SlideShare a Scribd company logo
1 of 10
Cyber Security in Industry 4.0
Cyber Security in Industry 4.0 (IEEE) Using Emerging
Technology to Improve Compliance As cyber threats, malicious
software, and cyber-attacks continue to escalate in
sophistication, and no industry can remain immune to these
threats. The IEEE has used industry-inspired advances in
innovation and implementation to promote the highest level of
cybersecurity standards for the most robustly protected
information and communication technology infrastructure, from
networks and telecommunication systems through websites,
digital certificates, and passwords, and other software-based
systems (Ardito et al., 2019). This Enhanced Canada
Cybersecurity Standards and Certificates (ECCS&C) project
strives to provide a common framework for enhanced
cybersecurity across all sectors. The fourth industrial revolution
is referred to as cybersecurity in Industry 4.0 and is
encompassing three discrete components: machine learning,
artificial intelligence, and automation.The effects of these four
technologies will most certainly impact the processes and
processes aspects of technology adoption. Over the next decade,
we will most certainly see further and the further rise of
robotics (Ardito et al., 2019).
The industrial revolution will begin with smart factory security
systems. For now, those systems are secure, but many
manufacturers will soon provide safeguards against attack and
malware threats to help prevent malware attacks and lawsuits.
The processes can look simple like a boiler next to a giant
hexagon. For example, all these processes would trigger heating
or cooling at some point, and the heating or cooling can be
controlled by digital control boxes connected to a smart grid
(Shi et al., 2019).
The industrial network will soon have more people connected in
more complex networks, such as industrial warehouses. All of
these buildings can communicate with each other and can
remotely activate or deactivate automation systems to reduce
manufacturing costs. The need for the defense, control, and
monitoring of systems and networks. The blockchain is the most
viable platform for these purposes (Shi et al., 2019).
Decentralization is gaining respect and confidence on a global
scale, and so there is a renewed emphasis on the blockchain in
the industry. There is an abundance of articles on the
blockchain's potential and benefits for companies. For example,
more than fifty articles are covering the blockchain's potential
for authentication, threat modeling, and development of social
payment interfaces. Companies are beginning to explore smart
contracts and smart systems for security, reputation, and data.
All in all, it seems that all the evidence points to blockchain
technology as the future of the financial industry (Shi et al.,
2019).
References
Ardito, L., Petruzzelli, A. M., Panniello, U., & Garavelli, A. C.
(2019). Towards Industry 4.0. Business Process Management
Journal.
Shi, L., Chen, X., Wen, S., & Xiang, Y. (2019, December).
Main Enabling Technologies in Industry 4.0 and Cybersecurity
Threats. In International Symposium on Cyberspace Safety and
Security (pp. 588-597). Springer, Cham.
Cyber Security in Industry 4.0
The core objective of the research is to assess the various forms
of cybersecurity in various industries with a key focus on hyper
connectivity of technological systems. In the current era of the
emergence of new forms of technology, the wide range of
cybersecurity strategies has resulted in effective security
solutions to combat the increased cyber threats in organizations
and industries (Dawson, 2018). Notably, the hyper connectivity
of modern technologies has enhanced the effectiveness of
security. Research findings indicate that the evolution of
cybersecurity occurred as a result of the advancement of various
attacks on confidentiality, integrity, and availability of
information in digital technologies.
Besides, researchers reveal that cybersecurity in
industries involves the integration of modern technologies, such
as cloud computing, the use of robotics, the internet of
everything, the internet of things, and other relevant
developments. Modern technology connections help industries
in enhancing effective communication, risk visibility, and
effective identification and risk mitigation (Dawson, 2018).
Importantly, research reflects on the various pitfalls to the
various hyper connected systems as a result of vulnerabilities to
attacks, loopholes that support the attacks, and lack of security
awareness among the employees in industries.
In the current era of proliferation of modern
technologies, industries can utilize effective strategies of
enhancing the effectiveness of hyper connectivity and the
process of developing security policies and awareness among all
the involved stakeholders (Benson, McAlaney, & Frumkin,
2019). The implications of cybersecurity are promising as a
result of government efforts of enhancing technology and
security, cultivation of IT experts, and advancements in mobile
information access. I will conduct comprehensive research on
the need for embracing the culture of defense and using safe and
legit sites of sharing information. Industries will have to
embark on timely updates of applications, regular backup of
files, and software updates.
References
Benson, V., McAlaney, J., & Frumkin, L. A. (2019). Emerging
threats for the human element and countermeasures in current
cyber security landscape. In Cyber Law, Privacy, and Security:
Concepts, Methodologies, Tools, and Applications (pp. 1264-
1269). IGI Global.
Dawson, M. (2018). Cyber security in industry 4.0: The pitfalls
of having hyperconnected systems. Journal of Strategic
Management Studies, 10(1), 19-28.
Need help to reply three post.
DO NOT JUST REPEAT SAME INFORMATION, DO NOT
JUST SAY I AGREE OR THINGS LIKE THAT. YOU NEED
TO ADD NEW INFORMATION TO DISCUSSION.
1- Each reply should be at least 200 words.
2- One scholarly reference ( NO MAYO CLINIC/ AHA)
3- APA style needs to be followed.
4- Each response should have reference at the end
5- Reference should be within last 5 years
DQ-1
1- 300 minimum words for question, you can go up to 700
words.
2- 2-3 Scholarly references ( NO MAYO CLINIC/AHA)
3- References should be within 5 years
4- I am in acute care nurse practitioner program.
DQ-1
Select a medication used for pain management and review
available evidence and treatment guidelines to determine
appropriate therapeutic options. Share the mechanism of action
of this medication and hints for monitoring, side effects, and
drug interactions, including CAM. In addition, share an example
where you have observed an adverse event from a pain
medication and explain the management taken regarding this
adverse event. If you do not have an example, select an adverse
event from the pain medication and explain what interventions
you could make to mitigate this adverse event. Include
references using APA format.
DQ-2
Read and summarize the Topic Material "CDC Guideline for
Prescribing Opioids for Chronic Pain - United States, 2016."
Discuss any ethnic, cultural, or genetic differences that need to
be considered for the use of opioids to treat chronic pain. How
do you intend to use the guidelines in your future practice?
DQ-3
Oxycodone is an opioid agonist for pain management of acute or
chronic moderate to severe pain. It binds to opiate receptors, G-
protein coupled receptors, in the central nervous systems (CNS)
and activates the GDP for a GTP, which inhibits the adenylate
cyclase and decreases the intracellular cAMP (Sadiq, Dice, &
Mead, 2019). Consequently, oxycodone inhibits the nociceptive
neurotransmitters acetylcholine, dopamine, GABA,
noradrenaline, and substance P, altering perception and
response to pain and producing CNS depression (Sadiq et al.,
2019). Oxycodone is available in tablets and capsules in
immediate-release and extended-release. Immediate-release
doses range from 5 to 15 mg every 4 to 6 hours as needed while
ER tablets are 10 mg and capsules are 9 mg every 12 hours
(“Oxycodone,” 2019). Dosages may vary depending on opioid-
tolerant patients, and for adequate pain control, dosages should
titrate upwards with monitoring for potential side effects. The
most common adverse effects include constipation, weakness,
dizziness, dry mouth, nausea, vomiting, headache, and pruritis
(Sadiq et al., 2019). Throughout initial therapy or increased
dosage, the patient’s blood pressure, heart rate, and respiratory
rate should be monitored, as well as, the side effects.
Oxycodone may impair mental and physical abilities and cause
hypotension and respiratory depression. It is important
extended-release tablets are swallowed whole as crushing or
