SlideShare a Scribd company logo
1 of 8
Health Information Systems and
Network Security
A Framework for Securing HIT Infrastructure
Security Goals
1. Protect PHI by empowering individuals to control access to their
own healthcare information.
2. Allow only fully authenticated and authorized individuals access to
data.
3. Preserve integrity of network data.
4. Hold users and organizations accountable for network actions.
5. Hold each node in a network accountable for the security of the
data in its custody.
6. Enable the formation of larger scale networks by securely linking
together health information networks (HINs).
(NHIN Project/HIPAA/Markle Common Framework for Private and Secure HIE)
Security Framework

(Kailar, Rajashekar 2007)
Environmental Assumptions
ID

Assumption

Justification

A1

Intermediary

Legally binding agreements

A2

Providers

Legally binding agreements, and doctor/patient relationships

A3

Data Repositories

Legally binding agreements
Security Requirements
ID

Security Requirements

R1

Only authorized and authenticated systems shall be targets of network queries

R2

Only authorized and authenticated users shall request data over the network

R3

Data integrity shall be preserved within all nodes and over the network

R4

Data confidentiality shall be protected over the network

R5

All access to healthcare data shall be traceable to an individual or organization

R6

Where applicable patient shall specify access to PHI (rules enforced on all nodes)

R7

Requests originating in another trust domain shall be authenticated and authorized

R8

Data and system integrity shall be preserved at each node in the network
Security Mechanisms
ID

Security Mechanism

Mapping

M1 User identity management

R2, R4

M2 User authentication

R2, R4, R6

M3 User authorization

R5

M4 Auditing

R5

M5 Anonymization

R4

M6 Secure messaging

R1, R2, R3, R4

M7 Consent management

R6

M8 Inter-domain security

R7

M9 System availability and integrity protection

R8
Security Threats and Countermeasures
ID

Security Mechanism

Countermeasure

Mapping

T1 Unauthorized user/system produces data

Identification/authentication

M1, M2

T2 Unauthorized user/system consumes data

Identification/authentication/access control M1, M2, M5, M6,
M7, M8

T3 Data integrity compromised at

Network, OS, application, and database
controls at each node

M1, M2, M9

T4 Data integrity compromised over network

Integrity protection (MD5, hash, checksum)

M6, A1

T5 Data confidentiality compromised over network

Encryption over network (SSL)

M6, M7, A1

T6 Information compromised by valid user

Audit, organization binding, responsibility

M4, A1, A2, A3

T7 Virus, spyware

Anti-virus, firewall, intrusion detection
system (IDS)

M6, M9

T8 Denial of service

IDS, firewall, application

M6

T9 Identity spoofing

Client certificate based auth. (two-way SSL)

M1, M6

consumer/producer/intermediary level

(consumer/producer/intermediary)
A Framework for Health Information Technology and Network Security

More Related Content

What's hot

Pt hr confidentiality
Pt hr confidentialityPt hr confidentiality
Pt hr confidentialitycorbsan
 
Understanding patient privacy 1
Understanding patient privacy 1Understanding patient privacy 1
Understanding patient privacy 1Jonsie12
 
Healthcare data breach
Healthcare data breachHealthcare data breach
Healthcare data breachhealthsoftware
 
Confidentiality and you
Confidentiality and youConfidentiality and you
Confidentiality and youyola121
 
Week 1 privacy and security training
Week 1 privacy and security trainingWeek 1 privacy and security training
Week 1 privacy and security trainingSonja Davis
 
Week 1 discussion 2-confidentiality training
Week 1 discussion 2-confidentiality trainingWeek 1 discussion 2-confidentiality training
Week 1 discussion 2-confidentiality trainingRonRATIA
 
011918 espionage health_check_fact_sheet_rs
011918 espionage health_check_fact_sheet_rs011918 espionage health_check_fact_sheet_rs
011918 espionage health_check_fact_sheet_rsRichard Smiraldi
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)OnRamp
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance SolutionsSeclore
 
eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?Mario Drobics
 
Complying with HIPAA Security Rule
Complying with HIPAA Security RuleComplying with HIPAA Security Rule
Complying with HIPAA Security Rulecomplianceonline123
 
