Free Essay

Vpn vs Ids

In:

Submitted By DHop
Words 1372
Pages 6
Compare and Contrast Three Intrusion Detection Systems (IDS)
Devon Hopkins
Webster University

Introduction In the today’s society security is of paramount importance, whether it’s your business, home, vehicle, or computer. Companies are responsible for securing their employees, work area and the technology they use to operate their business. On a daily basis companies are under attack making them vulnerable to more and more worms, viruses, denial of service (DoS) attacks and hacking, shutting them down for various periods of times. With the advance technology more and more companies are storing information digitally. Having unsecure networks are leading to enormous amount of private information being public. The networks should protect data and maintain confidentiality, integrity and availability of the network. Companies should implement intrusion detection systems (IDS) because hackers are smarter and their intrusions are getting harder to trace.
Intrusion Detection System An intrusion detection system or IDS is a system that attempts to identify intrusions, which can be defined to be unauthorized uses, misuses, or abuses of the computer systems by either authorized users or external perpetrators [1]. The in the past the major ways that intrusion detection systems were described were host based IDS (HIDS) and network based IDS (NIDS). An addition to the IDS family is perimeter intrusion detection systems (PIDS). A perimeter intrusion detection system will be installed within the isolation zone to detect the presence of individuals or vehicles [3]. In parallel to rigorous investigation into intrusion prevention such as firewall and cryptography, the significance of research into IDS has been growing and various approaches have been suggested and developed [1].

Host based Intrusion Detection Systems
HIDS is used on host(s) to monitor, audit and detect incidents for the system(s) that they are running on. Host-based IDSs operate on information collected from within an individual computer system [8]. The systems were designed to prevent insiders from interrupting service but do not prevent individuals from outside to carry out an intrusion. On a HIDS there are multiple computers being monitored at the same time. This is needed to provide a visual for all possible intrusion points Host based IDSs look for changes in file attributes (create, modify, delete)[7].
Network based Intrusion Detection Systems NIDS monitors network traffic looking for patterns of denial of service. Network-based IDS can monitor the network traffic affecting multiple hosts that are connected to the network segment, thereby protecting those hosts [8]. The attacks are detected by capturing and analyzing network packets. Network IDs must match known and unknown attack strategies against their knowledge base to determine where and attack has occurred [7].
Perimeter Intrusion Detection Systems (PIDS)
Perimeter Intrusion Detection Systems is a complex commingling of multiple systems that provides advanced warning and threat assessment [4]. Physical controls and are put in place to ensure confidentiality, integrity, and availability. PIDS is a fast emerging application often deployed to prevent intrusion of unauthorized personnel into secure areas such as airports, maximum-security detention centers, nuclear facilities and more [4].

Compare and Contrast
Host intrusion detection system [6]: Host-based systems provide poor real-time response and cannot effectively protect against one-time catastrophic events. They are, however, excellent at detecting and responding to long term attacks, such as data thieving or disgruntled employees. Host-based systems stand out when it comes to determining the extent of a compromise after loss. They usually maintain large databases that indicate historical information that could serve as evidence in the prosecution of the misuser. Host-based [8] measure whether an attack was successful or not with greater accuracy and fewer false positives can network-based systems. Host-based IDS monitor user and file access activity, including file accesses, changes to file permissions, attempts to install new executables and/or attempts to access privileged services. Host-based systems can detect attacks that cannot be seen by network-based products. Host-based intrusion detection does not offer true real-time response; it can come extremely close if implemented correctly. Host-based intrusion detection resides on existing network infrastructure, including file servers, Web servers, and other shared resources. Host-based intrusion detection systems, on the other hand, are often priced in the hundreds of dollars for a single agent and can be deployed by a customer with limited initial capital outlay.

