SlideShare a Scribd company logo
1 of 6
DATA SECURITY FOR
MOBILE HEALTHCARE
Yudha Saputra
Chapter A12, Author: Tyrone Grandison Ph.D
The Foundation
⦿ Core healthcare solutions are associated with set of:
⦿ Business -> Whether implicitly/explicitly, mobile system must
execute on a profitable business model, and need strengthen
its security & secure its privacy.
⦿ Legal -> Solution must operate to be in compliance or face
legislative penalty, have security and privacy legislation across
the globe, and requires special and specific guidance.
⦿ Technology -> Need written procedural manner, also system
that asynchronous, responsive and web enabled.
⦿ Social-> Attitudes, beliefs, and assumptions made by the
common user when they interact with computing solutions.
The Security Dimension
⦿ Protection of computer security is typically focused on
ensuring that:
⦿ Confidentiality -> Information is not accessed by unauthorized
persons
⦿ Integrity -> Information is not altered by unauthorized persons
in a way that is not detectable by authorized users
⦿ Authentication -> Users are the persons they claim to be
⦿ Access control -> Qualified users access only those resources
that they are entittled to access and not denied by its
⦿ Nonrepudiation -> The originators of messages cannot deny
that they in fact sent the message
⦿ Avaibility -> A system is operational and functional data a
given moment
The Mobile Platform System
⦿ Securely access medical data from a secured backend
database
⦿ Not store personally identifiable information on the device
⦿ Ensure that the hardware and software of mobile device is
secure
⦿ MOBILE SECURITY
REFERENCE
ARCHITECTURE
(MRSA) by US
Federal CIO Council
and the US
Department of
Homeland
Inside MRSA
⦿ Virtual Private Network -> Method for creating secure connection
⦿ Mobile Device Management -> Administration and supervision of
app, data, configuration setting
⦿ Mobile App Management -> provides a subset operations provided
by MDM
⦿ Identity and Access Management -> Integrating and coordinating
service
⦿ Mobile App Store -> Repository of mobile apps
⦿ Mobile App Gateway -> App-specific network security for mobile app
infrastructures
⦿ Data Loss Prevention -> Prevent loss on transmission
⦿ Intrusion Detection System -> Matching known attack and alerts
when suspicious traffic is seen
⦿ Gateway and Security Stack -> Prevent damage to backend and
can be inspected by standard network defense
Future
mHealth security is a concern, and shows
promising improvement to create a better
security system

More Related Content

What's hot

Phishing: How to get off the hook using Intelligent IAM
Phishing: How to get off the hook using Intelligent IAMPhishing: How to get off the hook using Intelligent IAM
Phishing: How to get off the hook using Intelligent IAMCourion Corporation
 
Magix Value Proposition Ar
Magix Value Proposition ArMagix Value Proposition Ar
Magix Value Proposition Aralanrehbock
 
Vulnerability Areas Hackers Scan For When Choosing Their Next Victim
Vulnerability Areas Hackers Scan For When Choosing Their Next VictimVulnerability Areas Hackers Scan For When Choosing Their Next Victim
Vulnerability Areas Hackers Scan For When Choosing Their Next VictimBen Bruno
 
Security Industry Association Privacy Framework
Security Industry Association Privacy FrameworkSecurity Industry Association Privacy Framework
Security Industry Association Privacy Framework- Mark - Fullbright
 
Information Security Management.Introduction
Information Security Management.IntroductionInformation Security Management.Introduction
Information Security Management.Introductionyuliana_mar
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityMeg Weber
 
Coping issues with data security
Coping issues with data securityCoping issues with data security
Coping issues with data securityEffOne_Technologies
 
Is iso 27001, an answer to security
Is iso 27001, an answer to securityIs iso 27001, an answer to security
Is iso 27001, an answer to securityRaghunath G
 