Hackproof for Healthcare
Hackproof for HealthcareHackproof for Healthcare
Hackproof for Healthcarehackproof12
 
Data protection policy alex clapson 20-11-17
Data protection policy   alex clapson 20-11-17Data protection policy   alex clapson 20-11-17
Data protection policy alex clapson 20-11-17Alex Clapson
 

What's hot (16)

Pt hr confidentiality
Pt hr confidentialityPt hr confidentiality
Pt hr confidentiality
 
Understanding patient privacy 1
Understanding patient privacy 1Understanding patient privacy 1
Understanding patient privacy 1
 
Data Security
Data SecurityData Security
Data Security
 
Healthcare data breach
Healthcare data breachHealthcare data breach
Healthcare data breach
 
Confidentiality and you
Confidentiality and youConfidentiality and you
Confidentiality and you
 
Week 1 privacy and security training
Week 1 privacy and security trainingWeek 1 privacy and security training
Week 1 privacy and security training
 
Week 1 discussion 2-confidentiality training
Week 1 discussion 2-confidentiality trainingWeek 1 discussion 2-confidentiality training
Week 1 discussion 2-confidentiality training
 
011918 espionage health_check_fact_sheet_rs
011918 espionage health_check_fact_sheet_rs011918 espionage health_check_fact_sheet_rs
011918 espionage health_check_fact_sheet_rs
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
 
10 Things That Compromise Patient Data
10 Things That Compromise Patient Data10 Things That Compromise Patient Data
10 Things That Compromise Patient Data
 
Data Security For Insurance Solutions
Data Security For Insurance SolutionsData Security For Insurance Solutions
Data Security For Insurance Solutions
 
eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?
 
Blodgett MHA 690 W1 D2
Blodgett MHA 690 W1 D2Blodgett MHA 690 W1 D2
Blodgett MHA 690 W1 D2
 
Complying with HIPAA Security Rule
Complying with HIPAA Security RuleComplying with HIPAA Security Rule
Complying with HIPAA Security Rule
 
Hackproof for Healthcare
Hackproof for HealthcareHackproof for Healthcare
Hackproof for Healthcare
 
Data protection policy alex clapson 20-11-17
Data protection policy   alex clapson 20-11-17Data protection policy   alex clapson 20-11-17
Data protection policy alex clapson 20-11-17
 

Viewers also liked

Article summary "A framework for information systems architecture"
Article summary "A framework for information systems architecture"Article summary "A framework for information systems architecture"
Article summary "A framework for information systems architecture"Dejan Munjin
 
Approaching Information Management from a Framework Perspective
Approaching Information Management from a Framework PerspectiveApproaching Information Management from a Framework Perspective
Approaching Information Management from a Framework PerspectiveRob Gerbrandt CD, PMP
 
Basic Security Requirements
Basic Security RequirementsBasic Security Requirements
Basic Security RequirementsSteven Cahill
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 
Data Network Security
Data Network SecurityData Network Security
Data Network SecurityAtif Rehmat
 
Management Information System (Full Notes)
Management Information System (Full Notes)Management Information System (Full Notes)
Management Information System (Full Notes)Harish Chand
 
Management information system
Management information systemManagement information system
Management information systemSikander Saini
 
Management Information System (MIS)
Management Information System (MIS)Management Information System (MIS)
Management Information System (MIS)Navneet Jingar
 

Viewers also liked (10)

Network security
Network securityNetwork security
Network security
 
Article summary "A framework for information systems architecture"
Article summary "A framework for information systems architecture"Article summary "A framework for information systems architecture"
Article summary "A framework for information systems architecture"
 
Information Management Framework
Information Management FrameworkInformation Management Framework
Information Management Framework
 
Approaching Information Management from a Framework Perspective
Approaching Information Management from a Framework PerspectiveApproaching Information Management from a Framework Perspective
Approaching Information Management from a Framework Perspective
 
Basic Security Requirements
Basic Security RequirementsBasic Security Requirements
Basic Security Requirements
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
Data Network Security
Data Network SecurityData Network Security
Data Network Security
 
Management Information System (Full Notes)
Management Information System (Full Notes)Management Information System (Full Notes)
Management Information System (Full Notes)
 
Management information system
Management information systemManagement information system
Management information system
 
Management Information System (MIS)
Management Information System (MIS)Management Information System (MIS)
Management Information System (MIS)
 

Similar to A Framework for Health Information Technology and Network Security

Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxArti Parab Academics
 
HL7 FHIR plus OAuth2 in a NHS trust
HL7 FHIR plus OAuth2 in a NHS trustHL7 FHIR plus OAuth2 in a NHS trust
HL7 FHIR plus OAuth2 in a NHS trustKevin Mayfield
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsKimarie Brown
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full pptShahbaz Khan
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full pptShahbaz Khan
 
Data Protection and Privacy laws class 11
Data Protection and Privacy laws class 11Data Protection and Privacy laws class 11
Data Protection and Privacy laws class 11mufalegend
 
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET Journal
 
A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataIRJET Journal
 
Paper id 37201535
Paper id 37201535Paper id 37201535
Paper id 37201535IJRAT
 
Security & Privacy - Lecture E
Security & Privacy - Lecture ESecurity & Privacy - Lecture E
Security & Privacy - Lecture ECMDLearning
 
Remote Health Technology- E Healthcare Technology
Remote Health Technology- E Healthcare TechnologyRemote Health Technology- E Healthcare Technology
Remote Health Technology- E Healthcare Technologysaranya188949
 
Enhancing Your Data Security: Closing the Gap on Unsecured Communications
Enhancing Your Data Security: Closing the Gap on Unsecured CommunicationsEnhancing Your Data Security: Closing the Gap on Unsecured Communications
Enhancing Your Data Security: Closing the Gap on Unsecured CommunicationsSpok
 
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...dbpublications
 
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...Health IT Conference – iHT2
 
RFC 2196 Site Security Handbook
RFC 2196 Site Security HandbookRFC 2196 Site Security Handbook
RFC 2196 Site Security HandbookDavid Sweigert
 
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionSecure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionEditor IJCATR
 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServiceYogeshIJTSRD
 
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...IRJET Journal
 

Similar to A Framework for Health Information Technology and Network Security (20)

Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptx
 
HL7 FHIR plus OAuth2 in a NHS trust
HL7 FHIR plus OAuth2 in a NHS trustHL7 FHIR plus OAuth2 in a NHS trust
HL7 FHIR plus OAuth2 in a NHS trust
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing Informatics
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
Data security
Data securityData security
Data security
 
Data Protection and Privacy laws class 11
Data Protection and Privacy laws class 11Data Protection and Privacy laws class 11
Data Protection and Privacy laws class 11
 
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor data
 
A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor data
 
Paper id 37201535
Paper id 37201535Paper id 37201535
Paper id 37201535
 
Security & Privacy - Lecture E
Security & Privacy - Lecture ESecurity & Privacy - Lecture E
Security & Privacy - Lecture E
 
Remote Health Technology- E Healthcare Technology
Remote Health Technology- E Healthcare TechnologyRemote Health Technology- E Healthcare Technology
Remote Health Technology- E Healthcare Technology
 
Enhancing Your Data Security: Closing the Gap on Unsecured Communications
Enhancing Your Data Security: Closing the Gap on Unsecured CommunicationsEnhancing Your Data Security: Closing the Gap on Unsecured Communications
Enhancing Your Data Security: Closing the Gap on Unsecured Communications
 
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
Cloud Computing: Scalable and Secure Sharing of Personal Health Records Using...
 
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
 
Set paper winter sem 15 16 (final)
Set paper winter sem 15 16 (final)Set paper winter sem 15 16 (final)
Set paper winter sem 15 16 (final)
 
RFC 2196 Site Security Handbook
RFC 2196 Site Security HandbookRFC 2196 Site Security Handbook
RFC 2196 Site Security Handbook
 
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionSecure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud Service
 
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
 

Recently uploaded

VIP Russian Call Girls in Varanasi Samaira 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Varanasi Samaira 8250192130 Independent Escort Serv...VIP Russian Call Girls in Varanasi Samaira 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Varanasi Samaira 8250192130 Independent Escort Serv...Neha Kaur
 
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...astropune
 
Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...
Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...
Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...Miss joya
 
Call Girls Colaba Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls Colaba Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls Colaba Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls Colaba Mumbai ❤️ 9920874524 👈 Cash on Deliverynehamumbai
 