chewing can cause rapid release leading to respiratory
depression and further carbon dioxide retention can exacerbate
sedating effects, which may be fatal (“Oxycodone,” 2019). Drug
interactions that may increase the oxycodone serum
concentration and enhance adverse effects, include CYP450
inhibitors, benzodiazepines, amphetamines, anticholinergic,
CNS depressants, rufinamide, selective serotonin reuptake
inhibitors, and zolpidem (“Oxycodone,” 2019). Complementary
and alternative medicine (CAM) interactions with oxycodone
include ephedra, Jamaica dogwood, kava kava, and lavender, as
this may enhance the effects of CNS depressants, whereas St.
John’s Wort may decrease the serum concentration of
oxycodone.
There are always patients that deal with constipation after
taking oxycodone. A patient came in the ER with severe
abdominal pain, nausea, and vomiting. The CT scan showed a
bowel obstruction and the patient was taking to the OR for an
exploratory laparotomy with bowel resection. When the section
of the bowel was removed, the surgeon pulled out pieces of
fecal that was hard as a rock. According to the notes, the patient
was at a rehab facility due to a hip hemiarthroplasty four weeks
prior. Current medications included an opioid for post-operative
pain management. Patient had no prior abdominal conditions,
but opioid use, age, and possible concomitant medications can
be causative factors for the bowel obstruction. In elderly
patients, constipation is more common, which can be due to
decreased mobility, medical conditions, and/or concomitant
medications; however, stool softeners may be beneficial for
many patients as it may improve bowel function and quality of
life (Morlion et al., 2017). Other recommendations may be to
increase fiber into their diet or increase physical activity to
increase bowel movement. Also, other therapies should be
recommended instead of prolonging the use of opioids, such as
acetaminophen or NSAIDS. As prescribers it is essential to
monitor all side effects and appropriate use of any opioids as we
have to consider to discontinue the medication if the benefits
don’t outweigh the risks.
References
Morlion, B. J., Mueller-Lissner, S. A., Vellucci, R., Leppert,
W., Coffin, B. C., Dickerson, S. L., & O’Brien, T. (2017). Oral
prolonged-release oxycodone/naloxone for managing pain and
opioid-induced constipation: A review of the evidence. Pain
Practice, 18(5), 647-665. doi:10.1111/papr.12646
Oxycodone. (2019). Retrieved from
https://www.drugs.com/ppa/oxycodone.html
Sadiq, N. M., Dice, T. J., & Mead, T. (2019). Oxycodone.
StatPearls Publishing. Retrieved from
https://www.ncbi.nlm.nih.gov/books/NBK482226/
DQ-4
Morphine is often chosen as a front-line drug in the
management of chronic non-cancer pain (Broglio et al., 2017).
Morphine is in a class of drugs called opioid analgesics and
work on the delta, kappa, and mu-opioid receptors (Murphy &
Barrett, 2019). Analgesic effects are achieved when binding to
the mu-opioid receptor within the central nervous system
(Murphy & Barrett, 2019). Once this occurs, there is an
activation of descending inhibitory pathways of the central
nervous system and inhibition of the nociceptive afferent
neurons of the peripheral nervous system leading to an overall
reduction of nociceptive transmission (Murphy & Barrett,
2019).
Morphine can be given in a variety of ways. Some routes
include oral with immediate-release and extended-release,
intravenous, epidural, and intrathecal formulations (Murphy &
Barrett, 2019). One option that is frequently used in palliative
care is sublingual and as an oral suspension (Murphy & Barrett,
2019).
Some drug-drug interactions include the concurrent use of
MAOIs as they create an additive effect with morphine, causing
severe hypotension, serotonin syndrome, or an increase in
respiratory depression in patients (Murphy & Barrett, 2019).
Some side effects include blurred vision, numbness in the
extremities, chills, confusion, dizziness, fainting, headache,
hives or rash, loss of appetite, constipation, and nausea
(Murphy & Barrett, 2019).
The biggest risks of morphine are addiction, abuse, and misuse
(Murphy & Barrett, 2019). These side effects can lead to
overdose and death (Murphy & Barrett, 2019). Each patient
needs to be assessed for their risk of substance addiction and
abuse before prescribing (Murphy & Barrett, 2019). Overdose of
morphine displays as decreased level of consciousness and
respiratory depression that can be life-threatening or fatal
(Murphy & Barrett, 2019).
There are withdrawal symptoms from morphine as well (Murphy
& Barrett, 2019). These symptoms include hallucinations,
tremors, mood swings, and irritability (Murphy & Barrett,
2019). Some can be so extensive that they can cause seizures
(Murphy & Barrett, 2019). The best way to avoid withdrawal
symptoms is to taper the dose down until it is within a safe
dosage to stop it altogether (Murphy & Barrett, 2019).
An example I have of the use of morphine was actually last
week. We received a young patient from the ER who had
developed a very large pleural effusion and was going to the
ICU to meet the Intensivist to receive a thoracentesis. The
procedure went well without any issues, but post-procedure the
patient began to complain of pain with breathing due to lung re-
expansion. The physician ordered morphine 2mg IVP Q4h PRN
Pain >7, and the nurse gave the first dose. Within 30 minutes
the patient began to display signs of altered mental status and
confusion. Fifteen minutes later the patient was sleeping and
their respiratory rate had fallen to 8 breaths per minute and
their oxygen saturation had dropped to 90%. At this point, the
decision was made to give the reversal agent Narcan,
discontinue morphine, and treat with a combination of
acetaminophen and ibuprofen. Within 30 seconds of
administering Narcan, the patient became arousable, alert and
oriented, and began to cough and take deep breaths. After
explaining what happened to the patient, they agreed a lower
regiment of pain management was appropriate.
References:
Broglio, K., Pergolizzi, J., Kowalski, M., Lynch, S. Y., He, E.,
& Wen, W. (2017). Efficacy and Safety of Once-Daily
Extended-Release ( ER) Hydrocodone in Individuals Previously
Receiving ER Morphine for Chronic Pain. Pain Practice, 17(3),
382–391. https://doi-org.lopes.idm.oclc.org/10.1111/papr.12462
Murphy, P.B, & Barrett, M.J. (2019) Statpearls for Morphine.
Treasure Island. Retrieved from:
https://www.ncbi.nlm.nih.gov/books/NBK526115/
DQ-5
There are increasing prescription of opioids in the united states.
The amount of opioid overdose death is also increasing. Primary
care providers have reported that they have concerns about pain
medication misuse. The problem is managing patients with
chronic pain and effectively controlling their pain using this
new system. The guidelines are set in place to target and help
primary care providers that treat patients with chronic pain. To
avoid over prescription the CDC has established guidelines in
order to prescribe effectively. This grading recommendations of
assessment can be a tool to help the primary care provider
effectively prescribe the adequate number of opioids. The CDC
has developed training sessions in order to use this new grading
system effectively. There is evidence that this new system may
have some benefit in prescription of opioids. The problem with
these new guidelines is that people are different an have
different medication thresholds. What may be good treatment
for 1 patient may not work for others. Cultural needs to be
viewed as well in order to better understand the patients pain
level. The patients need relative pain control relative to risks
associated with the prescribed opioid. A combination of non
pharmacological interventions may be used to incorporate
pharmacological opioid administration. Still methadone,
fentanyl oxycodone oxymorphone hydrocodone and morphine
have all shown to higher risks of overdose when initiating
treatment. Methadone overdose continues to increase
(Jones,Baldwin,Manocchio,White,Mack,2016). I will attempt to
use these guideline in order to effectively treat chronic pain. In
the moment that I feel the pain management is complicated I
will set referrals to pain specialists. Opioids are dangerous and
can cause overdose as future providers we need to limit for
potential abuse of these medications (CDC Guidelines for
prescribing opioids for chronic pain-United States, 2016).
Reference
Jones, C. M., Baldwin, G. T., Manocchio, T., White, J. O., &
Mack, K. A. (2016). Trends in Methadone Distribution for Pain
Treatment, Methadone Diversion, and Overdose Deaths - United
States, 2002-2014. MMWR: Morbidity & Mortality Weekly
Report, 65(26), 667–671.
https://doi.org/10.15585/mmwr.mm6526a2

More Related Content

Similar to Cyber Security in Industry 4.0Cyber Security in Industry 4.0 (.docx

Acus intel medical_devices
Acus intel medical_devicesAcus intel medical_devices
Acus intel medical_devicesatlanticcouncil
 
The Healthcare Internet of Things: Rewards and Risks
The Healthcare Internet of Things: Rewards and RisksThe Healthcare Internet of Things: Rewards and Risks
The Healthcare Internet of Things: Rewards and Risksatlanticcouncil
 
THE FRAMEWORK OF ARTIFICIAL INTELLIGENCE (FAI): DRIVING TRIGGERS, STATE OF TH...
THE FRAMEWORK OF ARTIFICIAL INTELLIGENCE (FAI): DRIVING TRIGGERS, STATE OF TH...THE FRAMEWORK OF ARTIFICIAL INTELLIGENCE (FAI): DRIVING TRIGGERS, STATE OF TH...
THE FRAMEWORK OF ARTIFICIAL INTELLIGENCE (FAI): DRIVING TRIGGERS, STATE OF TH...ijaia
 
A LITERATURE REVIEW ON GLOBAL OCCUPATIONAL SAFETY AND HEALTH PRACTICE ACCID...
A LITERATURE REVIEW ON GLOBAL OCCUPATIONAL SAFETY AND HEALTH PRACTICE   ACCID...A LITERATURE REVIEW ON GLOBAL OCCUPATIONAL SAFETY AND HEALTH PRACTICE   ACCID...
A LITERATURE REVIEW ON GLOBAL OCCUPATIONAL SAFETY AND HEALTH PRACTICE ACCID...Justin Knight
 
2016 a literature review on global
2016 a literature review on global2016 a literature review on global
2016 a literature review on globalKassu Jilcha (PhD)
 
Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxdamilolasunmola
 
Make sure it is in APA 7 format and at least 3-4 paragraphs and refe.docx
Make sure it is in APA 7 format and at least 3-4 paragraphs and refe.docxMake sure it is in APA 7 format and at least 3-4 paragraphs and refe.docx
Make sure it is in APA 7 format and at least 3-4 paragraphs and refe.docxendawalling
 
Discussion 1Proposed Topic Appropriate Training and Coordin
Discussion 1Proposed Topic Appropriate Training and CoordinDiscussion 1Proposed Topic Appropriate Training and Coordin
Discussion 1Proposed Topic Appropriate Training and CoordinVinaOconner450
 
DHHS ASPR Cybersecurity Threat Information Resources
DHHS ASPR Cybersecurity Threat Information ResourcesDHHS ASPR Cybersecurity Threat Information Resources
DHHS ASPR Cybersecurity Threat Information ResourcesDavid Sweigert
 
Blockchain technology in healthcare
Blockchain technology in healthcareBlockchain technology in healthcare
Blockchain technology in healthcareMarryam Khawaja
 
CLOUD COMPUTING AND BYOD: BENEFITS AND CHALLENGES IN MODERN HEALTHCARE
CLOUD COMPUTING AND BYOD: BENEFITS AND CHALLENGES IN MODERN HEALTHCARECLOUD COMPUTING AND BYOD: BENEFITS AND CHALLENGES IN MODERN HEALTHCARE
CLOUD COMPUTING AND BYOD: BENEFITS AND CHALLENGES IN MODERN HEALTHCAREUsmanYakubuMaaruf
 
Healthcare Information Technology Trends.docx
Healthcare Information Technology Trends.docxHealthcare Information Technology Trends.docx
Healthcare Information Technology Trends.docxwrite4
 
