5 concepts of security telemedicine

  • 30 views
Uploaded on

 

More in: Business , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
30
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
1
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. 5 CONCEPTS OF SECURITY TELEMEDICINE FRANCES MARIELLE M. OLIVA, RN
  • 2. SECURITY • Is the degree of resistance to, or protection from harm.
  • 3. AUTHENTICATION • Verifying the identity of the user or service • Involves trusting both the authentication information and computer it is coming from • Verification is through:  User ID and Password  Filtering of IP address  Tokens and many more
  • 4. TRANSPORT SECURITY (ENCRYPTION) • Process of encoding messages (or information) in such a way that only authorized parties can read it. • Keeps data safe and confidential even if unauthorized access occurs.
  • 5. AUTHORIZATION • Process of verifying if the user has rights/permission to access. • It promotes hierarchy at how much a person can access at a given level.  Ex. Patients are only permitted to view their laboratory results but they are not permitted to view the Doctor’s notes.
  • 6. ACCESS CONTROL • Users are granted access and certain privileges to the information or data. • Privileges to:  Read data  Edit data  Delete data  Add data
  • 7. AUDIT CONTROL • Logs or records of computer access. • It is done to identify inappropriate or unauthorized access • Recorded information include:  User  IP Address  Patient  Data Type  Access Type  Type of Access
  • 8. PHYSICAL SECURITY • Addresses actions you can take to protect the data from intruders by:  Housing all servers containing valuable data in a main computer facility.  Staff should be present 24 hours per day,  Must be secured with biometric access controlled devices,  Installation of unauthorized software is prohibited.