Research paper Project report
please include surveys and graphs in this paper – 10 pages
1
Running Head: The security Vulnerabilities of IoT devices in the medical field
The security vulnerabilities of IoT devices in the medical field
Objective
The core objective of the topic will be to explore and examine the security vulnerabilities of the devices used in the medical field. As some devices are working as IoT, the chances of security breaches are enhanced. The devices contain information from different patients, and it is vulnerable when it is connected to the internet. If the device itself is not securing the information, then the administrator who is running the system operation and operating system on the device is responsible. The objective is to find the vulnerabilities and propose a solution that will give surety on the security factor of the devices.
Project Plan
The security issues in medical devices have been arising since their invention. Many companies are denying the fact that these are promoting data leaks and contain personally identifiable information (PII). It will probably create problems in different companies and patients. The patient record will be vulnerable, and some of the companies that are utilizing these devices are mainly using outdated software and operating systems. The main point of the research is to point out the vulnerabilities in the IoT devices and what type of security breaches they cause. In taking the example of some IoT devices with different abilities, infusion and insulin pump comes first then, smart pens, cardiac devices, wireless vital monitors, thermometer and temperature sensors, security cameras, and various other hardware. Every device has its benefits and its security concerns. Especially when you are working in the medical field, many inventions prevent humans from getting a disease and making upgrade through to cure any problem, but they also have a drawback when you try to more the very nature of the hardware. This project will elaborate on security vulnerabilities and present counter solutions for their issues. The task will involve taking few devices condition into consideration, exploring the working and mechanism of the devices, examining the security vulnerabilities and results gathered from different operations, comparing the reserves with the research findings, and presenting a proper report for solution providing with the exposed vulnerabilities. There will be teams running different module of the proposal, and they will collect single device and the team will run its functionalities in the programming side, and the other team will run for the architecture design and see what type of operation and how long it takes to send the data from device to the administrator server. The gap between the transmissions will be analysed for vulnerabilities, and the device hardware and software configuration will also be held responsible for any data leak.
Literature Overview
In the literature review, we will describe the function of IoT devices and how they can be used in the medical field. In the healthcare department, the IoT devices are growing rapidly and are packed with interesting features and factors like technological advancements, decrease prices of sensor technology, better accessibility of high-speed internet, and more. What type of application is the medical field currently running with the devices, and in how many sectors these devices are utilized and what type of result they generate? After that, we will conduct a study on one or two hospital for their IoT devices that poses a security threat, and it is vulnerable for data extraction. The study will elaborate on every module of the system and it will provide an in-depth view of the working device and we will also propose a countermeasure for any issue found in operation.
Likely Outcome
We will focus on one outcome that will be to ensuring the safety of any security leek. We will also elaborate on the methods by which you can make the device more secure and less vulnerable, which will also give the authentication protocol provided for both the patient and the administrator. The results will ensure the integrity of the IoT device and ensure the patient that the device will run efficiently, and records and data will be monitored with care, and find the solution for the generated outcomes.
Relationship to the Master’s Program
This project will be best suited for the master program because the subject elaborates on the internet devices, and it concern every type of protocol we run before giving a final product. It will also elaborate on the hardware structure of the program so that it will ensure that before running it in the field implementation and testing phase will be thoroughly examined. The Programming course and System Architecture course will help more in understanding and working on this proposed project.
Reviews
The survey shows 82 percent of healthcare organizations experienced IoT-focused cyber-attack in the previous 12 months, with only 6 percent of organizations saying they have resources to tackle cybersecurity challenges.( Davis, 2019) The paper highlight the security risk in the healthcare department and its integration with the internet of things devices. What type of vulnerabilities expects it exposes to its administrator and patient, and if the data they collected is still under surveillance or not? (Cansu Eken, 2016)
References
Cansu ken, H. E. (2016). Retrieved from http://www.ep.liu.se/ecp/142/054/ecp17142054
Davis, Jessica (2019) Health IT Security- https://healthitsecurity.com/news/82-iot-devices-of-health-providers-vendors-targeted-by-cyberattacks
Writing a Project Report
By Gail Marie, eHow Contributor
Project reports communicate a project’s background, its objectives, the methods used to achieve the objectives and the results of these efforts. The writer may also discuss important aspects of the project and draw certain conclusions. Like most reports, the information should be formatted with headings, clearly communicated and well supported. There are countless ways to write a
project report. The steps below represent one method.
Information needed in advance includes:
Project details
Background information
Supporting information
Sources of information
Steps include:
1. Create a title or cover page, followed by a table of contents and an abstract (see Step 9).
The project report’s title should convey the area and scope of the project.
2. Consider your reader, his or her knowledge of your project and its subject. If your project was, for example, scientific but your reader is not a scientist, consider using less technical language than if he were.
3. Describe the project’s scope, its objective and the main result(s) in the Introduction. You may include what you personally contributed to the project as well.
4. Tell the reader about the research behind the project in a Background section, if too extensive to include in the Introduction.
5. Describe the methods you used during the project to accomplish the stated objectives in a Methods/Procedures section. Don’t forget to use the past tense, as these actions have already been taken.
6. Present the results of the project, which may not be the intended results. Use a Results section heading. Depending on your reader and what your project entailed, you may want to discuss the results by explaining what they show, analyzing uncertainties, noting trends, comparing the results with known theories or with the expected results, evaluating limitations of the project, detailing the possibilities of faulty interpretation or simply
discussing assumptions about the results.
7. Conclude by summarizing, once again, the project report’s content and by suggesting the implications of the project’s results. Because your reader is familiar with your work, you may use project-specific terms and reference names of people and places under the
Conclusion heading.
8. Propose, under a Recommendations heading, suggestions based on the conclusions outlined earlier. Describe actions you think should be taken because of the project’s results or additional work that you think is needed to gain more knowledge about the subject.
9. Write the report abstract, which summarizes, like the conclusion, the report’s contents.
The abstract is actually the first section of the report, so keep it more general than the conclusion. Because the abstract is such a comprehensive summary, it is most easily written last.
10. Include references and appendices such as charts, graphs, photos or additional
information at the end of the report.
Autobed Manufacturing Update Management Hijacking usability 4.3 2.5 3.5 4.5 telehealth Manufacturing Update Management Hijacking usability 2.4 4.4000000000000004 1.8 2.8 E Alert Manufacturing Update Man agement Hijacking usability 2 2 3 5
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.