IoT is a correspondence innovation that can interface PC organizations and frameworks so as to trade information or signs. In this period, numerous business networks are moving towards the IoT empowered gadgets so as to upgrade authoritative execution and correspondence among gadgets and clients. Security is a difficult undertaking for the IoT because of which the business networks are presently confronting digital violations and security dangers.

Various kinds of digital wrongdoings happen in the IoT gadgets, for example, malware, ransomware, phishing, DoS and a lot more that target correspondence organizations and frameworks. It is contended that the term IoT is a sort of framework which is principally utilized for interfacing figuring gadgets with the things and ready to move signals over the organizations without utilizing human to human correspondence. Lin, et al., (2018) reported that IoT is a viable correspondence innovation that can possibly control and deal with the correspondence holes between the organizations. With regards to IoT networks, things might be an individual with a heart screen embed that can speak with the processing gadgets without utilizing interfacing wires or links.

IoT assumes a significant function in the healthcare networks since it can improve the presentation of the created organizations and helps organizations for performing information correspondence in a viable manner. The facts demonstrate that usage of IoT empowered gadgets in the organizations can improve the viability of the figuring networks that can help the board for performing complex circumstances. There are various advancements utilized in the IoT for instance, remote organizations, media transmission frameworks, miniature administrations, etc.

It is analyzed that the IoT is a successful correspondence innovation that has the capacity to interface figuring networks with things and give better information transmission frameworks. After reviewing previous papers, it is demonstrated that the recent studies helped to enhance awareness about IoT security challenges in healthcare but it is important to propose effective countermeasures. Ngu, et al., (2016) suggested that healthcare companies need to develop training programs for the employees in regards to the IoT uses and security threats so that unwanted and unauthorized activities can be managed. Proper security plans can be helpful for which healthcare communities can adopt the CIA triad model that has the ability to develop security frameworks and reduce data breach concerns from IoT devices linked with healthcare. Firewall and encryption both are significant security techniques that may be helpful for healthcare in order to address security and privacy issues from IoT devices. Nguyen, Laurent, & Oualha, (2015) agreed and reported that firewall is capable to detect phishing and malware signals from the IoT devices and encryption is more effective by which communication-related operations can be performed more securely.

3. Research report

Abstract
IoT refers to the communication technology which is able to connect computing devices with the physical systems so that interaction can be done without requiring human assistance. In healthcare, IoT plays a significant character that helps to develop automated systems in order to perform business operations and deliver patient care more effectively. However, security is a problem with IoT devices where criminals can transfer unauthorized activities and perform data loss operations easily. This research provides a platform for addressing security threats related to IoT in healthcare and examine risk factors leading to security issues in the workplace. The conducted literature examined that malware, ransomware and DoS are common security attacks occur in the healthcare for which proper security frameworks and models need to be proposed. The scope of this research is to improve awareness among students about IoT security challenges and its implications on healthcare systems.

Introduction
IoT is a leading communication technology that delivers a way where companies can connect numbers of computer devices and networks easily and perform data transmission operations easily. IoT plays a major role in healthcare where IoT based devices allows to perform healthcare operations in a reliable manner. The uses of IoT devices in healthcare systems are beneficial but also lead the problem of hacking because IoT connects computer devices with the internet where criminals are able to transfer unusual data or signals to the servers. Most of the hackers target communication networks and computer devices used by healthcare communities and access their computer devices effectively.

The purpose of this report is to find security threats and challenges linked with the IoT in healthcare by conducting systematic literature. My position on the selected topic is to find security risks and threats related to the IoT technology used by healthcare communities.

In this era, healthcare communities are using computer devices and IoT systems that help to examine business problems and maintain the level of performance easily. IoT enabled devices are more effective by which patients can interconnect with the health professionals and manage health-related problems significantly. Security is a serious problem that impacts on the performance and data of healthcare systems by which data breach and cyber-crimes can be produced. Major three risk factors that are producing security challenges in IoT in healthcare for example lack of awareness, improper security plans and miss-configuration of IoT servers with the systems. More than 70% of the healthcare companies are moving towards the IoT and AI-based devices where proper training to employees needs to be delivered so that security threats and understanding related problems can be managed.

The expected format of this report contains various sections for example introduction, objectives, literature review, discussion and findings. The literature review will help to obtain effective information about IoT security threats and also review the findings of recent papers related to the research topic. The major research problem is securing IoT devices from the cyber-crimes and attacks in healthcare because there is no systematic research that highlights security risks related to IoT in healthcare. This research will deliver depth information and address this research problem by reviewing previous studies and proposing effective mitigation techniques.

