5 CONCEPTS OF SECURITY
TELEMEDICINE
FRANCES MARIELLE M. OLIVA, RN
SECURITY
• Is the degree of
resistance to, or
protection from harm.
AUTHENTICATION
• Verifying the identity of
the user or service
• Involves trusting both
the authentication
information and...
TRANSPORT SECURITY (ENCRYPTION)
• Process of encoding
messages (or
information) in such a
way that only
authorized parties...
AUTHORIZATION
• Process of verifying if the
user has rights/permission
to access.
• It promotes hierarchy at
how much a pe...
ACCESS CONTROL
• Users are granted
access and certain
privileges to the
information or data.
• Privileges to:
 Read data
...
AUDIT CONTROL
• Logs or records of
computer access.
• It is done to identify
inappropriate or
unauthorized access
• Record...
PHYSICAL SECURITY
• Addresses actions you
can take to protect the
data from intruders by:
 Housing all servers
containing...
Upcoming SlideShare
Loading in …5
×

5 concepts of security telemedicine

270 views

Published on

Published in: Business, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
270
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
10
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

5 concepts of security telemedicine

  1. 1. 5 CONCEPTS OF SECURITY TELEMEDICINE FRANCES MARIELLE M. OLIVA, RN
  2. 2. SECURITY • Is the degree of resistance to, or protection from harm.
  3. 3. AUTHENTICATION • Verifying the identity of the user or service • Involves trusting both the authentication information and computer it is coming from • Verification is through:  User ID and Password  Filtering of IP address  Tokens and many more
  4. 4. TRANSPORT SECURITY (ENCRYPTION) • Process of encoding messages (or information) in such a way that only authorized parties can read it. • Keeps data safe and confidential even if unauthorized access occurs.
  5. 5. AUTHORIZATION • Process of verifying if the user has rights/permission to access. • It promotes hierarchy at how much a person can access at a given level.  Ex. Patients are only permitted to view their laboratory results but they are not permitted to view the Doctor’s notes.
  6. 6. ACCESS CONTROL • Users are granted access and certain privileges to the information or data. • Privileges to:  Read data  Edit data  Delete data  Add data
  7. 7. AUDIT CONTROL • Logs or records of computer access. • It is done to identify inappropriate or unauthorized access • Recorded information include:  User  IP Address  Patient  Data Type  Access Type  Type of Access
  8. 8. PHYSICAL SECURITY • Addresses actions you can take to protect the data from intruders by:  Housing all servers containing valuable data in a main computer facility.  Staff should be present 24 hours per day,  Must be secured with biometric access controlled devices,  Installation of unauthorized software is prohibited.

×