Security Immunization Using Basic Countermeasures

نویسنده

  • Patricia A. H. Williams
چکیده

The increased use of computing has significantly raised the profile of information security within the clinical environment. Medical information security is concerned with protecting the assets of a medical practice. These assets include hardware, software and intellectual property. To date, computer and information security in this environment has been poorly applied. Whilst the tenets of confidentiality and privacy are paramount in the practise of medicine, they are inadequately protected in the evolving electronic environment. Protection stems from an acknowledgment that risks exist, the identification of the assets to be protected, and the application of security countermeasures to manage the risks. In this field, many guidelines have been developed, however most are not easily applied by physicians and nontechnical staff charged with the responsibility of securing their medical systems. However, there are basic countermeasures can be applied with minimal technical knowledge of information security.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification

Industrial control systems (ICSs) which are used in critical infrastructure and other industries mostly use various communication protocols. Most of these communication protocols have various cyber security challenges and weakness that give the attackers the opportunity to gain to their malicious intentions. In this paper, we assess IEC 60870-5-104 protocols from security perspective which is u...

متن کامل

Information Leakage Attacks Against Smart Card Implementations of Cryptographic Algorithms and Countermeasures A Survey

Every practical implementation of a cryptographic algorithm represents a physical device possessing potential side channels not covered by the security models of theoretical cryptography. Hence, even provable secure cryptographic algorithms may be attacked due to leakage of information. Smart cards and security ICs are often used as tamper-proof security devices. To prevent an attacker from exp...

متن کامل

A survey on RPL attacks and their countermeasures

RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...

متن کامل

An Empirical Analysis of Security Investment in Countermeasures Based on an Enterprise Survey in Japan

This paper presents a two-step empirical analysis of investing in security countermeasures based on an Japanese enterprise survey. At the first step, we verify the relations between probability of computer virus incidents and adopting a set of information security countermeasures. It is shown that “Defense Measure” associated with “Information Security Policy” and “Human Cultivation” has remark...

متن کامل

Analyzing Impacts on Software Enhancement Caused by Security Design Alternatives with Patterns

Unlike functional implementations, it is difficult to analyze the impact on security of software enhancements. One of the difficulties is identifying the range of effects on existing software from new security threats, and the other is developing proper countermeasures. The authors propose an analysis method that uses two kinds of security patterns: security requirements patterns for identifyin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006