Healthcare
Words: 550
Pages: 2
84
84
DownloadHIT architecture
Name:
Institutional affiliation:
Part A
4876800-19685Administration
Administration
3648075-635Systems administrators
Systems administrators
24193509525Nurses
0Nurses
12001509525Patients
Patients
-571500Doctors
Doctors
13423903716655Industry Information Platform
00Industry Information Platform
36671253345180Client capture
00Client capture
26193753357880Document
00Document
16668753343275CIQ 2000
00CIQ 2000
9144003352800LRP
00LRP
9334502733675Data collection and exchange platform
00Data collection and exchange platform
23710902105025Basic information database
00Basic information database
From the hypothetical HIT strategy, the ABC Physician’s office has the above IT infrastructure. We can notice how the system works. We notice that the system can incorporate doctors, nurses, administrators, and visitors. Each of the users of the system can access it through special privileges that I created for them. The system is made in such a way that it is easily accessible to all users, (Kumar, 2014). Doctors can access the information from the database just like any other system user. We also notice that the platform has been constructed with some basic principles, which are a necessity if the system is to work accordingly. The relevant safety standard requirements of the system such as data integrity and system security have also been factored in.
Part B
The above image is a cisco network-switching device. The device is applicable in the HIT architecture drawn above.
Wait! Healthcare paper is just an example!
For example, the above device is the “SG 300-24 24-Port Fast Ethernet” type of switch. The device can assist the small business network line such as the case that we are dealing with. The switch is efficient, easy and simple to use and operate. The features necessary for improving the network availability of business are made available by the switch through its various useful features, (Liu, 2009). Critical applications of the business such as the doctor’s pane are available with the switch. The switch through device data integrity that is made available for all users protects information in the network. Through the switch, the system administrator makes sure that everyone can access the information freely with little to zero disturbances can achieve network optimization.
The system administrator is to make sure that every network user is connected can use the switch. Everyone will be connected to the switch to access the system that is stored in the cloud system. The switch will be useful since it combines various capabilities with cost efficiency for the business. The office of the “ABC Physician Center City” will have the Cisco switch and its core operations will be conducted at the office, (Pearlson, & Saunders, 2013). Essentially, various uses will be maximized by the use of such a switch that secures connections to the system and eases operations. The system administrator will make sure that there is a simple protocol for network management to aid operations within the company. Hospital operations will all be connected to the switch so that items such as CAT images are all accessed and sent promptly via the network.
The features are achievable using the CAT network in the system to aid operations. Hence, doctors can access information and communication with each other. Retrieving the data of a patient is possible since the doctors have login credentials to the system. It is up to the system administrator to ensure that every user of the system accesses information as required for their use, (Liu, 2009). If the switch goes own the system goes down. However, through the backup in the cloud, once the switch is re-secured, everything lost can be recovered. The device is very critical to the architecture since it controls every process and steps taking place in the system. The Switching device also lasts long and may take up to five years before a failure takes place or a replacement is required.
References
Kumar, H. (2014). Learning Nessus for penetration testing: Master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges faced during vulnerability assessment. Birmingham, U.K: Packt Publishing.
Liu, D. (2009). Cisco router and switch forensics: Investigating and analyzing malicious network activity. Burlington, MA: Syngress.
Pearlson, K. E., & Saunders, C. S. (2013). Strategic management of information systems: International student version. Singapore: John Wiley & Sons.
Subscribe and get the full version of the document name
Use our writing tools and essay examples to get your paper started AND finished.