Cyber Security Management | Cyber Security Consultant | JST Business Solution...
Cyber Security Management | Cyber Security Consultant | JST Business Solution...Cyber Security Management | Cyber Security Consultant | JST Business Solution...
Cyber Security Management | Cyber Security Consultant | JST Business Solution...Sahabuddin Siddiqui
 
Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...The University of Texas (UTRGV)
 
Benefits of investing in network security for it business
Benefits of investing in network security for it businessBenefits of investing in network security for it business
Benefits of investing in network security for it businessVijilan IT Security solutions
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to securityMukesh Chinta
 
Chapter 1 introduction to security
Chapter 1 introduction to securityChapter 1 introduction to security
Chapter 1 introduction to securitynewbie2019
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking SectorSamvel Gevorgyan
 
Top 5 Ways How Accounting Firms Can Protect Their Client Data
Top 5 Ways How Accounting Firms Can Protect Their Client Data Top 5 Ways How Accounting Firms Can Protect Their Client Data
Top 5 Ways How Accounting Firms Can Protect Their Client Data Avni Rajput
 

What's hot (20)

Phishing: How to get off the hook using Intelligent IAM
Phishing: How to get off the hook using Intelligent IAMPhishing: How to get off the hook using Intelligent IAM
Phishing: How to get off the hook using Intelligent IAM
 
Magix Value Proposition Ar
Magix Value Proposition ArMagix Value Proposition Ar
Magix Value Proposition Ar
 
Data security
Data securityData security
Data security
 
Vulnerability Areas Hackers Scan For When Choosing Their Next Victim
Vulnerability Areas Hackers Scan For When Choosing Their Next VictimVulnerability Areas Hackers Scan For When Choosing Their Next Victim
Vulnerability Areas Hackers Scan For When Choosing Their Next Victim
 
Security Industry Association Privacy Framework
Security Industry Association Privacy FrameworkSecurity Industry Association Privacy Framework
Security Industry Association Privacy Framework
 
Information Security Management.Introduction
Information Security Management.IntroductionInformation Security Management.Introduction
Information Security Management.Introduction
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
 
IT security
IT securityIT security
IT security
 
IRM and E-discovery
IRM and E-discoveryIRM and E-discovery
IRM and E-discovery
 
Coping issues with data security
Coping issues with data securityCoping issues with data security
Coping issues with data security
 
Is iso 27001, an answer to security
Is iso 27001, an answer to securityIs iso 27001, an answer to security
Is iso 27001, an answer to security
 
Cyber Security Management | Cyber Security Consultant | JST Business Solution...
Cyber Security Management | Cyber Security Consultant | JST Business Solution...Cyber Security Management | Cyber Security Consultant | JST Business Solution...
Cyber Security Management | Cyber Security Consultant | JST Business Solution...
 
Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...Information Security and Privacy - Public Sector actions, policies and regula...
Information Security and Privacy - Public Sector actions, policies and regula...
 
Benefits of investing in network security for it business
Benefits of investing in network security for it businessBenefits of investing in network security for it business
Benefits of investing in network security for it business
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Chapter 1 introduction to security
Chapter 1 introduction to securityChapter 1 introduction to security
Chapter 1 introduction to security
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking Sector
 
Security in it
Security in it Security in it
Security in it
 
Top 5 Ways How Accounting Firms Can Protect Their Client Data
Top 5 Ways How Accounting Firms Can Protect Their Client Data Top 5 Ways How Accounting Firms Can Protect Their Client Data
Top 5 Ways How Accounting Firms Can Protect Their Client Data
 
Network security
Network securityNetwork security
Network security
 

Similar to DATA SECURITY FOR MOBILE HEALTHCAREv

How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfV2Infotech1
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxV2Infotech1
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureCalgary Scientific Inc.
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxArti Parab Academics
 
Information Security
Information SecurityInformation Security
Information Securitysteffiann88
 
Security and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxSecurity and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxTRSrinidi
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare ApplicationCitiusTech
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!Caroline Johnson
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2sharing notes123
 
Lecture 01 Information Security BS computer Science
Lecture 01 Information Security  BS computer ScienceLecture 01 Information Security  BS computer Science
Lecture 01 Information Security BS computer Sciencemaqib8373
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODSierraware
 
Cybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxCybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxInfosectrain3
 

Similar to DATA SECURITY FOR MOBILE HEALTHCAREv (20)

How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 
DR PANKAJ SIR (1).pptx
DR PANKAJ SIR (1).pptxDR PANKAJ SIR (1).pptx
DR PANKAJ SIR (1).pptx
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptx
 
Information Security
Information SecurityInformation Security
Information Security
 
Security and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptxSecurity and privacy in cloud computing.pptx
Security and privacy in cloud computing.pptx
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare Application
 
Security Ch-1.pptx
Security Ch-1.pptxSecurity Ch-1.pptx
Security Ch-1.pptx
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
 
Lecture 01 Information Security BS computer Science
Lecture 01 Information Security  BS computer ScienceLecture 01 Information Security  BS computer Science
Lecture 01 Information Security BS computer Science
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Unit v
Unit vUnit v
Unit v
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
 
CC ss.pptx
CC ss.pptxCC ss.pptx
CC ss.pptx
 
security IDS
security IDSsecurity IDS
security IDS
 
Cybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptxCybersecurity Vs Information Security.pptx
Cybersecurity Vs Information Security.pptx
 

DATA SECURITY FOR MOBILE HEALTHCAREv

  • 1. DATA SECURITY FOR MOBILE HEALTHCARE Yudha Saputra Chapter A12, Author: Tyrone Grandison Ph.D
  • 2. The Foundation ⦿ Core healthcare solutions are associated with set of: ⦿ Business -> Whether implicitly/explicitly, mobile system must execute on a profitable business model, and need strengthen its security & secure its privacy. ⦿ Legal -> Solution must operate to be in compliance or face legislative penalty, have security and privacy legislation across the globe, and requires special and specific guidance. ⦿ Technology -> Need written procedural manner, also system that asynchronous, responsive and web enabled. ⦿ Social-> Attitudes, beliefs, and assumptions made by the common user when they interact with computing solutions.
  • 3. The Security Dimension ⦿ Protection of computer security is typically focused on ensuring that: ⦿ Confidentiality -> Information is not accessed by unauthorized persons ⦿ Integrity -> Information is not altered by unauthorized persons in a way that is not detectable by authorized users ⦿ Authentication -> Users are the persons they claim to be ⦿ Access control -> Qualified users access only those resources that they are entittled to access and not denied by its ⦿ Nonrepudiation -> The originators of messages cannot deny that they in fact sent the message ⦿ Avaibility -> A system is operational and functional data a given moment
  • 4. The Mobile Platform System ⦿ Securely access medical data from a secured backend database ⦿ Not store personally identifiable information on the device ⦿ Ensure that the hardware and software of mobile device is secure ⦿ MOBILE SECURITY REFERENCE ARCHITECTURE (MRSA) by US Federal CIO Council and the US Department of Homeland
  • 5. Inside MRSA ⦿ Virtual Private Network -> Method for creating secure connection ⦿ Mobile Device Management -> Administration and supervision of app, data, configuration setting ⦿ Mobile App Management -> provides a subset operations provided by MDM ⦿ Identity and Access Management -> Integrating and coordinating service ⦿ Mobile App Store -> Repository of mobile apps ⦿ Mobile App Gateway -> App-specific network security for mobile app infrastructures ⦿ Data Loss Prevention -> Prevent loss on transmission ⦿ Intrusion Detection System -> Matching known attack and alerts when suspicious traffic is seen ⦿ Gateway and Security Stack -> Prevent damage to backend and can be inspected by standard network defense
  • 6. Future mHealth security is a concern, and shows promising improvement to create a better security system