1 answer

1. Many health systems have instituted a policy of BYOD (Bring Your Own Device), allowing a...

Question:

1. Many health systems have instituted a policy of BYOD (Bring Your Own Device), allowing a clinician to use his/her personal
1. Many health systems have instituted a policy of BYOD (Bring Your Own Device), allowing a clinician to use his/her personal device to deliver patient care resulting in lower costs to the health system but the trade-off is high risk and less control. Discuss the benefits, some of the risks and how the health system overcomes these risks. Find a current article regarding this topic and include the link in your initial discussion post. 2. Also, think about your home network. Where and how is it getting the IP addresses it uses? Are they public IP's or private IP's at your house? What physical and logical topologies are implemented there? What is DHCP and DNS? Are these things you talk about with your pals when you're hanging out? Geez, I hope not but it's good to know what they are.... give me some scoop on BYOD and networking and no fair just saying I don't know what those things are.

Answers

BYOD devices are Corporate-owned and Personally-owned endpoints that require access to the corporate network, regardless of their physical location.

BYOD can create a more open, efficient and relaxed environment that benefits both parties.

When you allow employees to bring their own devices to work, it can create a more open, efficient and relaxed environment that benefits both parties. Some BYOD benefits include:

For the Organization:

- Cost Savings

- User pays all or some portion of Device and Service Plan

- Eliminates or reduces IT infrastructure

- Increases employee productivity - ease of telecommuting with the personal device.

For Employees:

- Avoid carrying an additional device

- Ability to use device employee wants to use

- Reduces need for training as using their own device

Risks for BOYD:

-Data Leak

When an employee shares company data from a mobile device with an unauthorized app or third party, may place corporate data at a significant risk

- Theft of data contained on the stolen or lost device

- Employees forward sensitive documents to unauthorized individuals or make them available through unsecured cloud file-sharing provider

- caused by malware in apps

Data Breach: If an employee-owned device connected to the company's network becomes compromised by malware from downloading a malicious app or faulty device security, the whole network is susceptible to this.

Data Loss (risk to the employee, not the organization): Employee Loses data when organization wipes out data on the lost phone or if the employee leaves the company

As well as BYOD can boost your work environment, this policy can open the door to new risks and exposures.

To manage this technology and most of them can avoid these risks.

Although BYOD can boost your work environment, this policy can open the door to new risks and exposures. To avoid these risks, businesses must understand what they entail and how they can provide an extra layer of protection to secure critical data.

Where and how is it getting the IP addresses and it uses?

Each device connected to the Internet is required to have a unique number identifying it, called an IP address. A typical IP address is expressed as a series of numbers separated by decimal points as follows:

197.169.73.63

One way to find out your IP address is to go to Google and type "what's my IP". Google will show your IP address at the top of the search results.

IP addresses are either assigned statically or dynamically.

When a computer has static addressing, it means that the IP address never changes.

Static IP addresses are most likely assigned manually by a network administrator.

Dynamic addressing is normally handled by the dynamic host configuration protocol (DHCP). When a user logs on to an ISP's server, the DHCP server assigns that using an IP address for the duration of the session. These temporary IP addresses may or may not be the same from session to session.

Computers consult the domain name system (DNS) server. The DNS server contains a mapping of domain names with their corresponding IP addresses. The default DNS server contacts one of the DNS servers.

A root DNS server knows the location of all the DNS servers that contain the master listings for an entire top-level domain. It uses a database maintained on a domain name system (DNS), which functions like a phone book for the Internet.

.