Network intrusion detection systems [6]: Network intrusion detection is the exact opposite. It is effective at real-time detection and response as it pertains to the network. Network intrusion detection can also be effective at detecting long-term attacks suck as sniffer programs regularly reporting information from outside the firewall. Network intrusion detection can be used to trace a series of connections through a network. This could be helpful in finding the misuser to whom the evidence from the host-based system can be attributed to. [8]: Network-based systems do not require software to be loaded and managed on a variety of hosts. Since fewer detection points are required, the cost of ownership is lower for an enterprise environment. Network-based IDS examine all packet headers for signs of malicious and suspicious activity. Network-based IDS use live network traffic for real-time attack detection. Network-based IDS detect malicious and suspicious attacks as they occur, and so provide faster notification and response. Network-based IDS add valuable data for determining malicious intent. Network-based IDS are not dependent on host operating systems as detection sources.

Perimeter intrusion detection system [3]: objective is to deter, delay, detect, assess, and track, potential or actual breaches of the perimeter in a proactive manner, enhance the efficiency of security personnel in responding to security breaches, and provide a high level of protection for persons and property within the secured areas of an airport.

Table 1-1 Comparative Analysis of Host, Network and Perimeter Intrusion Detection Systems | HIDS | NIDS | PIDS | Assets protected | Verifies success or failure of an attack | Detects unsuccessful attacks and malicious intent | Detects attempts to break through walls | Cost to implement | Lower cost of entry | Lowers cost of ownership | Low Cost of installation | Performance | Well-suited for encrypted and switched environments | More difficult for an attacker to remove evidence | Microprocessor controlled system adapts tochanging environmental conditions | Uses | Near-real-time detection and response | Real-time detection and response | Monitors signals generated by movementscaused by an intruder attempting to cut orclimb the perimeter fence | Vulnerabilities addressed | Detects attacks that network-based systems miss | Detects attacks that host-based systems miss | Enhanced reliability |
Host based and Network based analysis provided by [10].
Perimeter analysis provided by [5].VAN ENCING & SECURITY TECHNOLOGIES DVANCED FENCING & S
ECURITY TECHNOLOGI
ES LTD
Conclusion
Intrusion can occurs whether it is on a host, network or on the perimeter. These areas are becoming more and more targets. Host-based systems are designed more to deter insiders, but can’t effectively deter outsiders [6] Network intrusion detection systems NIDS) are considered an effective second line of defense against network-based attacks directed at computer systems [2]. Perimeter intrusion detection systems rely on dual technology to strengthen intrusion detection, and reduce false alarms [9]. Host based intrusion detection systems detects insider misuse while network intrusion detection systems detects outsider misuse and perimeter intrusion detects intrusion to buildings and critical infrastructures. Companies need to have reliable methods to detect attacks, mitigate vulnerabilities and protect their assets.

Works Cited

[1] B. Mukherjee, L.T. Heberlein. and K.N. Levitt. (1994, May/June). Network Intrusion Detection. IEEE Network , 8, pp. 24-41.
[2] Bace, R. (2000). Intrusion Detection. McMillian .
[3] Barnard, R. l. (1988). Intrusion Detection Systems, Second Edition. Newton: Butterworth-Heinemann.
[4] Fijitsu. (2006). Perimeter Intrusion Detection Systems (PIDS). Texas: Fijitsu Network Communications, Inc.
[5] G.M. Advance Fencing & SecurityTechnologies LTD. (n.d.). Retrieved from www.gmsecurity.com/V- ALERT%20PERIMETER.pdf.
[6] Kozushko, H. (2003). Intrusion Detection Systems: Host-Based and Network-Based Intrustion Detection Systems.
[7] Mattord, Michael E. Whitman and Herbert J. (2008). Management of Imformation Security. Boston: Course technology, Cengage Learning.
[8] NIST. Intrustion Detection Systems sp800-31.
[9] Purpura, P. P. (2007). Terriosm and Homeland Security: an introduction with applications. Burlington: Elsevier, Inc.
[10] Systems, Internet Security. (1998). Network-vs. host-based intrusion Detection: A Guide to Intrusion setection technology. Atlanta.

Similar Documents

Premium Essay

Mpls

...IP/MPLS-Based VPNs Layer-3 vs. Layer-2 IP/MPLS-Based VPNs Layer-3 vs. Layer-2 Table of Contents WHITE PAPER 1. 2. 3. 4. 5. 6. Objective ..................................................................................................................... 3 Target Audience .......................................................................................................... 3 Pre-Requisites.............................................................................................................. 3 Introduction ................................................................................................................. 3 MPLS Layer-3 VPNs .................................................................................................. 4 MPLS Layer-2 VPNs .................................................................................................. 7 6.1. Point-to-Point Connectivity ................................................................................. 8 6.2. Multi-Point Connectivity...................................................................................... 9 7. Which Way to Go: The Layer-3 or The Layer-2 Way.............................................. 12 8. Summary ................................................................................................................... 15 FOUNDRY NETWORKS Page 2 of 16 IP/MPLS-Based VPNs Layer-3 vs. Layer-2 WHITE PAPER 1. Objective To give the reader an insight into the pros...

Words: 5621 - Pages: 23

Premium Essay

Myrtle & Associates/Bellview Law Group to Mab Law Firm Network Integration

...Diagram Please See Exhibit (A-1 & A-2) Diagram of Proposed Network Integration Please See Exhibit (B) Challenges to Integrating the Current LANs, Challenges integrating the Myrtle & Associates and Bellview Law Group networks will be presented by the following: * The geographical distance between the two offices (L2TP/IPsec) * Bellview Law Group use of Novell and IPX/SPX instead of TCP/IP Integrating these two networks will be faced by the geographical distance between the two offices where the law firms reside. One solution would be to lease a dedicated line however; this option would be a very expensive one and is unnecessary due to new Virtual Private Network (VPN) technologies such as Layer 2 Tunneling Protocol (L2TP). Layer 2 Tunneling Protocol (L2TP) is a VPN technology allows for communication between two LAN segments separated by geographic distance by means of Point to Point Protocol (PPP) & encryption. Encryption, which is the process of converting the senders “plaintext” to a unreadable altered version of that plaintext called “ciphertext.” This feat is accomplished by using an algorithm, also called a cipher. The cipher makes the data being communicated unreadable to anyone except an entity possessing a special...

Words: 2057 - Pages: 9

Premium Essay

Network Design

...buildings in six different locations throughout the world that needs to be networked collectively.   All the remote locations need to communicate effectively with the main headquarters that is in Atlanta, Georgia. The two buildings that house the headquarters are located across from each other. One building is used solely for corporate operations whereas the other building is for staffing the sales and engineering department. PBX vs VOIP PBX (Private Branch Exchange) is a system that has been around for a while. This allows users to communicate to other users in an office, even without an outside line connected. In a normal environment, the user would have to dial a specific number (or code) to access an outside line. In this way an end user could dial a number that would stay internally. A PBX also allows the users to share the lines that are accessible to the company. If a customer were to call the company on the main line, the receptionist could transfer that call to the salesperson. PBX systems also allow for many other features such as: Voice mail, Caller ID, Programmable phones, Extensions, Hold Music, and ect. The biggest downside of a PBX system would be the number (or extension) is attached to the line. Therefore, if a user changes offices they would physically change the wire on the punch block. Another downside is the phones are normally proprietary, meaning that you cannot go buy just any phone and expect it to work. The phone service that is needed...