Kesar Bagh Call Girl Price 9548273370 , Lucknow Call Girls Service
Kesar Bagh Call Girl Price 9548273370 , Lucknow Call Girls ServiceKesar Bagh Call Girl Price 9548273370 , Lucknow Call Girls Service
Kesar Bagh Call Girl Price 9548273370 , Lucknow Call Girls Servicemakika9823
 
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...Call Girls in Nagpur High Profile
 
CALL ON ➥9907093804 🔝 Call Girls Hadapsar ( Pune) Girls Service
CALL ON ➥9907093804 🔝 Call Girls Hadapsar ( Pune)  Girls ServiceCALL ON ➥9907093804 🔝 Call Girls Hadapsar ( Pune)  Girls Service
CALL ON ➥9907093804 🔝 Call Girls Hadapsar ( Pune) Girls ServiceMiss joya
 
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls JaipurCall Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipurparulsinha
 
VIP Call Girls Indore Kirti 💚😋 9256729539 🚀 Indore Escorts
VIP Call Girls Indore Kirti 💚😋  9256729539 🚀 Indore EscortsVIP Call Girls Indore Kirti 💚😋  9256729539 🚀 Indore Escorts
VIP Call Girls Indore Kirti 💚😋 9256729539 🚀 Indore Escortsaditipandeya
 
Bangalore Call Girl Whatsapp Number 100% Complete Your Sexual Needs
Bangalore Call Girl Whatsapp Number 100% Complete Your Sexual NeedsBangalore Call Girl Whatsapp Number 100% Complete Your Sexual Needs
Bangalore Call Girl Whatsapp Number 100% Complete Your Sexual NeedsGfnyt
 
VIP Call Girls Pune Vani 9907093804 Short 1500 Night 6000 Best call girls Ser...
VIP Call Girls Pune Vani 9907093804 Short 1500 Night 6000 Best call girls Ser...VIP Call Girls Pune Vani 9907093804 Short 1500 Night 6000 Best call girls Ser...
VIP Call Girls Pune Vani 9907093804 Short 1500 Night 6000 Best call girls Ser...Miss joya
 
♛VVIP Hyderabad Call Girls Chintalkunta🖕7001035870🖕Riya Kappor Top Call Girl ...
♛VVIP Hyderabad Call Girls Chintalkunta🖕7001035870🖕Riya Kappor Top Call Girl ...♛VVIP Hyderabad Call Girls Chintalkunta🖕7001035870🖕Riya Kappor Top Call Girl ...
♛VVIP Hyderabad Call Girls Chintalkunta🖕7001035870🖕Riya Kappor Top Call Girl ...astropune
 
Low Rate Call Girls Pune Esha 9907093804 Short 1500 Night 6000 Best call girl...
Low Rate Call Girls Pune Esha 9907093804 Short 1500 Night 6000 Best call girl...Low Rate Call Girls Pune Esha 9907093804 Short 1500 Night 6000 Best call girl...
Low Rate Call Girls Pune Esha 9907093804 Short 1500 Night 6000 Best call girl...Miss joya
 
Call Girl Number in Vashi Mumbai📲 9833363713 💞 Full Night Enjoy
Call Girl Number in Vashi Mumbai📲 9833363713 💞 Full Night EnjoyCall Girl Number in Vashi Mumbai📲 9833363713 💞 Full Night Enjoy
Call Girl Number in Vashi Mumbai📲 9833363713 💞 Full Night Enjoybabeytanya
 
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort ServicePremium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Servicevidya singh
 
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...Taniya Sharma
 
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...CALL GIRLS
 
Vip Call Girls Anna Salai Chennai 👉 8250192130 ❣️💯 Top Class Girls Available
Vip Call Girls Anna Salai Chennai 👉 8250192130 ❣️💯 Top Class Girls AvailableVip Call Girls Anna Salai Chennai 👉 8250192130 ❣️💯 Top Class Girls Available
Vip Call Girls Anna Salai Chennai 👉 8250192130 ❣️💯 Top Class Girls AvailableNehru place Escorts
 
Call Girls Horamavu WhatsApp Number 7001035870 Meeting With Bangalore Escorts
Call Girls Horamavu WhatsApp Number 7001035870 Meeting With Bangalore EscortsCall Girls Horamavu WhatsApp Number 7001035870 Meeting With Bangalore Escorts
Call Girls Horamavu WhatsApp Number 7001035870 Meeting With Bangalore Escortsvidya singh
 

Recently uploaded (20)

VIP Russian Call Girls in Varanasi Samaira 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Varanasi Samaira 8250192130 Independent Escort Serv...VIP Russian Call Girls in Varanasi Samaira 8250192130 Independent Escort Serv...
VIP Russian Call Girls in Varanasi Samaira 8250192130 Independent Escort Serv...
 