Answer the Below Question. APA format. 300 words.Textbook .docx
Answer the Below Question. APA format. 300 words.Textbook  .docxAnswer the Below Question. APA format. 300 words.Textbook  .docx
Answer the Below Question. APA format. 300 words.Textbook .docxnolanalgernon
 
Running head CYBER SECURITY .docx
Running head CYBER SECURITY                                  .docxRunning head CYBER SECURITY                                  .docx
Running head CYBER SECURITY .docxsusanschei
 
Assistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docxAssistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docxcockekeshia
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...IRJET Journal
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...IRJET Journal
 
CLOUD COMPUTING71Dissertation Factors affecting the adopt
CLOUD COMPUTING71Dissertation Factors affecting the adoptCLOUD COMPUTING71Dissertation Factors affecting the adopt
CLOUD COMPUTING71Dissertation Factors affecting the adoptWilheminaRossi174
 
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...IJNSA Journal
 

Similar to Cyber Security in Industry 4.0Cyber Security in Industry 4.0 (.docx (20)

Acus intel medical_devices
Acus intel medical_devicesAcus intel medical_devices
Acus intel medical_devices
 
The Healthcare Internet of Things: Rewards and Risks
The Healthcare Internet of Things: Rewards and RisksThe Healthcare Internet of Things: Rewards and Risks
The Healthcare Internet of Things: Rewards and Risks
 
THE FRAMEWORK OF ARTIFICIAL INTELLIGENCE (FAI): DRIVING TRIGGERS, STATE OF TH...
THE FRAMEWORK OF ARTIFICIAL INTELLIGENCE (FAI): DRIVING TRIGGERS, STATE OF TH...THE FRAMEWORK OF ARTIFICIAL INTELLIGENCE (FAI): DRIVING TRIGGERS, STATE OF TH...
THE FRAMEWORK OF ARTIFICIAL INTELLIGENCE (FAI): DRIVING TRIGGERS, STATE OF TH...
 
A LITERATURE REVIEW ON GLOBAL OCCUPATIONAL SAFETY AND HEALTH PRACTICE ACCID...
A LITERATURE REVIEW ON GLOBAL OCCUPATIONAL SAFETY AND HEALTH PRACTICE   ACCID...A LITERATURE REVIEW ON GLOBAL OCCUPATIONAL SAFETY AND HEALTH PRACTICE   ACCID...
A LITERATURE REVIEW ON GLOBAL OCCUPATIONAL SAFETY AND HEALTH PRACTICE ACCID...
 
2016 a literature review on global
2016 a literature review on global2016 a literature review on global
2016 a literature review on global
 
Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptx
 
Make sure it is in APA 7 format and at least 3-4 paragraphs and refe.docx
Make sure it is in APA 7 format and at least 3-4 paragraphs and refe.docxMake sure it is in APA 7 format and at least 3-4 paragraphs and refe.docx
Make sure it is in APA 7 format and at least 3-4 paragraphs and refe.docx
 
Discussion 1Proposed Topic Appropriate Training and Coordin
Discussion 1Proposed Topic Appropriate Training and CoordinDiscussion 1Proposed Topic Appropriate Training and Coordin
Discussion 1Proposed Topic Appropriate Training and Coordin
 
DHHS ASPR Cybersecurity Threat Information Resources
DHHS ASPR Cybersecurity Threat Information ResourcesDHHS ASPR Cybersecurity Threat Information Resources
DHHS ASPR Cybersecurity Threat Information Resources
 
Blockchain technology in healthcare
Blockchain technology in healthcareBlockchain technology in healthcare
Blockchain technology in healthcare
 
CLOUD COMPUTING AND BYOD: BENEFITS AND CHALLENGES IN MODERN HEALTHCARE
CLOUD COMPUTING AND BYOD: BENEFITS AND CHALLENGES IN MODERN HEALTHCARECLOUD COMPUTING AND BYOD: BENEFITS AND CHALLENGES IN MODERN HEALTHCARE
CLOUD COMPUTING AND BYOD: BENEFITS AND CHALLENGES IN MODERN HEALTHCARE
 
Healthcare Information Technology Trends.docx
Healthcare Information Technology Trends.docxHealthcare Information Technology Trends.docx
Healthcare Information Technology Trends.docx
 
Answer the Below Question. APA format. 300 words.Textbook .docx
Answer the Below Question. APA format. 300 words.Textbook  .docxAnswer the Below Question. APA format. 300 words.Textbook  .docx
Answer the Below Question. APA format. 300 words.Textbook .docx
 
Essay On It Security
Essay On It SecurityEssay On It Security
Essay On It Security
 
Running head CYBER SECURITY .docx
Running head CYBER SECURITY                                  .docxRunning head CYBER SECURITY                                  .docx
Running head CYBER SECURITY .docx
 
Assistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docxAssistive Technology Considerations TemplateSubject AreaSample.docx
Assistive Technology Considerations TemplateSubject AreaSample.docx
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
 
CLOUD COMPUTING71Dissertation Factors affecting the adopt
CLOUD COMPUTING71Dissertation Factors affecting the adoptCLOUD COMPUTING71Dissertation Factors affecting the adopt
CLOUD COMPUTING71Dissertation Factors affecting the adopt
 
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
 

More from dorishigh

Cyber War versus Cyber Realities Cyber War v.docx
Cyber War versus Cyber Realities Cyber War v.docxCyber War versus Cyber Realities Cyber War v.docx
Cyber War versus Cyber Realities Cyber War v.docxdorishigh
 
Cyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docxCyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docxdorishigh
 
Cyber Security ThreatsYassir NourDr. Fonda IngramETCS-690 .docx
Cyber Security ThreatsYassir NourDr. Fonda IngramETCS-690 .docxCyber Security ThreatsYassir NourDr. Fonda IngramETCS-690 .docx
Cyber Security ThreatsYassir NourDr. Fonda IngramETCS-690 .docxdorishigh
 
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docxCyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docxdorishigh
 
Cyber Security Gone too farCarlos Diego LimaExce.docx
Cyber Security Gone too farCarlos Diego LimaExce.docxCyber Security Gone too farCarlos Diego LimaExce.docx
Cyber Security Gone too farCarlos Diego LimaExce.docxdorishigh
 
CW 1R Checklist and Feedback Sheet Student Copy Go through this.docx
CW 1R Checklist and Feedback Sheet Student Copy Go through this.docxCW 1R Checklist and Feedback Sheet Student Copy Go through this.docx
CW 1R Checklist and Feedback Sheet Student Copy Go through this.docxdorishigh
 