Words: 2572 - Pages: 11

Premium Essay

It Management - It560

...IT Management IT560-01 Unit 1 Assignment Donald Harris Kaplan University Table of Contents Introduction 3 Internet Competition 3 Organizational Strategy 4 Virtual Employee Productivity Measurement 4 Virtual Employee Connection 6 Virtual Employee Telecommunication 6 Cloud Computing 6 Other Considerations 7 References 8 Introduction In becoming the I.T. Manager for ‘The Best Widget, Inc.’, there are multiple aspects of this multinational organization that must be taken into account from a technology standpoint – specifically, the virtual segment of the business. With respect to evaluation of the virtual organization, there are six primary considerations that should be evaluated. These conditions entail the following: Internet Competition, Organizational Strategy, Remote Employee Considerations (Including productivity measurement, infrastructure, and telecommunications), and Cloud Computing. In addition to these core topics, other items must be evaluated prior to implementing a virtual organization. These considerations will also be evaluated below. Internet Competition In leveraging the available power of the internet, today’s businesses can greatly enhance their advantage over the competition, especially ‘The Best Widget, Inc.’. Of particular interest are two areas that can aid ‘The Best Widget, Inc.’ with respect to their competitive advantage. These two areas are those of competition research and advertising. Through internet...

Words: 1620 - Pages: 7

Premium Essay

Rectifier

... Rectifiers • DEFINITION: Converting AC (from mains or other AC source) to DC power by using power diodes or by controlling the firing angles of thyristors/controllable switches. • Basic block diagram AC input DC output • Input can be single or multi-phase (e.g. 3phase). • Output can be made fixed or variable • Applications: DC welder, DC motor drive, Battery charger,DC power supply, HVDC Power Electronics and Drives (Version 3-2003), Dr. Zainal Salam, 2003 2 Single-phase, half-wave, R-load + vs _ vs + vo _ π vo io 2π ωt Output voltage (DC or average), V Vo = Vavg = 1 Vm sin(ωt )dωt = m = 0.318Vm 2π 0 π Output voltage (rms), Vm 1 (Vm sin(ωt )dωt ) = = 0.5Vm Vo , RMS = 2π 0 2 Power Electronics and Drives (Version 3-2003), Dr. Zainal Salam, 2003 3 π π 2 Half-wave with R-L load i + vR _ + vL _ + vo _ + vs _ Vm sin(ωt ) = i (ωt ) R + L i (ωt ) = i f (ωt ) + in (ωt ) di (ωt ) dωt First order differential eqn. Solution : KVL : vs = v R + v L i f : forced response; in natural response, From diagram, forced response is : i f (ωt ) = where : Z = R 2 + (ωL) 2 Vm ⋅ sin(ωt − θ ) Z θ = tan −1 ωL R Power Electronics and Drives (Version 3-2003), Dr. Zainal Salam, 2003 4 R-L load Natural response is when source = 0, di (ωt ) i (ωt ) R + L =0 dωt which results in : in (ωt ) = Ae −ωt ωτ ; τ = L R Hence Vm i (ωt ) = i f (ωt ) + in (ωt ) = ⋅ sin(ωt − θ ) + Ae −ωt ωτ Z A can be solved by realising inductor...

Words: 3498 - Pages: 14

Free Essay

Mpls

...EXECUTIVE SUMMARY MPLS, or Multiprotocol Label Switching, is a next generation, more intelligent nnetwork that will enable companies to expand their current infrastructures to do a wide variety of services. Since MPLS is independent of access technologies, it will allow subscribers to access differing access links without changing their current environment. MPLS takes the control of IP routing and combines it with layer 2 switching to give a seamless solution to the many needs of companies today (Semeria, 1999). The goal of MPLS was to standardize protocols that used label-swapping forwarding techniques to support unicast and multicast routing (Yuan, 2002). Many ISP networks today are built using an overlay model, in which IP’s topologies run independent of layer 2 switch topology, such as ATM and Frame Relay (Semeria, 1999). MPLS took advantage of the rapid advances in semiconductor components and focused on separating the routing and forwarding problems from each other; layer 2 switches provide high-speed connectivity, while IP routers, interconnected by a mesh of layer 2 circuits, provide intelligence to forward IP datagrams (Semeria, 1999). With these two topologies combined, you are able to get a fast, intelligent network. MPLS is used by many network operators today because it can support a diverse legacy system as well as modernize them for next-generation applications (Cisco, 2013). Because of its many uses, MPLS can be used to facilitate many different forms of...