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
Best Rate (Hyderabad) Call Girls Jahanuma ⟟ 8250192130 ⟟ High Class Call Girl...
 
Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...
Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...
Russian Call Girls in Pune Riya 9907093804 Short 1500 Night 6000 Best call gi...
 
Russian Call Girls in Delhi Tanvi ➡️ 9711199012 💋📞 Independent Escort Service...
Russian Call Girls in Delhi Tanvi ➡️ 9711199012 💋📞 Independent Escort Service...Russian Call Girls in Delhi Tanvi ➡️ 9711199012 💋📞 Independent Escort Service...
Russian Call Girls in Delhi Tanvi ➡️ 9711199012 💋📞 Independent Escort Service...
 
Call Girls Colaba Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls Colaba Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls Colaba Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls Colaba Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Kesar Bagh Call Girl Price 9548273370 , Lucknow Call Girls Service
Kesar Bagh Call Girl Price 9548273370 , Lucknow Call Girls ServiceKesar Bagh Call Girl Price 9548273370 , Lucknow Call Girls Service
Kesar Bagh Call Girl Price 9548273370 , Lucknow Call Girls Service
 
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...
 
CALL ON ➥9907093804 🔝 Call Girls Hadapsar ( Pune) Girls Service
CALL ON ➥9907093804 🔝 Call Girls Hadapsar ( Pune)  Girls ServiceCALL ON ➥9907093804 🔝 Call Girls Hadapsar ( Pune)  Girls Service
CALL ON ➥9907093804 🔝 Call Girls Hadapsar ( Pune) Girls Service
 
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls JaipurCall Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
Call Girls Service Jaipur Grishma WhatsApp ❤8445551418 VIP Call Girls Jaipur
 
VIP Call Girls Indore Kirti 💚😋 9256729539 🚀 Indore Escorts
VIP Call Girls Indore Kirti 💚😋  9256729539 🚀 Indore EscortsVIP Call Girls Indore Kirti 💚😋  9256729539 🚀 Indore Escorts
VIP Call Girls Indore Kirti 💚😋 9256729539 🚀 Indore Escorts
 
Bangalore Call Girl Whatsapp Number 100% Complete Your Sexual Needs
Bangalore Call Girl Whatsapp Number 100% Complete Your Sexual NeedsBangalore Call Girl Whatsapp Number 100% Complete Your Sexual Needs
Bangalore Call Girl Whatsapp Number 100% Complete Your Sexual Needs
 
VIP Call Girls Pune Vani 9907093804 Short 1500 Night 6000 Best call girls Ser...
VIP Call Girls Pune Vani 9907093804 Short 1500 Night 6000 Best call girls Ser...VIP Call Girls Pune Vani 9907093804 Short 1500 Night 6000 Best call girls Ser...
VIP Call Girls Pune Vani 9907093804 Short 1500 Night 6000 Best call girls Ser...
 
♛VVIP Hyderabad Call Girls Chintalkunta🖕7001035870🖕Riya Kappor Top Call Girl ...
♛VVIP Hyderabad Call Girls Chintalkunta🖕7001035870🖕Riya Kappor Top Call Girl ...♛VVIP Hyderabad Call Girls Chintalkunta🖕7001035870🖕Riya Kappor Top Call Girl ...
♛VVIP Hyderabad Call Girls Chintalkunta🖕7001035870🖕Riya Kappor Top Call Girl ...
 
Low Rate Call Girls Pune Esha 9907093804 Short 1500 Night 6000 Best call girl...
Low Rate Call Girls Pune Esha 9907093804 Short 1500 Night 6000 Best call girl...Low Rate Call Girls Pune Esha 9907093804 Short 1500 Night 6000 Best call girl...
Low Rate Call Girls Pune Esha 9907093804 Short 1500 Night 6000 Best call girl...
 