CW 1 Car Industry and AIby Victoria StephensonSubmission.docx
CW 1 Car Industry and AIby Victoria StephensonSubmission.docxCW 1 Car Industry and AIby Victoria StephensonSubmission.docx
CW 1 Car Industry and AIby Victoria StephensonSubmission.docxdorishigh
 
CWTS CWFT Module 7 Chapter 2 Eco-maps 1 ECO-MAPS .docx
CWTS CWFT Module 7 Chapter 2 Eco-maps 1 ECO-MAPS .docxCWTS CWFT Module 7 Chapter 2 Eco-maps 1 ECO-MAPS .docx
CWTS CWFT Module 7 Chapter 2 Eco-maps 1 ECO-MAPS .docxdorishigh
 
Cw2 Marking Rubric Managerial Finance0Fail2(1-29) Fail.docx
Cw2 Marking Rubric Managerial Finance0Fail2(1-29) Fail.docxCw2 Marking Rubric Managerial Finance0Fail2(1-29) Fail.docx
Cw2 Marking Rubric Managerial Finance0Fail2(1-29) Fail.docxdorishigh
 
Cyber AttacksProtecting National Infrastructure, 1st ed.Ch.docx
Cyber AttacksProtecting National Infrastructure, 1st ed.Ch.docxCyber AttacksProtecting National Infrastructure, 1st ed.Ch.docx
Cyber AttacksProtecting National Infrastructure, 1st ed.Ch.docxdorishigh
 
CVPSales price per unit$75.00Variable Cost per unit$67.00Fixed C.docx
CVPSales price per unit$75.00Variable Cost per unit$67.00Fixed C.docxCVPSales price per unit$75.00Variable Cost per unit$67.00Fixed C.docx
CVPSales price per unit$75.00Variable Cost per unit$67.00Fixed C.docxdorishigh
 
CYB207 v2Wk 4 – Assignment TemplateCYB205 v2Page 2 of 2.docx
CYB207 v2Wk 4 – Assignment TemplateCYB205 v2Page 2 of 2.docxCYB207 v2Wk 4 – Assignment TemplateCYB205 v2Page 2 of 2.docx
CYB207 v2Wk 4 – Assignment TemplateCYB205 v2Page 2 of 2.docxdorishigh
 
CUSTOMERSERVICE-TRAINIGPROGRAM 2 TA.docx
CUSTOMERSERVICE-TRAINIGPROGRAM 2  TA.docxCUSTOMERSERVICE-TRAINIGPROGRAM 2  TA.docx
CUSTOMERSERVICE-TRAINIGPROGRAM 2 TA.docxdorishigh
 
Customer Service Test (Chapter 6 - 10)Name Multiple Choice.docx
Customer Service Test (Chapter 6 - 10)Name Multiple Choice.docxCustomer Service Test (Chapter 6 - 10)Name Multiple Choice.docx
Customer Service Test (Chapter 6 - 10)Name Multiple Choice.docxdorishigh
 
Customer Value Funnel Questions1. Identify the relevant .docx
Customer Value Funnel Questions1. Identify the relevant .docxCustomer Value Funnel Questions1. Identify the relevant .docx
Customer Value Funnel Questions1. Identify the relevant .docxdorishigh
 
Customer service is something that we have all heard of and have som.docx
Customer service is something that we have all heard of and have som.docxCustomer service is something that we have all heard of and have som.docx
Customer service is something that we have all heard of and have som.docxdorishigh
 
Customer requests areProposed Cloud Architecture (5 pages n.docx
Customer requests areProposed Cloud Architecture (5 pages n.docxCustomer requests areProposed Cloud Architecture (5 pages n.docx
Customer requests areProposed Cloud Architecture (5 pages n.docxdorishigh
 
Customer Relationship Management Presented ByShan Gu Cris.docx
Customer Relationship Management Presented ByShan Gu Cris.docxCustomer Relationship Management Presented ByShan Gu Cris.docx
Customer Relationship Management Presented ByShan Gu Cris.docxdorishigh
 
Custom Vans Inc. Custom Vans Inc. specializes in converting st.docx
Custom Vans Inc. Custom Vans Inc. specializes in converting st.docxCustom Vans Inc. Custom Vans Inc. specializes in converting st.docx
Custom Vans Inc. Custom Vans Inc. specializes in converting st.docxdorishigh
 
Curtis HillTopic 07 Assignment Long-Term Care ChartHA30.docx
Curtis HillTopic 07 Assignment Long-Term Care ChartHA30.docxCurtis HillTopic 07 Assignment Long-Term Care ChartHA30.docx
Curtis HillTopic 07 Assignment Long-Term Care ChartHA30.docxdorishigh
 

More from dorishigh (20)

Cyber War versus Cyber Realities Cyber War v.docx
Cyber War versus Cyber Realities Cyber War v.docxCyber War versus Cyber Realities Cyber War v.docx
Cyber War versus Cyber Realities Cyber War v.docx
 
Cyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docxCyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docx
 
Cyber Security ThreatsYassir NourDr. Fonda IngramETCS-690 .docx
Cyber Security ThreatsYassir NourDr. Fonda IngramETCS-690 .docxCyber Security ThreatsYassir NourDr. Fonda IngramETCS-690 .docx
Cyber Security ThreatsYassir NourDr. Fonda IngramETCS-690 .docx
 
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docxCyber Security and the Internet of ThingsVulnerabilities, T.docx
Cyber Security and the Internet of ThingsVulnerabilities, T.docx
 
Cyber Security Gone too farCarlos Diego LimaExce.docx
Cyber Security Gone too farCarlos Diego LimaExce.docxCyber Security Gone too farCarlos Diego LimaExce.docx
Cyber Security Gone too farCarlos Diego LimaExce.docx
 
CW 1R Checklist and Feedback Sheet Student Copy Go through this.docx
CW 1R Checklist and Feedback Sheet Student Copy Go through this.docxCW 1R Checklist and Feedback Sheet Student Copy Go through this.docx
CW 1R Checklist and Feedback Sheet Student Copy Go through this.docx
 
CW 1 Car Industry and AIby Victoria StephensonSubmission.docx
CW 1 Car Industry and AIby Victoria StephensonSubmission.docxCW 1 Car Industry and AIby Victoria StephensonSubmission.docx
CW 1 Car Industry and AIby Victoria StephensonSubmission.docx
 