Words: 1246 - Pages: 5

Premium Essay

Computer Security

...PA r T O N e Foundations of Network Security Fundamentals of Network Security 2 Firewall Fundamentals 43 VPN Fundamentals 79 Network Security Threats and Issues 111 CHAPTer Fundamentals of Network Security 1 C OMPUTER NETWORK SECURITY is very complex. New threats from inside and outside networks appear constantly. Just as constantly, the security community is always developing new products and procedures to defend against threats of the past and unknowns of the future. As companies merge, people lose their jobs, new equipment comes on line, and business tasks change, people do not always do what we expect. Network security configurations that worked well yesterday, might not work quite as well tomorrow. In an ever-changing business climate, whom should you trust? Has your trust been violated? How would you even know? Who is attempting to harm your network this time? Because of these complex issues, you need to understand the essentials of network security. This chapter will introduce you to the basic elements of network security. Once you have a firm grasp of these fundamentals, you will be well equipped to put effective security measures into practice on your organization’s network. While this textbook focuses on general network security, including firewalls and virtual private networks (VPNs), many of the important basics of network security are introduced in this chapter. In Chapters 1–4, network security...

Words: 16205 - Pages: 65

Premium Essay

Jacket-X Paper

...Vulnerability Assessment for Jacket-X Corporation University of Maryland University College Abstract The Jacket-X Corporation is a manufacturer of industrial-grade gloves, jackets, and other safety-related clothing applications. The Chief Information Officer (CIO) at Jacket-X is concerned with the current Information Technology (IT) security implementations and procedures. He has valid concerns due to reports from Human Resources (HR) stating financial issues with last year’s payrolls. There are also concerns with external network vulnerabilities that possibly can give hackers unauthorized access to company data and information. The CIO has internal IT security concerns due to a recent incident with an executive employee infecting the company’s network with malicious software from a company issued laptop. To help stay current with technology and compliant with federal laws Jacket-X decided to install a new Identity Management (IdM) system with Single Sign On (SSO) features. Several employees and customers do not like the new IdM system due to having privacy and data access concerns. This paper will analyze and discuss potential threats and vulnerabilities within the Jacket-X Corporation enterprise network. The paper will identify various IT security measures that will address the known threats and vulnerabilities. There will be discussions and recommendations made for choosing the best IdM system for Jacket-X. These discussions will also consist of the company addressing...

Words: 6831 - Pages: 28

Free Essay

Network Management

...Section – I: 1) Explain why the performance of an Ethernet LAN decreases with an increase in the number of stations on the LAN, whereas it increases (at least initially) with the increase in the number of stations in a token-ring LAN? A) There are too many differences between Token Ring and Ethernet to list out here. You could read more about it from many useful search results for "ethernet vs. token ring." I'll point out a key difference and give you a source answering your question on performance. Ethernet is based on CSMA/CD (carrier sense multiple access with collision detection), meaning multiple stations sense the carrier at the same time and send data when the carrier is free. However, there might be multiple stations sending a free carrier and send the data at the same time, causing "collision." Collision is the main factor affecting ethernet's performance. The more stations on the same LAN, the higher the collision rate, the lower the performance. Token Ring, on the other hand, is based on a control/access given to the station owning the "token." Think of a token as the key to the media: whichever station has the token would be allowed to use the ring to send the data. So there would be no collision, just multiple stations competing for the same token. With not too many stations, the wait-for and claim of the token is very efficient (think of a video game with less players waiting to play it.) But if there are too many stations, most would just sit around and...