Call Girl Number in Vashi Mumbai📲 9833363713 💞 Full Night Enjoy
Call Girl Number in Vashi Mumbai📲 9833363713 💞 Full Night EnjoyCall Girl Number in Vashi Mumbai📲 9833363713 💞 Full Night Enjoy
Call Girl Number in Vashi Mumbai📲 9833363713 💞 Full Night Enjoy
 
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort ServicePremium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
 
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
 
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...
Call Girls Service Surat Samaira ❤️🍑 8250192130 👄 Independent Escort Service ...
 
Vip Call Girls Anna Salai Chennai 👉 8250192130 ❣️💯 Top Class Girls Available
Vip Call Girls Anna Salai Chennai 👉 8250192130 ❣️💯 Top Class Girls AvailableVip Call Girls Anna Salai Chennai 👉 8250192130 ❣️💯 Top Class Girls Available
Vip Call Girls Anna Salai Chennai 👉 8250192130 ❣️💯 Top Class Girls Available
 
Call Girls Horamavu WhatsApp Number 7001035870 Meeting With Bangalore Escorts
Call Girls Horamavu WhatsApp Number 7001035870 Meeting With Bangalore EscortsCall Girls Horamavu WhatsApp Number 7001035870 Meeting With Bangalore Escorts
Call Girls Horamavu WhatsApp Number 7001035870 Meeting With Bangalore Escorts
 

A Framework for Health Information Technology and Network Security

  • 1. Health Information Systems and Network Security A Framework for Securing HIT Infrastructure
  • 2. Security Goals 1. Protect PHI by empowering individuals to control access to their own healthcare information. 2. Allow only fully authenticated and authorized individuals access to data. 3. Preserve integrity of network data. 4. Hold users and organizations accountable for network actions. 5. Hold each node in a network accountable for the security of the data in its custody. 6. Enable the formation of larger scale networks by securely linking together health information networks (HINs). (NHIN Project/HIPAA/Markle Common Framework for Private and Secure HIE)
  • 4. Environmental Assumptions ID Assumption Justification A1 Intermediary Legally binding agreements A2 Providers Legally binding agreements, and doctor/patient relationships A3 Data Repositories Legally binding agreements
  • 5. Security Requirements ID Security Requirements R1 Only authorized and authenticated systems shall be targets of network queries R2 Only authorized and authenticated users shall request data over the network R3 Data integrity shall be preserved within all nodes and over the network R4 Data confidentiality shall be protected over the network R5 All access to healthcare data shall be traceable to an individual or organization R6 Where applicable patient shall specify access to PHI (rules enforced on all nodes) R7 Requests originating in another trust domain shall be authenticated and authorized R8 Data and system integrity shall be preserved at each node in the network
  • 6. Security Mechanisms ID Security Mechanism Mapping M1 User identity management R2, R4 M2 User authentication R2, R4, R6 M3 User authorization R5 M4 Auditing R5 M5 Anonymization R4 M6 Secure messaging R1, R2, R3, R4 M7 Consent management R6 M8 Inter-domain security R7 M9 System availability and integrity protection R8
  • 7. Security Threats and Countermeasures ID Security Mechanism Countermeasure Mapping T1 Unauthorized user/system produces data Identification/authentication M1, M2 T2 Unauthorized user/system consumes data Identification/authentication/access control M1, M2, M5, M6, M7, M8 T3 Data integrity compromised at Network, OS, application, and database controls at each node M1, M2, M9 T4 Data integrity compromised over network Integrity protection (MD5, hash, checksum) M6, A1 T5 Data confidentiality compromised over network Encryption over network (SSL) M6, M7, A1 T6 Information compromised by valid user Audit, organization binding, responsibility M4, A1, A2, A3 T7 Virus, spyware Anti-virus, firewall, intrusion detection system (IDS) M6, M9 T8 Denial of service IDS, firewall, application M6 T9 Identity spoofing Client certificate based auth. (two-way SSL) M1, M6 consumer/producer/intermediary level (consumer/producer/intermediary)