CWTS CWFT Module 7 Chapter 2 Eco-maps 1 ECO-MAPS .docx
CWTS CWFT Module 7 Chapter 2 Eco-maps 1 ECO-MAPS .docxCWTS CWFT Module 7 Chapter 2 Eco-maps 1 ECO-MAPS .docx
CWTS CWFT Module 7 Chapter 2 Eco-maps 1 ECO-MAPS .docx
 
Cw2 Marking Rubric Managerial Finance0Fail2(1-29) Fail.docx
Cw2 Marking Rubric Managerial Finance0Fail2(1-29) Fail.docxCw2 Marking Rubric Managerial Finance0Fail2(1-29) Fail.docx
Cw2 Marking Rubric Managerial Finance0Fail2(1-29) Fail.docx
 
Cyber AttacksProtecting National Infrastructure, 1st ed.Ch.docx
Cyber AttacksProtecting National Infrastructure, 1st ed.Ch.docxCyber AttacksProtecting National Infrastructure, 1st ed.Ch.docx
Cyber AttacksProtecting National Infrastructure, 1st ed.Ch.docx
 
CVPSales price per unit$75.00Variable Cost per unit$67.00Fixed C.docx
CVPSales price per unit$75.00Variable Cost per unit$67.00Fixed C.docxCVPSales price per unit$75.00Variable Cost per unit$67.00Fixed C.docx
CVPSales price per unit$75.00Variable Cost per unit$67.00Fixed C.docx
 
CYB207 v2Wk 4 – Assignment TemplateCYB205 v2Page 2 of 2.docx
CYB207 v2Wk 4 – Assignment TemplateCYB205 v2Page 2 of 2.docxCYB207 v2Wk 4 – Assignment TemplateCYB205 v2Page 2 of 2.docx
CYB207 v2Wk 4 – Assignment TemplateCYB205 v2Page 2 of 2.docx
 
CUSTOMERSERVICE-TRAINIGPROGRAM 2 TA.docx
CUSTOMERSERVICE-TRAINIGPROGRAM 2  TA.docxCUSTOMERSERVICE-TRAINIGPROGRAM 2  TA.docx
CUSTOMERSERVICE-TRAINIGPROGRAM 2 TA.docx
 
Customer Service Test (Chapter 6 - 10)Name Multiple Choice.docx
Customer Service Test (Chapter 6 - 10)Name Multiple Choice.docxCustomer Service Test (Chapter 6 - 10)Name Multiple Choice.docx
Customer Service Test (Chapter 6 - 10)Name Multiple Choice.docx
 
Customer Value Funnel Questions1. Identify the relevant .docx
Customer Value Funnel Questions1. Identify the relevant .docxCustomer Value Funnel Questions1. Identify the relevant .docx
Customer Value Funnel Questions1. Identify the relevant .docx
 
Customer service is something that we have all heard of and have som.docx
Customer service is something that we have all heard of and have som.docxCustomer service is something that we have all heard of and have som.docx
Customer service is something that we have all heard of and have som.docx
 
Customer requests areProposed Cloud Architecture (5 pages n.docx
Customer requests areProposed Cloud Architecture (5 pages n.docxCustomer requests areProposed Cloud Architecture (5 pages n.docx
Customer requests areProposed Cloud Architecture (5 pages n.docx
 
Customer Relationship Management Presented ByShan Gu Cris.docx
Customer Relationship Management Presented ByShan Gu Cris.docxCustomer Relationship Management Presented ByShan Gu Cris.docx
Customer Relationship Management Presented ByShan Gu Cris.docx
 
Custom Vans Inc. Custom Vans Inc. specializes in converting st.docx
Custom Vans Inc. Custom Vans Inc. specializes in converting st.docxCustom Vans Inc. Custom Vans Inc. specializes in converting st.docx
Custom Vans Inc. Custom Vans Inc. specializes in converting st.docx
 
Curtis HillTopic 07 Assignment Long-Term Care ChartHA30.docx
Curtis HillTopic 07 Assignment Long-Term Care ChartHA30.docxCurtis HillTopic 07 Assignment Long-Term Care ChartHA30.docx
Curtis HillTopic 07 Assignment Long-Term Care ChartHA30.docx
 

Recently uploaded

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

Cyber Security in Industry 4.0Cyber Security in Industry 4.0 (.docx

  • 1. Cyber Security in Industry 4.0 Cyber Security in Industry 4.0 (IEEE) Using Emerging Technology to Improve Compliance As cyber threats, malicious software, and cyber-attacks continue to escalate in sophistication, and no industry can remain immune to these threats. The IEEE has used industry-inspired advances in innovation and implementation to promote the highest level of cybersecurity standards for the most robustly protected information and communication technology infrastructure, from networks and telecommunication systems through websites, digital certificates, and passwords, and other software-based systems (Ardito et al., 2019). This Enhanced Canada Cybersecurity Standards and Certificates (ECCS&C) project strives to provide a common framework for enhanced cybersecurity across all sectors. The fourth industrial revolution is referred to as cybersecurity in Industry 4.0 and is encompassing three discrete components: machine learning, artificial intelligence, and automation.The effects of these four technologies will most certainly impact the processes and processes aspects of technology adoption. Over the next decade, we will most certainly see further and the further rise of robotics (Ardito et al., 2019). The industrial revolution will begin with smart factory security systems. For now, those systems are secure, but many manufacturers will soon provide safeguards against attack and malware threats to help prevent malware attacks and lawsuits. The processes can look simple like a boiler next to a giant hexagon. For example, all these processes would trigger heating or cooling at some point, and the heating or cooling can be controlled by digital control boxes connected to a smart grid (Shi et al., 2019). The industrial network will soon have more people connected in more complex networks, such as industrial warehouses. All of
  • 2. these buildings can communicate with each other and can remotely activate or deactivate automation systems to reduce manufacturing costs. The need for the defense, control, and monitoring of systems and networks. The blockchain is the most viable platform for these purposes (Shi et al., 2019). Decentralization is gaining respect and confidence on a global scale, and so there is a renewed emphasis on the blockchain in the industry. There is an abundance of articles on the blockchain's potential and benefits for companies. For example, more than fifty articles are covering the blockchain's potential for authentication, threat modeling, and development of social payment interfaces. Companies are beginning to explore smart contracts and smart systems for security, reputation, and data. All in all, it seems that all the evidence points to blockchain technology as the future of the financial industry (Shi et al., 2019). References Ardito, L., Petruzzelli, A. M., Panniello, U., & Garavelli, A. C. (2019). Towards Industry 4.0. Business Process Management Journal. Shi, L., Chen, X., Wen, S., & Xiang, Y. (2019, December). Main Enabling Technologies in Industry 4.0 and Cybersecurity Threats. In International Symposium on Cyberspace Safety and Security (pp. 588-597). Springer, Cham. Cyber Security in Industry 4.0 The core objective of the research is to assess the various forms of cybersecurity in various industries with a key focus on hyper connectivity of technological systems. In the current era of the emergence of new forms of technology, the wide range of cybersecurity strategies has resulted in effective security solutions to combat the increased cyber threats in organizations and industries (Dawson, 2018). Notably, the hyper connectivity of modern technologies has enhanced the effectiveness of
  • 3. security. Research findings indicate that the evolution of cybersecurity occurred as a result of the advancement of various attacks on confidentiality, integrity, and availability of information in digital technologies. Besides, researchers reveal that cybersecurity in industries involves the integration of modern technologies, such as cloud computing, the use of robotics, the internet of everything, the internet of things, and other relevant developments. Modern technology connections help industries in enhancing effective communication, risk visibility, and effective identification and risk mitigation (Dawson, 2018). Importantly, research reflects on the various pitfalls to the various hyper connected systems as a result of vulnerabilities to attacks, loopholes that support the attacks, and lack of security awareness among the employees in industries. In the current era of proliferation of modern technologies, industries can utilize effective strategies of enhancing the effectiveness of hyper connectivity and the process of developing security policies and awareness among all the involved stakeholders (Benson, McAlaney, & Frumkin, 2019). The implications of cybersecurity are promising as a result of government efforts of enhancing technology and security, cultivation of IT experts, and advancements in mobile information access. I will conduct comprehensive research on the need for embracing the culture of defense and using safe and legit sites of sharing information. Industries will have to embark on timely updates of applications, regular backup of files, and software updates. References Benson, V., McAlaney, J., & Frumkin, L. A. (2019). Emerging threats for the human element and countermeasures in current cyber security landscape. In Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications (pp. 1264-
  • 4. 1269). IGI Global. Dawson, M. (2018). Cyber security in industry 4.0: The pitfalls of having hyperconnected systems. Journal of Strategic Management Studies, 10(1), 19-28. Need help to reply three post. DO NOT JUST REPEAT SAME INFORMATION, DO NOT JUST SAY I AGREE OR THINGS LIKE THAT. YOU NEED TO ADD NEW INFORMATION TO DISCUSSION. 1- Each reply should be at least 200 words. 2- One scholarly reference ( NO MAYO CLINIC/ AHA) 3- APA style needs to be followed. 4- Each response should have reference at the end 5- Reference should be within last 5 years DQ-1 1- 300 minimum words for question, you can go up to 700 words. 2- 2-3 Scholarly references ( NO MAYO CLINIC/AHA) 3- References should be within 5 years 4- I am in acute care nurse practitioner program. DQ-1 Select a medication used for pain management and review available evidence and treatment guidelines to determine appropriate therapeutic options. Share the mechanism of action of this medication and hints for monitoring, side effects, and drug interactions, including CAM. In addition, share an example where you have observed an adverse event from a pain medication and explain the management taken regarding this adverse event. If you do not have an example, select an adverse event from the pain medication and explain what interventions you could make to mitigate this adverse event. Include references using APA format.
  • 5. DQ-2 Read and summarize the Topic Material "CDC Guideline for Prescribing Opioids for Chronic Pain - United States, 2016." Discuss any ethnic, cultural, or genetic differences that need to be considered for the use of opioids to treat chronic pain. How do you intend to use the guidelines in your future practice? DQ-3 Oxycodone is an opioid agonist for pain management of acute or chronic moderate to severe pain. It binds to opiate receptors, G- protein coupled receptors, in the central nervous systems (CNS) and activates the GDP for a GTP, which inhibits the adenylate cyclase and decreases the intracellular cAMP (Sadiq, Dice, & Mead, 2019). Consequently, oxycodone inhibits the nociceptive neurotransmitters acetylcholine, dopamine, GABA, noradrenaline, and substance P, altering perception and response to pain and producing CNS depression (Sadiq et al., 2019). Oxycodone is available in tablets and capsules in immediate-release and extended-release. Immediate-release doses range from 5 to 15 mg every 4 to 6 hours as needed while ER tablets are 10 mg and capsules are 9 mg every 12 hours (“Oxycodone,” 2019). Dosages may vary depending on opioid- tolerant patients, and for adequate pain control, dosages should titrate upwards with monitoring for potential side effects. The most common adverse effects include constipation, weakness, dizziness, dry mouth, nausea, vomiting, headache, and pruritis (Sadiq et al., 2019). Throughout initial therapy or increased dosage, the patient’s blood pressure, heart rate, and respiratory rate should be monitored, as well as, the side effects. Oxycodone may impair mental and physical abilities and cause hypotension and respiratory depression. It is important extended-release tablets are swallowed whole as crushing or chewing can cause rapid release leading to respiratory depression and further carbon dioxide retention can exacerbate sedating effects, which may be fatal (“Oxycodone,” 2019). Drug interactions that may increase the oxycodone serum
