SlideShare a Scribd company logo
1 of 7
By: Lhou Ghin T. Magluyan
Security in Telemedicine
Concepts
Authentication
Transport Security (Encryption)
Authorization
Access Control
Auditing
Authentication
-is the act of confirming the truth of an attribute of a datum or
entity.
Example:
When entering a restricted establishment, you are required to be
identified before you enter. An Identification Card (ID) is the perfect
example to verify your identity which allows access.
Username and password is often used to allow access on data.
The server that contains the data determines if you are allowed to
access the data.
Transport Security (Encryption)
- is the process of encoding messages (or information) in such a way that
eavesdroppers or hackers cannot read it, but that authorized parties can.
Example:
A messenger is asked to deliver certain documents that contains financial
information from a large company to another company. The documents was
accidentally dropped somewhere on the road. Fortunately the information on
the documents is encoded to prevent unauthorized persons to read it.
When computers interact with each other, they send encrypted information
through secured lines to prevent unauthorized persons from acquiring it.
Authorization
- is the function of specifying access rights to resources, which is
related to information security and computer security in general
and to access control in particular.
Having multiple users has different levels of access which is
determined by the server that holds the data.
Example:
Inside any establishment there is a door that says “authorized
personnel only”. This informs you that if you are not authorized or
an employee of the establishment that you are denied of access.
Access Control
is the selective restriction of access to a place or other resource.
Different kinds of users has different levels of access. Some can access more data
than the others.
Example:
Inside a bank, a client can only enter the lobby and interact with personnel while an
employee can access the lobby and work stations to perform bank operations.
Auditing
The process of reviewing security logs that is acquired throughout a certain period
or as it happens.
Monitoring interactions between the server to anyone that is wanting and acquiring
access to the data. Basically having a record of who goes in and out of the system.
Example:
Some establishments has strict guidelines on who enters and exits. A security guard
would require you to write down your name and destination inside the
establishment. This allows them to monitor the flow of people to the establishment.

More Related Content

Similar to Module 6 Assignment 3

put the following into another words Authentication is the process of.docx
put the following into another words Authentication is the process of.docxput the following into another words Authentication is the process of.docx
put the following into another words Authentication is the process of.docx
LukeQVdGrantg
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
Ganbayar Sukhbaatar
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
Karen Oliver
 
Implementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control PlanImplementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control Plan
Angie Willis
 

Similar to Module 6 Assignment 3 (20)

Goals of security
Goals of securityGoals of security
Goals of security
 
Unit 1
Unit 1Unit 1
Unit 1
 
Unit 1
Unit 1Unit 1
Unit 1
 
put the following into another words Authentication is the process of.docx
put the following into another words Authentication is the process of.docxput the following into another words Authentication is the process of.docx
put the following into another words Authentication is the process of.docx
 
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principals
 
Phases of Building Access Control Systems Houston, TX
Phases of Building Access Control Systems Houston, TXPhases of Building Access Control Systems Houston, TX
Phases of Building Access Control Systems Houston, TX
 
Distributed System - Security
Distributed System - SecurityDistributed System - Security
Distributed System - Security
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
 
Cryptography and authentication
Cryptography and authenticationCryptography and authentication
Cryptography and authentication
 
security IDS
security IDSsecurity IDS
security IDS
 
Information Security and Indian IT Act 2000
Information Security and Indian IT Act 2000Information Security and Indian IT Act 2000
Information Security and Indian IT Act 2000
 
Whitepaper: Best Practices for Electronic Document Management and Security
Whitepaper: Best Practices for Electronic Document Management and SecurityWhitepaper: Best Practices for Electronic Document Management and Security
Whitepaper: Best Practices for Electronic Document Management and Security
 
CompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentalsCompTIA Security+ Module1: Security fundamentals
CompTIA Security+ Module1: Security fundamentals
 
Module 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptxModule 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptx
 
Unit 1
Unit 1Unit 1
Unit 1
 
Cyber Security Part-I.pptx
Cyber Security Part-I.pptxCyber Security Part-I.pptx
Cyber Security Part-I.pptx
 