Editor's Notes

  1. Sources Kailar, Rajashekar. "A security architecture for health information networks.“ AMIA Annual Symposium Proceedings. Vol. 2007. American Medical Informatics Association, 2007.Scholl, Matthew, et al. Security architecture design process for health information exchanges (HIEs). US Department of Commerce, National Institute of Standards and Technology, 2010.Gritzalis, Dimitris, and Costas Lambrinoudakis. "A security architecture for interconnecting health information systems." International Journal of Medical Informatics 73.3 (2004): 305-309.Mandl, Kenneth D., et al. "Indivo: a personally controlled health record for health information exchange and communication." BMC medical informatics and decision making 7.1 (2007): 25.ResourcesAHRQ:The Health Information Security and Privacy Collaboration Toolkithttp://healthit.ahrq.gov/health-it-tools-and-resources/health-information-security-and-privacy-collaboration-toolkitAHIMA: An IT Primer for Health Information Exchangehttp://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_036239.hcsp?dDocName=bok1_036239HIMSS: Privacy and Security Toolkithttp://www.himss.org/library/healthcare-privacy-securityHealthIT.gov: Guide to Privacy and Security of Health Informationhttp://www.healthit.gov/sites/default/files/pdf/privacy/privacy-and-security-guide.pdfHealthIT.gov:Information Security Policy Templatehttp://www.healthit.gov/providers-professionals/implementation-resources/information-security-policy-templateHealthIT.gov: Relevant Legal Requirements for Health Data Exchange for Health Care Organizations http://healthit.ahrq.gov/sites/default/files/docs/page/C_RelevantLegalRequirementsforHealthDataExchange_0.pdfMarkleFoundaton: Common Framework forPrivate and Secure Health Information Exchangehttp://www.markle.org/health/markle-common-framework/connecting-professionalsDeloitte: (Issue Brief) Privacy and Security in Health Care: A fresh lookhttps://www.deloitte.com/assets/Dcom-UnitedStates/Local%20Assets/Documents/Health%20Reform%20Issues%20Briefs/US_CHS_PrivacyandSecurityinHealthCare_022111.pdfA Primer on Health Information Technology Standards and Data Exchange in the US todayhttp://www.mhtransformation.org/documents/word/MHT_HIT_Standards_081409.doc
  2. Security goals for HINsderived from:NHIN project /* National Health Information Network */HIPAA security and privacy rules /* Health Insurance Portability and Accountability Act*/Connecting for Health Common Framework /* Markle Common Framework for Private and Secure Health Information Exchange */[PHI] [PHR]  [PCHR] /* “empowering individuals to control access to their own healthcare information” */(Protected Health Information)(Personal Health Record)(Personally Controlled Health Record)Trust Domains -> conceptually as nodes: could be a single computer on a local network, or abstracted as an organization on a larger (inter)network.Consumer <-> ProviderConsumer <-> Intermediary <-> Provider/* an intermediary could be a firewall, proxy, organization, or HIE as examples (depending on level of node abstraction) */Trust Models->Centralizeddistributed (transitive)federatedWhenthe data provider and data consumer do not share a direct trust relationship, they may rely on trusted intermediaries to act as brokers. /* Transitive or Distributed Trust (i.e. partnerships) */-----------------------------------------------------------------------------------{garden variety networks and information systems security measures adapted/updated for the special requirements of PHI}
  3. (Kailar, Rajashekar 2007)Simplified ERD (Entity Relationship Diagram) => closed loop system (entity relationship model -> mandatory one to many relationships ) /* ERD: database development and data modeling tool standard */[Security Threats and Countermeasures] => [Security Requirements] => [Security Mechanisms] <- [Environmental Assumptions]
  4. (Kailar, Rajashekar 2007)
  5. (Kailar, Rajashekar 2007)
  6. (Kailar, Rajashekar 2007)
  7. (Kailar, Rajashekar 2007)
  8. [A graphic model/visualization of the concepts in slides 3-7] /* [Tool] GraphML=> yEd Graph Editor (yWorks) */HIN Security in a Nutshell. There’s more to it, but this is a solid model/framework (HIT/HIN InfoSec)./* model/framework lacks granularity => i.e. sw security patches, nw vulnerability scans (sophisticated port-scan -> ‘script kiddies’), VPN/SSH Tunneling => extension of trusted domain (virtual), etc.*/