Medical Facility Network Design
Medical Facility Network Design
Medical Facility Network Design
CREATED BY: CHELSEA COLLINS KARA JAMES ERIC LOPEZ TREVOR NORWOOD
PROJECT DESCRIPTION
The Medical Facility design will be using the most up to date technologies to ensure the 24/7 availability of crucial information. The network policies, design, and software choices reflect how critical the needs are of a Medical Facility. Our physical design is represented in Appendix A, where you can see that we have a Main Office Building with wireless routers and access points set up in specific locations. As seen in our physical diagram, Appendix A, for each workstation, on every floor, we will install a Dell Vostro 430 computer, a monitor, physical access to the networks and servers, printer access, and a VoIP Cisco SPA525G phone system. We will be using 1000BaseT Cat6 cable throughout the first, second and third floors of the building for more secure and reliable connections. In our Appendix B, you can see detailed information regarding the IP addresses of each device located at the Medical Facility and at the Data Center. In our Main Office Medical Building, the routers and switches will be placed in a secure room with key lock access to ensure that unauthorized users do not have physical access. Only authorized users will be able to gain access to the wireless
NETWORK POLICIES
The configuration and design of this network was created with the intention being as reliable and efficient as possible. Since the Hospital is required to run continuously, these network policies reflect the importance of the patients reliability on the network and corresponding technology. The standard operating procedures given are meant to maintain the best connection and communication required for all users of the Hospital networking technology. Due to the importance of these networks, any misuse or alteration of the procedures could result in failure of the network or death of a patient, and as such must not occur without consequences. Below is a guide as to how the Network at the Hospice Medical and Data Center facilities will be used.
I. Printing Services All workstations within the Hospice Medical Facility will have access to printers. Each printer will be assigned an IP address with a password to access through FTP, and will be assigned to the closest workstation within the facility. The passwords assigned to access the FTP server will follow the strict password guidelines. Printing services should be used for Hospice Medical Facility purposes only. II. Internet Access All workstations within the Hospice Medical Facility will have access to an extremely high-speed Internet network. Networking, computing, and resources can be utilized from any workstation within the facility. All users must have a designated user name and password to be able to access the Internet, and will be able to do so from most computers. Internet usage will be constantly monitored to reduce security threats and protection of the Network. The Internet should be used for Hospice Facility research and communication purposes only. Remote access to the Hospice Internet network is only allowed to request or access required information by a certified user. III. User Administrations Account management and user information will be configured and managed by the IT department. After research of users and access restrictions, the IT department will assign authentication levels to certain users, depending on their rank within the facility and their requirement to access certain data. The only staff that will be given full credentials with no restrictions will be the IT department.
VI. Storage allocation Users may use as much storage as needed in order to efficiently complete their tasks. The accounts will have access to their own personal user folder from any computer as well. Email is limited to 25MB an account and is stored on the mail server, allowing for a superfluous amount of memory that users may utilize. Considering the importance of Storage allocation, it is important for users to only store material and information related to the Hospice Medical Facility.
X. Environmental Issues The dedicated servers for the network will be contained within a temperaturecontrolled room to remove the possibility of overheating. A constant temperature of 70* Fahrenheit is suggested, as well as the average humidity around 55%. The room will also be equipped with many detection systems to ensure all systems are working fine with no threat. This includes fire and safety control, and humidity control. All these systems can be monitored remotely, with the option of sending remote alerts.
The use of surge protectors is important in the prevention of total system power failures. Uninterruptable Power Supplies (UPS) would be the best choice in this situation to protect the equipment from possible electrical problems. EMI issues can also be avoided through the use of shielded cables if need be.
XI. Patches All patches will be made Mondays at 6am, with the assumption that the network will be used the least during this time.
SECURITY POLICY
Security for the Medical Facility is extremely important because they hold very sensitive medical record information on all of their patients. We must take certain measures to ensure the safety and protection of patients and their information. These policies will be monitored and implemented by the hired IT department staff. We will be using highly secure technology including password requirements, alarm systems, access control systems, photo identification, CCTV, two-way voice communications, and weapons screening systems Electronic Access Control System will ensure protection of our data from the misuse of information by intruders and authorized members. We will implement four levels of users (Administrators, Level 3, Level 2, Level 1.) Level 1 Users will have the
For encryption, to prevent attacks, for firewall, and for antivirus we will be using Symantec Endpoint Protection software and installing this software on each device. Encryption software will be used for information shared across the network and information on all devices. Medical Facilities have highly confidential information that is being sent over a network and needs to be encrypted on all Laptops, Desktops, Flash drives, CD and DVD, External Hard drives, portable hard drives, E-mails.
Physical Access will be controlled to ensure the protection of all employees and patients by using the following systems: Alarm System Photo Identification- smart card access cards with appropriate information Closed-circuit television camera system Weapons Screening systems Security Guards Two-way voice communications
Information attack/intrusions Determine the malware or type of attack on systems. Check to make sure attacks did not affect any other devices. Run the proper malware software to quarantine or remove threat.
BUDGET
10
11
12
TEAM CONTRIBUTION
As a team we all contributed to this project. There were 8 sections that needed to be completed; therefore we each chose the items we would do. Chelsea Collins: Executive Summary, Budget, Assembled Deliverable, Contribution Summary Kara James: Written Description, Security Policy Eric Lopez: Network Policies Trevor Norwood: Disaster Recovery Policy, Appendix A, Appendix B Executive Summary: Researched and compiled information on medical facility networks. Reviewed our plan and wrote a summary. This summary would be used to inform upper-level management of the proposal. Budget: Created a list of items that will be needed to implement a new network infrastructure. Researched prices of the items and created a spreadsheet to reflect the information found. Computed the costs and came up with a final budget price. Written Description: Review our plan for the network infrastructure. Describe the network proposed and explain reasoning behind decisions. Security Policy: Decide on policies that need to be in place to secure the network. Compile policies that will be used in the medical facility to protect information and security violations. Network Policies: Decide on policies that need to be in place to operate efficiently and safe. Compile policies that will be used in the medical facility. Disaster Recovery Policy: Compile procedures and policies that will be followed in case of a disaster. Decide on the best recovery techniques if a disaster were to happen. Appendix A: Configure a physical layout of the medical facility network, created in the software program Visio. Appendix B: Configure a logical layout of the medial facility network, created in the software program Visio.
13