Similar Solved Questions

1 answer
Problem 11-25 Break-Even and Taxes [LO3] Wettway Sailboat Corporation is considering whether to launch its new Margo-class sailboat. The selling price will be $53,000 per boat. The variable costs wil...
Problem 11-25 Break-Even and Taxes [LO3] Wettway Sailboat Corporation is considering whether to launch its new Margo-class sailboat. The selling price will be $53,000 per boat. The variable costs will be about half that, or $32,000 per boat, and fixed costs will be $585,000 per year. The total inves...
1 answer
What are the reason why doctors combine 3 antibiotics. (flaggy, cefepime and Vacomycin) the patient has...
what are the reason why doctors combine 3 antibiotics. (flaggy, cefepime and Vacomycin) the patient has Gas gangrene Cellulitis . Why will a patient be on Plavix, Wafarin and aspirin even though the person is bleeding so much from the surgery site....
2 answers
A certain Carnot engine has Th = Tc + 35K, and an efficiency of 20.0%. What...
A certain Carnot engine has Th = Tc + 35K, and an efficiency of 20.0%. What is Th? A) 140 K B) 175 K C) 210 K D) 245 K Please explain....
1 answer
King Cones leased ice cream-making equipment from Ace Leasing. Ace ears interest under such arrangements at...
King Cones leased ice cream-making equipment from Ace Leasing. Ace ears interest under such arrangements at a 6% annual rate. The lease term is six-months with monthly payments of $11,000 due at the end of each month. King Cones elected the short-term lease option What is the effect of the lease on ...
1 answer
Should financial statements be expanded to include a company's ecological and social performance?
Should financial statements be expanded to include a company's ecological and social performance?...
1 answer
Business Plan question In 2017, 42 children died of heat stroke strapped in their car seats...
Business Plan question In 2017, 42 children died of heat stroke strapped in their car seats after the drivers forgot that the children were in the vehicle, and the driver exited the vehicle. One death is one too many. A possible solution- a car seat with the nanotechnology that communicates through ...
1 answer
H OCH.CH CH,CH,CHCH, + CH,CH,OH — CH,CHCHCH, + 1 In the above reaction, what is the...
H OCH.CH CH,CH,CHCH, + CH,CH,OH — CH,CHCHCH, + 1 In the above reaction, what is the best description of the attachment of the leaving group? 03 methyl...
4 answers
Michelle rode her bicycle from her house to her school at an average speed of 8 miles per hour (mph)
Michelle rode her bicycle from her house to her school at an average speed of 8 miles per hour (mph). Later that day, she rode from school back home along the same route, at an average speed of 12 mph. If the round trip took her 1 hour, how many miles long is the round trip....
1 answer
A long, straight wire carrying a current of 4.25 A is placed along the axis of...
A long, straight wire carrying a current of 4.25 A is placed along the axis of a cylinder of radius 0.500 m and a length of 2.25 m. Determine the total magnetic flux through the cylinder. T · m2...
1 answer
Can a change in velocity be negative?
Can a change in velocity be negative?...
1 answer
Reserve Problems Chapter 12 Section 1 Problem 1 X Incorrect. During a research, the amount of...
Reserve Problems Chapter 12 Section 1 Problem 1 X Incorrect. During a research, the amount of Internet users was measured. Each time three random groups of 10,000 people of the average age of 20, 40, and 60 were considered. The data are as follows (x1 - the number of years since the beginning of the...
1 answer
Consider the following mechanism: A2B (rapid equilibrium) B + 2C + E (slow) E F (fast)...
Consider the following mechanism: A2B (rapid equilibrium) B + 2C + E (slow) E F (fast) Which one of the following experimentally determined rate laws is consistent with this reaction mechanism? Multiple Choice Rate = KALC2 O Rate = KAVB2 O Rate = K[AIC] O Rate = MBIC2 Rate = ka]1/2012 O...
1 answer
*I know that this question may have already been posted but I believe that it may...
*I know that this question may have already been posted but I believe that it may not have been thoroughly/accurately answered. Thanks! The initial money market supply and demand in an economy is given by: Money supply: Ms = $100,000 Money demand: MD 600,000 – 4,000,000r = The following table ...
1 answer
A) A wire carrying a current I is perpendicular to a magnetic field of strength B....
a) A wire carrying a current I is perpendicular to a magnetic field of strength B. Assuming a fixed length of wire, which of the following changes will result in decreasing the force on the wire by a factor of two? Select all correct answers - Decreas the current in th e wire to I/2 - Decrease the ...