  • 6. concentration and enhance adverse effects, include CYP450 inhibitors, benzodiazepines, amphetamines, anticholinergic, CNS depressants, rufinamide, selective serotonin reuptake inhibitors, and zolpidem (“Oxycodone,” 2019). Complementary and alternative medicine (CAM) interactions with oxycodone include ephedra, Jamaica dogwood, kava kava, and lavender, as this may enhance the effects of CNS depressants, whereas St. John’s Wort may decrease the serum concentration of oxycodone. There are always patients that deal with constipation after taking oxycodone. A patient came in the ER with severe abdominal pain, nausea, and vomiting. The CT scan showed a bowel obstruction and the patient was taking to the OR for an exploratory laparotomy with bowel resection. When the section of the bowel was removed, the surgeon pulled out pieces of fecal that was hard as a rock. According to the notes, the patient was at a rehab facility due to a hip hemiarthroplasty four weeks prior. Current medications included an opioid for post-operative pain management. Patient had no prior abdominal conditions, but opioid use, age, and possible concomitant medications can be causative factors for the bowel obstruction. In elderly patients, constipation is more common, which can be due to decreased mobility, medical conditions, and/or concomitant medications; however, stool softeners may be beneficial for many patients as it may improve bowel function and quality of life (Morlion et al., 2017). Other recommendations may be to increase fiber into their diet or increase physical activity to increase bowel movement. Also, other therapies should be recommended instead of prolonging the use of opioids, such as acetaminophen or NSAIDS. As prescribers it is essential to monitor all side effects and appropriate use of any opioids as we have to consider to discontinue the medication if the benefits don’t outweigh the risks. References Morlion, B. J., Mueller-Lissner, S. A., Vellucci, R., Leppert,
  • 7. W., Coffin, B. C., Dickerson, S. L., & O’Brien, T. (2017). Oral prolonged-release oxycodone/naloxone for managing pain and opioid-induced constipation: A review of the evidence. Pain Practice, 18(5), 647-665. doi:10.1111/papr.12646 Oxycodone. (2019). Retrieved from https://www.drugs.com/ppa/oxycodone.html Sadiq, N. M., Dice, T. J., & Mead, T. (2019). Oxycodone. StatPearls Publishing. Retrieved from https://www.ncbi.nlm.nih.gov/books/NBK482226/ DQ-4 Morphine is often chosen as a front-line drug in the management of chronic non-cancer pain (Broglio et al., 2017). Morphine is in a class of drugs called opioid analgesics and work on the delta, kappa, and mu-opioid receptors (Murphy & Barrett, 2019). Analgesic effects are achieved when binding to the mu-opioid receptor within the central nervous system (Murphy & Barrett, 2019). Once this occurs, there is an activation of descending inhibitory pathways of the central nervous system and inhibition of the nociceptive afferent neurons of the peripheral nervous system leading to an overall reduction of nociceptive transmission (Murphy & Barrett, 2019). Morphine can be given in a variety of ways. Some routes include oral with immediate-release and extended-release, intravenous, epidural, and intrathecal formulations (Murphy & Barrett, 2019). One option that is frequently used in palliative care is sublingual and as an oral suspension (Murphy & Barrett, 2019). Some drug-drug interactions include the concurrent use of MAOIs as they create an additive effect with morphine, causing severe hypotension, serotonin syndrome, or an increase in respiratory depression in patients (Murphy & Barrett, 2019). Some side effects include blurred vision, numbness in the extremities, chills, confusion, dizziness, fainting, headache, hives or rash, loss of appetite, constipation, and nausea
  • 8. (Murphy & Barrett, 2019). The biggest risks of morphine are addiction, abuse, and misuse (Murphy & Barrett, 2019). These side effects can lead to overdose and death (Murphy & Barrett, 2019). Each patient needs to be assessed for their risk of substance addiction and abuse before prescribing (Murphy & Barrett, 2019). Overdose of morphine displays as decreased level of consciousness and respiratory depression that can be life-threatening or fatal (Murphy & Barrett, 2019). There are withdrawal symptoms from morphine as well (Murphy & Barrett, 2019). These symptoms include hallucinations, tremors, mood swings, and irritability (Murphy & Barrett, 2019). Some can be so extensive that they can cause seizures (Murphy & Barrett, 2019). The best way to avoid withdrawal symptoms is to taper the dose down until it is within a safe dosage to stop it altogether (Murphy & Barrett, 2019). An example I have of the use of morphine was actually last week. We received a young patient from the ER who had developed a very large pleural effusion and was going to the ICU to meet the Intensivist to receive a thoracentesis. The procedure went well without any issues, but post-procedure the patient began to complain of pain with breathing due to lung re- expansion. The physician ordered morphine 2mg IVP Q4h PRN Pain >7, and the nurse gave the first dose. Within 30 minutes the patient began to display signs of altered mental status and confusion. Fifteen minutes later the patient was sleeping and their respiratory rate had fallen to 8 breaths per minute and their oxygen saturation had dropped to 90%. At this point, the decision was made to give the reversal agent Narcan, discontinue morphine, and treat with a combination of acetaminophen and ibuprofen. Within 30 seconds of administering Narcan, the patient became arousable, alert and oriented, and began to cough and take deep breaths. After explaining what happened to the patient, they agreed a lower regiment of pain management was appropriate. References:
  • 9. Broglio, K., Pergolizzi, J., Kowalski, M., Lynch, S. Y., He, E., & Wen, W. (2017). Efficacy and Safety of Once-Daily Extended-Release ( ER) Hydrocodone in Individuals Previously Receiving ER Morphine for Chronic Pain. Pain Practice, 17(3), 382–391. https://doi-org.lopes.idm.oclc.org/10.1111/papr.12462 Murphy, P.B, & Barrett, M.J. (2019) Statpearls for Morphine. Treasure Island. Retrieved from: https://www.ncbi.nlm.nih.gov/books/NBK526115/ DQ-5 There are increasing prescription of opioids in the united states. The amount of opioid overdose death is also increasing. Primary care providers have reported that they have concerns about pain medication misuse. The problem is managing patients with chronic pain and effectively controlling their pain using this new system. The guidelines are set in place to target and help primary care providers that treat patients with chronic pain. To avoid over prescription the CDC has established guidelines in order to prescribe effectively. This grading recommendations of assessment can be a tool to help the primary care provider effectively prescribe the adequate number of opioids. The CDC has developed training sessions in order to use this new grading system effectively. There is evidence that this new system may have some benefit in prescription of opioids. The problem with these new guidelines is that people are different an have different medication thresholds. What may be good treatment for 1 patient may not work for others. Cultural needs to be viewed as well in order to better understand the patients pain level. The patients need relative pain control relative to risks associated with the prescribed opioid. A combination of non pharmacological interventions may be used to incorporate pharmacological opioid administration. Still methadone, fentanyl oxycodone oxymorphone hydrocodone and morphine have all shown to higher risks of overdose when initiating treatment. Methadone overdose continues to increase (Jones,Baldwin,Manocchio,White,Mack,2016). I will attempt to
  • 10. use these guideline in order to effectively treat chronic pain. In the moment that I feel the pain management is complicated I will set referrals to pain specialists. Opioids are dangerous and can cause overdose as future providers we need to limit for potential abuse of these medications (CDC Guidelines for prescribing opioids for chronic pain-United States, 2016). Reference Jones, C. M., Baldwin, G. T., Manocchio, T., White, J. O., & Mack, K. A. (2016). Trends in Methadone Distribution for Pain Treatment, Methadone Diversion, and Overdose Deaths - United States, 2002-2014. MMWR: Morbidity & Mortality Weekly Report, 65(26), 667–671. https://doi.org/10.15585/mmwr.mm6526a2