Literature review
Alaba, et al., (2017) reported that IoT is now including in healthcare in order to provide more reliable patient care and reduce problems from healthcare. IoT is able to handle numbers of computing devices and networks by which complexity from the healthcare can be reduced. However, securing data from IoT networks is very critical for healthcare because many criminals target computing networks and communication systems of IoT and reduce the security of healthcare systems. The presence of unusual activity can help to send and perform hacking-related operations in healthcare companies. More than 70% of healthcare companies are now using IoT devices and systems where hacking and data breach issues can be performed in less time.

health-care-assignment-1

(Source: Balte, Kashid, & Patil, 2015)

Balte, Kashid, & Patil, (2015) proposed research and determined that there are major three risk factors leading cyber-crimes and risks in IoT in healthcare. These risk factors include lack of knowledge, inconsistent production standards and poor maintenance and updates. In the case of healthcare, IoT enabled devices are less capable to identify and examine the security risks from the systems. The security attacks are more effective by which the criminals can collect sensitive data and information from healthcare sectors. Due to lack of proper knowledge, employees and nurses in healthcare companies are not capable to identify frauds and unwanted signals sent by the criminals. Chen, et al., (2017) agreed and reported that more than 70% of the workers in healthcare access computing devices and communication networks where criminals can easily share malicious codes and frauds easily.

Numerous kinds of cyber-crimes and threats occur in the IoT in healthcare companies such as malware, spyware, phishing, ransomware and many more. It is determined that malware is a common security threat which is capable to send viruses and unwanted signals to the computing networks and IoT devices and allows to access healthcare systems. Dalipi, & Yayilgan, (2016) agreed and reported that malware is a leading cyber-crimes that has the ability to reduce confidentiality and availability of the computing networks linked with the IoT devices. Therefore, it is important for healthcare communities to address malware threats from the devices so that data can be protected and secured effectively. DoS attack is another cyber-attack that provides a way where IoT connected devices in healthcare can be hacked and accessed effectively. In the case of IoT and healthcare, DoS allows the criminals to transfer traffic signals and risks by which private details can be hacked in less time.

health-care-assignment-2

(Source: Deogirikar, & Vidhate, 2017)

The recent literature examined that IoT enabled devices are less capable to handle traffic signals due to which healthcare companies can suffer from data loss related problems. Deogirikar, & Vidhate, (2017) examined that more than 60% of the healthcare communities are using limited security measures which are not able to detect and defend cyber-crimes linked with the IoT networks and systems. In terms of security, IoT technology is less effective and reliable due to which healthcare companies cannot handle privacy-related concerns. Ransomware is a part of a malware attack that can be performed in IoT enabled devices used by healthcare communities. Most of the criminals perform ransomware related attacks in the workplace due to their capability to provide accessibility of computing devices used in healthcare. The major part of the ransomware attack is that it is capable to transfer to get login credentials of the IoT devices in less time and healthcare companies can lose database and private details.

Ransomware threats could not only lock consumers out of IoT networks and related platforms but disable computing networks along with the user’s credentials. The rapid development of IoT devices and systems in healthcare can produce serious problems and issues in the workplace for which proper implementation need to be developed. Healthcare companies require hiring IT experts so that risk factors and issues can be determined and privacy of IoT enabled devices can be improved in a reliable manner. According to Derhamy, et al., (2015) one of the privacy problems with IoT systems is that healthcare businesses producing them are often too careless when it comes to significant testing and delivering timely software updates. Phishing is a common process used by the criminals to send frauds and spam emails to the healthcare communities and IoT devices are less capable to protect and secure servers from the phishing threats.

health-care-assignment-3

(Souurce: Khan, & Salah, 2018)

It is true that the presence of the phishing process can help the criminals to reduce confidentiality and security of the IoT devices for which it is important for healthcare to examine and address phishing mails and frauds. Khan, & Salah, (2018) examined that lack of awareness need to be managed from the healthcare communities for which proper training programs should be developed so that healthcare companies can improve the level of security and privacy. The recent literature determined that the healthcare companies need to update computing software and networks related to the IoT devices because most of the hackers are capable to target IoT enabled devices. Li, et al., (2015) agreed and reported that security vulnerabilities and risks are capable to reduce the security of IoT devices and systems for which healthcare companies need to propose security plans and policies.

