Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Plan Patton-Fuller Community Hospital Networking Virtual Organization, Essay Example
Hire a Writer for Custom Essay
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
An organization’s system management plan must reflect the capability to cope up with the latest trends in technology and security. It is vital to incorporate a scalable and secure solution for the sustainability of the organization in the market. Before taking decisions on computer network architecture upgrades, security experts must be engaged for expert advice regarding the three triads i.e. Confidentiality, Integrity and Availability. Likewise, these three factors need to be considered before deploying any change within the organization. For instance, the confidentiality factor may consist of security mechanisms and security device capability to prevent data leakage and a breach of confidentiality. Secondly, the integrity will guarantee no interference with the confidential information and its originality will be preserved by up to date firmware, hardware and definitions on the security devices operational on the network. Thirdly, the availability factor must also be ensured by implementing devices with scalability and a long end of life / end of service, as per the organization’s strategic goals. Therefore, a change management phase must be reviewed by security experts to meet security baselines and strategic objectives for the organization. Moreover, the change management process should incorporate impact assessment and risk assessment. Both of these assessments assure a calculated and controlled change i.e. a change with identified risks and acceptable impact levels.
An inventory should be in place for identifying all IT assets of the organization. Likewise, an IT asset coordinator should be in place for recording the assets, tagging asset ownership, procuring and disposing assets and identifying assets with end of life / end of service. Secondly, the configuration management process should be owned by the relevant stakeholders, keeping in mind about the configuration changes within the infrastructure. The primary objective is to record the changes, access the impact and identify risks. Likewise, configuration management for an infrastructure can be associated with the frequent changes within the network. For instance, frequent allocation of IP addresses to a network device, virus definitions, security patches, firmware updates are frequent changes and can be considered as configuration changes for the network (Dynamic host configuration protocol 2007). The process for configuration management should be automated, as every stakeholder should identify their configuration items, record them and update them on a portal or in a word processing document.
For managing these configuration items, there must be a process in place, for instance, a checklist should be maintained for updating the frequent security patches and functional fixes to applications and network devices. Moreover, patch management for security appliances must also be recorded so that they can be checked in spot checking or audit by the relevant function of the organization. Moreover, for contingency planning, a separate team should be in place for implementing business continuity framework within the organization. Likewise, there are two plans that needs to be established i.e. Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP). The BCP plan is a business document and needs to be filled by the relevant business owners, whereas, the DRP document addresses all the technology related contingency planning. However, it is derived by the requirements given by the business within the BCP document. One example would be a data backup contingency i.e. data that is required after disaster should not be more than 4 hours old. The technology team will then establish a backup procedure after every four hours.
For addressing application security, the security team should be involved in the initial stages of software development life cycle. Likewise, the primary goal is to stabilize the application architecture in terms of security controls and their effectiveness. Moreover, the team also needs to ensure for adopting the software secure coding standards to avoid any vulnerable items that may be identified or may not in the testing and UAT stages of Software Development Life Cycle. Further, after addressing these risks, the application layer security is ensured and the security on remaining layers of the OSI model can be ensured by implementing encryption, protocols supporting cryptography, bio metric access to critical assets and implementing environmental controls where necessary. Apart from ensuring security on every layer of the OSI model, the ‘availability’ factor needs to be in place. For instance, if the hospital needs to communicate high definition scans of a patient to another remote office, the infrastructure should ensure a robust transfer of patient file that may be very large in size. Likewise, the availability of that file on the remote location is critical due to patient’s health condition. In this scenario, the network devices and Wide Area Network link should be fast enough, otherwise, patient’s life should be at risk, if the file does not arrives on time to the doctor available with the patient on a remote site. As mentioned earlier, an IT asset coordinator will be responsible to inform the approval authorities timely for replacement of end of life/end of service equipment from the network. An alert mechanism should be in place that may generate alerts on email or cell phone about the replace or downtime of specific hardware equipment or a security appliance. However, priority of both should be different.
References
Dynamic host configuration protocol.(2007). Network Dictionary, , 167-167.
Stuck with your Essay?
Get in touch with one of our experts for instant help!
Tags:
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee