The Cyber Security Implementation Plan in the Healthcare System

Paper Type:  Essay
Pages:  2
Wordcount:  484 Words
Date:  2021-05-27
Categories: 

The implementation plan will be evaluated by determining the extend of its effectiveness. The cyber security implementation plan in the healthcare system is meant to protect the patients confidential information. Therefore, by analyzing the occurrence of cyber-crimes we will be able to determine the effectiveness of the plan (Vockley, 2012).

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

Furthermore, the resources required for the evaluation of the implementation plan are such as: the FBI, National Cybersecurity and Communications Integration Center (NCCIC), Cyber Security and Technology Crime Bureau (CSTCB) who take the responsibility for conducting cyber-security investigation (Henriksen, et al., (2013).

Similarly, the firewalls and cyber-security software have the capability of storying data of the attempted threat and it will also indicate the prevented treats (Cabrera, 2016).

Discuss the evaluation process in relationship to the projected outcomes.

The implementation plan can be further be evaluated according to the project outcome. This will involve conducting of the survey, whereby the general public and the healthcare facilities will provide their feedback regarding the newly implemented security reforms. The survey will require the users to articulate their confidence towards the changes made and the adjustment that they feel are necessary needed to adopted (Papoutsi, et al., 2015).

Dissemination plan

With respect to the dissemination plan, this project plan can be used in the financial institution which are more vulnerable to the cyber-related threats. The threats target the financial information of the individuals which are used in money fraud. Where: The plan needs to be implemented on the devices in the financial institutions which are vulnerable to the hacking and they contain the more confidential information (Burns, & Johnson, 2015). How: the cyber-security implementation plan will prevent hacking of the banking information. This will protect information that might be used un fraud, the banking information will them be encrypted against unauthorized access. When: the plan will need to be implemented immediately since there are increased incidences of hacking (Kumar & Lee, 2011).

References

Better Care Victoria. (2017). Www2.health.vic.gov.au. Retrieved 11 January 2017, from https://www2.health.vic.gov.au/hospitals-and-health-services/quality-safety-service/better-care-victoria

Burns, A. J., & Johnson, M. E. (2015). Securing health information. IT Professional, 17(1), 23-29.

Cabrera, E. (2016). Health Care: Cyberattacks and How to Fight Back. Choice Reviews Online, 18 4, (4), 27-30. http://dx.doi.org/10.5860/choice.44-3390Henriksen, E., Burkow, T. M., Johnsen, E., & Vognild, L. K. (2013). Privacy and information security risks in a technology platform for home-based chronic disease rehabilitation and education. BMC medical informatics and decision making, 13(1), 1.

Kumar, P., & Lee, H. J. (2011). Security issues in healthcare applications using wireless medical sensor networks: A survey. Sensors, 12(1), 55-91.

McNeal, M. (2014). Hacking health care. Marketing health services, 34(3), 16-21.

Papoutsi, C., Reed, J. E., Marston, C., Lewis, R., Majeed, A., & Bell, D. (2015). Patient and public views about the security and privacy of Electronic Health Records (EHRs) in the UK: results from a mixed methods study. BMC medical informatics and decision making, 15(1), 1.

Vockley, M. (2012). Safe and secure? healthcare in the cyberworld. Biomedical Instrumentation & Technology, 46(3), 164-173.

Cite this page

The Cyber Security Implementation Plan in the Healthcare System. (2021, May 27). Retrieved from https://midtermguru.com/essays/the-cyber-security-implementation-plan-in-the-healthcare-system

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the midtermguru.com website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience!

24/7 online support

NO plagiarism