Findings and discussion
It is found that lack of awareness and miss-configuration of networks in IoT devices both are major risk factors leading security risks and threats in the healthcare communities. The presence of a security threat in healthcare based networks can help the criminals to get accessibility of the database systems and private details of the users can be hacked. The conducted literature examined that malicious programs and botnet both are major hacking processes used by the criminals in order to send and perform cyber-crimes in IoT networks. Healthcare communities are not capable to decrease security risks and issues for which proper security measures and policies need to be developed so that healthcare operations can be done with the larger security and confidentiality.

On account of medical services, IoT empowered gadgets are less fit to distinguish and look at the security hazards from the frameworks. The security assaults are more compelling by which the crooks can gather touchy information and data from medical care parts. Because of the absence of appropriate information, representatives and medical attendants in medical care organizations are not able to distinguish fakes and undesirable signs sent by the crooks. Therefore, it is recommended that healthcare communities should hire IT experts that can help to examine the security risks and concerns from IoT devices and improve the security of data.

Conclusions
From this research, it may be concluded that IoT is more effective for healthcare and performance can be improved but not capable to address and resolve security threats and risks from the systems. This research provided a way to understand the importance of IoT in healthcare and examine security threats occur in the IoT enabled devices and their implications on healthcare networks. It is examined that healthcare companies are less effective in terms of security where workers not capable to examine and detect unauthorized activities performed by the hackers. It is important to update computing software and IoT networks so that healthcare communities can protect data from the cyber-crimes and IoT devices can perform business operations more securely. It is suggested that while moving towards IoT, healthcare communities should follow the proper configuration of networks so that they can secure data from the criminals. Moreover, the uses of firewall tools in IoT can be helpful for healthcare due to their potential to find malware and other security risks from the systems.

References
Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of Things security: A survey. Journal of Network and Computer Applications, 88(7), 10-28.

Ammar, M., Russello, G., & Crispo, B. (2018). Internet of Things: A survey on the security of IoT frameworks. Journal of Information Security and Applications, 38(6), 8-27.

Balte, A., Kashid, A., & Patil, B. (2015). Security issues in Internet of things (IoT): A survey. International Journal of Advanced Research in Computer Science and Software Engineering, 5(4), 12-18.

Chen, L., Thombre, S., Järvinen, K., Lohan, E. S., Alén-Savikko, A., Leppäkoski, H., ... & Lindqvist, J. (2017). Robustness, security and privacy in location-based services for future IoT: A survey. IEEE Access, 5(5), 8956-8977.

Dalipi, F., & Yayilgan, S. Y. (2016). Security and privacy considerations for iot application on smart grids: Survey and research challenges. In 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), 12(6), 63-68.

Deogirikar, J., & Vidhate, A. (2017). Security attacks in IoT: A survey. In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), 12(6), 32-37.

Derhamy, H., Eliasson, J., Delsing, J., & Priller, P. (2015). A survey of commercial frameworks for the internet of things. In 2015 IEEE 20th Conference on Emerging Technologies & Factory Automation (ETFA), 12(8), 1-8.

Khan, M. A., & Salah, K. (2018). IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems, 82, 395-411.

Li, S., Da Xu, L., & Zhao, S. (2015). The internet of things: a survey. Information Systems Frontiers, 17(2), 243-259.

Li, S., Da Xu, L., & Zhao, S. (2018). 5G Internet of Things: A survey. Journal of Industrial Information Integration, 10, 1-9.

Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 4(5), 1125-1142.

Ngu, A. H., Gutierrez, M., Metsis, V., Nepal, S., & Sheng, Q. Z. (2016). IoT middleware: A survey on issues and enabling technologies. IEEE Internet of Things Journal, 4(1), 1-20.

Nguyen, K. T., Laurent, M., & Oualha, N. (2015). Survey on secure communication protocols for the Internet of Things. Ad Hoc Networks, 32, 17-31.

NEXT SAMPLE

Related Samples

Question Bank

Looking for Your Assignment?

Search Assignment
Plagiarism free Assignment

FREE PARAPHRASING TOOL

PARAPHRASING TOOL
FREE PLAGIARISM CHECKER

FREE PLAGIARISM CHECKER

PLAGIARISM CHECKER
FREE PLAGIARISM CHECKER

FREE ESSAY TYPER TOOL

ESSAY TYPER
FREE WORD COUNT AND PAGE CALCULATOR

FREE WORD COUNT AND PAGE CALCULATOR

WORD PAGE COUNTER



AU ADDRESS
9/1 Pacific Highway, North Sydney, NSW, 2060
US ADDRESS
1 Vista Montana, San Jose, CA, 95134
ESCALATION EMAIL
support@totalassignment
help.com