Words: 923 - Pages: 4

Free Essay

Test

...IPV6 IN DE REALITEIT Stijn Willems Promotoren Dhr. A. Geraerts Dhr. J. Cleuren Cegeka XIOS Hogeschool Limburg Bachelorproef academiejaar 2010-2011 2 IPV6 IN DE REALITEIT Stijn Willems Promotoren Dhr. A. Geraerts Dhr. J. Cleuren Cegeka XIOS Hogeschool Limburg Systemen & Netwerken Bachelorproef academiejaar 2010-2011 XIOS Hogeschool Limburg Universitaire Campus – Gebouw H – 3590 Diepenbeek Cegeka Universiteitslaan 9 – 3500 Hasselt 4 Dankbetuiging Deze scriptie is het eindstadium van mijn professionele bacheloropleiding Toegepaste Informatica aan de XIOS Hogeschool Limburg. Om mijn kennis en vaardigheden in praktijk om te zetten, heeft Cegeka mij de kans gegeven een boeiend stageproject uit te werken. Verschillende mensen hebben hun steentje bijgedragen aan dit eindwerk. Graag zou ik deze mensen willen bedanken voor hun steun en kennis die ze mij hebben toevertrouwd. In de eerste plaats zou ik graag mijn bedrijfspromotor, Andy Geraerts, willen bedanken voor de tijd die hij voor mij heeft vrijgemaakt. Zijn begeleiding en steun hebben mij veel bijgebracht. Verder zou ik graag mijn stagepromotor, Johan Cleuren, willen bedanken voor de steun en het vertrouwen tijdens de realisatie van deze scriptie. Graag richt ik ook een dankwoordje aan alle werknemers van de afdeling Network & Security voor de aangename werksfeer. Mijn bijzondere dank gaat uit naar mijn ouders. Zij hebben mij de kans gegeven om deze opleiding te volgen en hebben mij...

Words: 8346 - Pages: 34

Free Essay

Cis 534 - Lab Manual

...CIS 534 - Advanced Network Security Design 1 CIS 534 Advanced Network Security Design CIS 534 - Advanced Network Security Design 2 Table of Contents Toolwire Lab 1:Analyzing IP Protocols with Wireshark ........................................................................ 6 Introduction ............................................................................................................................................. 6 Learning Objectives ................................................................................................................................ 6 Tools and Software ................................................................................................................................. 7 Deliverables ............................................................................................................................................. 7 Evaluation Criteria and Rubrics ........................................................................................................... 7 Hands-On Steps ....................................................................................................................................... 8 Part 1: Exploring Wireshark ............................................................................................................... 8 Part 2: Analyzing Wireshark Capture Information .......................................................................... 12 Lab #1 - Assessment Worksheet...

Words: 48147 - Pages: 193

Free Essay

Capstone

...WeMakeConnections TTI Multi Campus Network Executive Summary: WeMakeConnections is an up-and-coming networking and infrastructure company; we offer network solutions that are customized to each client, and their specific financial and technical needs. We provide a le82vel of service you would expect from a close friend, not a company. We service all network sizes, large and small, and have worked extensively with existing network upgrades, as well as total network creation. WeMakeConnections offers personalized services to match any budget. In this day and age competition is fierce, and money is tight. That is why we only hire people who love networking; they know what works, what doesn't, and where we can cut waste. That is why WeMakeConnections is the only company that offers a complimentary follow up, one month after your network is complete. We want to make sure you love your network. Each of our eight core employee's graduated from the prestigious ITT Tech, San Diego. Each has a passion for networking, and genuine love for problem solving. From the cabling in the walls to workstations on the desks, a trained professional will be on the job. Based on the request for proposal from TTI, we have created what may be, our masterpiece work. The following pages detail our plan of action for TTI's success, and subsequent expansions. We are confident that our network provides the best return on investment for TTI's four additional campuses, and will be easily scaled to...

