Identify and Access Management
The paper discusses in detail the function of the IAM in Healthcare hospital. The introduction gives a detailed concept of the hospital and the departments involved in systems security. The body contains four parts. The first part explains the description of the IAM. The second part shows the importance of IAM. The third part describes the developments within the IAM department. The last part deals with recommendations. The paper winds to a conclusion which summarizes all the points.
Identify and Access Management
One of the most critical and sensitive industries in the world is the health sector. It is a sector that involves a lot of confidentiality between the patients and the medical experts. Some systems are used in hospitals which are controlled by a computer. Some data are kept in the hospital database that should be protected. Healthcare is a private hospital in Australia which has over 46 hospitals, and 52 branches should have computerized infrastructures that help in the treatment activities. With all these branches, it means the hospital has very many patients hence millions of patient’s life are on always on their hand. It also indicates that they contain a lot of patient’s data in their database. The systems and the data should be protected at all cost. That’s why identity and access management department is crucial.
Technology keeps on changing every second (Gupta, 2018). If a company does not advance according to the growing technology, then attacks will be a common thing in the hospital systems. Malware keeps in advancing too; old methods can rarely protect new malware in information technology. That’s why the IAM is very important in Healthcare hospital. Currently, surgeries and other departments use software’s developed by people. It means that if such software’s fail in the treatment process, then serious implication can be witnessed which include the death of a patient. ISIA is a very important department hence should be managed accordingly.
Description of IAM
As the name suggests, the IAM department is responsible for identifying threats related to the hospital systems, neutralizing the threats and also coming up with new advanced systems (Garcia et al. 2017). The primary aim of the department is to make sure the organization is secure. There are different ways the IAM makes sure the hospital is secured. When a patient is attended in a hospital, either an inpatient or an outpatient, some records are kept in the database using the computers. The data is very important to the organization. There are rules that patient’s data should not be known to other third parties unless authorized. If such things happen, the organization can be sued in court. That’s why the database should be protected from SQL injections and other threats. If measures are not kept into place, the database can be attacked and data leaked. Such a hospital contains the data of even popular people like a politician who have lots of secrets, leakage of such data can lead to hospital closure, bad image and be sued by people affected.
Various ways are met to ensure that the information’s is secured (Joharapurkar, 2016). One of the common methods is by only allowing authorized individuals to access the data in the database. In case that is not effective, there is the changing of password after a time interval, and if that’s not fully secure, there is the use of decrypted passwords which other intruders can’t just guess. Some of these methods don’t fully secure the data since they are hackers who can do the injection to the database from their comforts. The ISIA department contains security engineers who are experts in the Python programming language, relational databases, NoSQL databases and other specialties. They are fully equipped to make sure when hackers try to attack the organizational databases; they are ready to protect it using very powerful firewalls and strong codes which are unknown and rare with other organizations.
The ISIA contain all kind of developers; the IAM ensures that they develop real-time softwares. The developers in this field are the website developers, mobile application developers (Android and iPhone), backend developers and other software developers. The Healthcare Hospital has got a website where people can register, log in and get directions. Website are the easiest targets if not well protected. The front and backend engineers make sure the website is secure. The community in Australia can use the mobile applications to ask the doctors questions and advice of different conditions. The data the applications correct is a secret. If such an app is bypassed, then there can be leakage of data. All the developers need to come together make sure they all play their roles to make sure the organizational security is at its best.
Importance of IAM
IAM, as explained earlier, makes sure the organizational is secure (Villa-Real, 2014). The department is very important to the organizational. An attack on the organizational database can lead to data loss which is illegal. It’s IAM work to make sure the data is secure. The hardware and the software’s used in surgery are developed by the engineers. IAM makes sure such software’s meet all the requirements to be sure it can be responsible for a personal life. IAM ensures organization security.
As indicated, technology keeps on changing hence the developers should also be up to date at all times. The IAM is making sure that the developers are well trained and ready for any attack. They are also making sure they employ qualified candidates who are updated on the new technologies. The IAM is trying its best to provide favorable working conditions for the engineers.
The IAM has a project of developing its own software’s which should only be used in the organizational. It is a very wise move since hackers can find hard to enter into their systems. It is very simple for a hacker to crack a system which is used in almost all hospitals. The software’s cannot be sold to the market.
There are certain technologies developed by the engineers that the management should implement to supplement organization safety. The organization uses the WAN which is prone to attacks. The network should be destroyed and the management to provide capital to facilitate the LAN network which is secure but costly to set up in such an organization.
The databases used by the organizational are the relational databases. The world is changing towards the NoSQL databases like the Mongo DB (Garcia et al. 2015). To upgrade to the new database will need resources which can only be authorized by the management.
In conclusion, information and systems security is a requirement is all organizational hospitals included. The IAM has a unique responsibility and regards to the Healthcare Hospital for setting side such a department. The IAM is there to ensure organizational security. The engineers are highly qualified and make sure their developments are secure. The management should provide all resources so that all implementations are made to ensure security is guaranteed.
Garcia, D. J. P., Ouye, M. M., Rossmann, A., Crocker, S. T., Gilbertson, E., Huang, W., … & Ryan, N. M. (2015). U.S. Patent No. 9,129,120. Washington, DC: U.S. Patent and Trademark Office.
Garcia, D. J. P., Ouye, M. M., Rossmann, A., Crocker, S. T., Gilbertson, E., Huang, W., … & Ryan, N. M. (2017). U.S. Patent No. 9,542,560. Washington, DC: U.S. Patent and Trademark Office.
Gupta, A. (2018). U.S. Patent No. 9,860,224. Washington, DC: U.S. Patent and Trademark Office.
Joharapurkar, A. R., & Kwak, S. U. (2016). U.S. Patent Application No. 14/717,705.
Villa-Real, A. E. C. (2014). U.S. Patent No. 8,831,677. Washington, DC: U.S. Patent and Trademark Office.