Science

Submitted by: Submitted by

Views: 252

Words: 1301

Pages: 6

Category: Business and Industry

Date Submitted: 09/01/2012 07:57 AM

Report This Essay

In an effort to provide better care for its patients, arises the need to design a network able to support a new multi-location dental care practice. In this report, we will provide a clear set of requirements for the network solution, and then identify the information that is to be protected as well as their related security requirements. Also, we will identify the types of network components, devices and equipment that would be involved in meeting the needs of the stationary offices and all four mobile dentists, and then we will provide a network design diagram that shows an appropriate network configuration to meet the requirements. Finally, we will explain the benefits of the proposed network solution, and identify the risks and risk mitigation strategies associated with the proposed network solution.

With five dental offices currently operating, we need to design a network that will integrate databases of all 5 dental offices within the city into one database where all five offices' resources will be stored for organization wide access. Patients’ data must be accessed as quickly as possible if requested as well as daily schedules. In a word, the new network must be able to provide high speed data transfer rate. Furthermore, the new design must include a remote access network that will enable mobile computing and a full organizational resource access to the four dentists that provide dental checkups to elderly patients in their homes, at the senior citizen centers, and to school children in the three inner-city elementary schools. Most importantly, the new network must protect patients' records and information.

With the network requirements outlined above, the dental offices must ensure that there are security protocols in place to protect their information assets. These assets include operational data, patients' records, and daily schedules. To accurately provide this data protection, information security procedures such as availability, authorization,...