Words: 18593 - Pages: 75

Premium Essay

Operatonal Risk Managaement

...12FN-104 Operational Risk Management By Rishabh Jain 12FN-104 June, 2013 Operational Risk Management By Rishabh Jain 12FN-104 Under the guidance of Shri Rahul Gupta Dr. Seeta Gupta Senior Consultant Associate Professor, HR & OB Area Ernst & Young, India IMT, Ghaziabad June, 2013 Certificate of Approval The following Summer Project Report titled "Operational Risk Management" is hereby approved as a certified study in management carried out and presented in a manner satisfactory to warrant its acceptance as a prerequisite for the award of Post-Graduate Diploma in Management for which it has been submitted. It is understood that by this approval the undersigned do not necessarily endorse or approve any statement made, opinion expressed or conclusion drawn therein but approve the Summer Project Report only for the purpose it is submitted. Summer Project Report Examination Committee for evaluation of Summer Project Report Name Signature 1. Faculty Examiner Dr. Seeta Gupta 2. PG Summer Project Co-coordinator Mr. Rahul Gupta Certificate from Summer Project Guides This is to certify that Mr. Rishabh Jain, a student of the Post-Graduate Diploma in Management, has worked under our guidance and supervision. This Summer Project Report has the requisite standard and to the best of our knowledge no part of it has been reproduced from any other summer project...

Words: 7569 - Pages: 31

Premium Essay

System Build Project Mgt 321 (2)

...A Communication Network and Information System (CNIS) Upgrade Plan System Build Project Student Name 6/15/2011 Dr. Beverlin Hammett Management 321 Baker College Online Table of Contents 1.0 Introduction…………………………………………………………….2 1.1 Background……………………………………………………..2 1.2 Discovery……………………………………………………….2 1.3 Product Overview……………………………………………….3 2.0 Product Review………………………………………………………...4 2.1 Process Flow…………………………………………………….5 3.0 System Integration……………………………………………………..6 3.1 Current System………………………..………………………...6 3.2 Compatibility Issues…………………………………………….7 3.3 Decision-Making Support Models………………………………7 3.4 Advantages and Disadvantages………………………………….7 3.5 Implementation Process…………………………………………8 4.0 Component Design……………………………………………………...8 4.1 Hardware Components…………………………………………..9 4.1.1 Databases…………………………………………….9 4.1.2 Communication Devices……………………………..9 4.1.3 Intranet and Wi-Fi……………………………………9 4.2 Software Components……………………………………………9 4.2.1 Vetport and MIS Software……………………………9 4.3 System Maintenance…………………………………………….10 4.4 Cost Analysis……………………………………………………10 4.4.1 New Hardware and Software Cost………………….10 4.4.2 Total Annual Budget Comparison…………………..11 4.5 Security………………………………………………………….11 4.6 Organizational Culture………………………………………….11 5.0 Measurement…………………………………………………………...12 5.1 Staffing and Record Keeping……………………………………12 5.2 Cost Benefit Comparison………………………………………..12 5.3 Return on Investment……………………………………………13 Table of...

Words: 4607 - Pages: 19

Premium Essay

Strategic Bpo in the Us Healthcare Industry

...to grope for answers in an ever changing environment, the light at the end of the tunnel seems far away and a dim one at that. Regardless of the concepts that will or will not be around three years from now, one thing is certain, the degree of COMPLEXITY is increasing by the day. Healthcare Payors are facing the following points of pain: 1. Managing increasing medical costs and balancing customer satisfaction 2. Reducing operating back-office costs 3. Complying with HIPAA standards and requirements 4. Upgrading IT infrastructure and moving to the web to provide real-time connectivity 5. Focusing on survival and developing a strategy to differentiate products from other incumbents and new players Value Chain vs. Value Chain Competition The healthcare benefit administration value chain is unlike any other. While the manufacturing value chain is easy to decipher and understand, this one is as arcane to do so. The complexity coupled with the dynamism has given rise to multiple organizations...

Words: 1843 - Pages: 8