What is Access Control and Why is it Important for Cybersecurity.pdf
What is Access Control and Why is it Important for Cybersecurity.pdfWhat is Access Control and Why is it Important for Cybersecurity.pdf
What is Access Control and Why is it Important for Cybersecurity.pdf
 
Access system.docx
Access system.docxAccess system.docx
Access system.docx
 
Remote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal ThingRemote Access Policy Is A Normal Thing
Remote Access Policy Is A Normal Thing
 
Implementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control PlanImplementing Physical Security As An Access Control Plan
Implementing Physical Security As An Access Control Plan
 

Recently uploaded

Sonia Journal club presentation (2).pptx
Sonia Journal club presentation (2).pptxSonia Journal club presentation (2).pptx
Sonia Journal club presentation (2).pptx
palsonia139
 
Best medicine 100% Effective&Safe Mifepristion ௵+918133066128௹Abortion pills ...
Best medicine 100% Effective&Safe Mifepristion ௵+918133066128௹Abortion pills ...Best medicine 100% Effective&Safe Mifepristion ௵+918133066128௹Abortion pills ...
Best medicine 100% Effective&Safe Mifepristion ௵+918133066128௹Abortion pills ...
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Cytoskeleton and Cell Inclusions - Dr Muhammad Ali Rabbani - Medicose Academics
Cytoskeleton and Cell Inclusions - Dr Muhammad Ali Rabbani - Medicose AcademicsCytoskeleton and Cell Inclusions - Dr Muhammad Ali Rabbani - Medicose Academics
Cytoskeleton and Cell Inclusions - Dr Muhammad Ali Rabbani - Medicose Academics
MedicoseAcademics
 
Histology of Epithelium - Dr Muhammad Ali Rabbani - Medicose Academics
Histology of Epithelium - Dr Muhammad Ali Rabbani - Medicose AcademicsHistology of Epithelium - Dr Muhammad Ali Rabbani - Medicose Academics
Histology of Epithelium - Dr Muhammad Ali Rabbani - Medicose Academics
MedicoseAcademics
 

Recently uploaded (20)

Dermatome and myotome test & pathology.pdf
Dermatome and myotome test & pathology.pdfDermatome and myotome test & pathology.pdf
Dermatome and myotome test & pathology.pdf
 
Sonia Journal club presentation (2).pptx
Sonia Journal club presentation (2).pptxSonia Journal club presentation (2).pptx
Sonia Journal club presentation (2).pptx
 
Best medicine 100% Effective&Safe Mifepristion ௵+918133066128௹Abortion pills ...
Best medicine 100% Effective&Safe Mifepristion ௵+918133066128௹Abortion pills ...Best medicine 100% Effective&Safe Mifepristion ௵+918133066128௹Abortion pills ...
Best medicine 100% Effective&Safe Mifepristion ௵+918133066128௹Abortion pills ...
 
How to buy 5cladba precursor raw 5cl-adb-a raw material
How to buy 5cladba precursor raw 5cl-adb-a raw materialHow to buy 5cladba precursor raw 5cl-adb-a raw material
How to buy 5cladba precursor raw 5cl-adb-a raw material
 
Sell 5cladba adbb JWH-018 5FADB in stock
Sell 5cladba adbb JWH-018 5FADB in stockSell 5cladba adbb JWH-018 5FADB in stock
Sell 5cladba adbb JWH-018 5FADB in stock
 
Cytoskeleton and Cell Inclusions - Dr Muhammad Ali Rabbani - Medicose Academics
Cytoskeleton and Cell Inclusions - Dr Muhammad Ali Rabbani - Medicose AcademicsCytoskeleton and Cell Inclusions - Dr Muhammad Ali Rabbani - Medicose Academics
Cytoskeleton and Cell Inclusions - Dr Muhammad Ali Rabbani - Medicose Academics
 
Tips to Choose the Best Psychiatrists in Indore
Tips to Choose the Best Psychiatrists in IndoreTips to Choose the Best Psychiatrists in Indore
Tips to Choose the Best Psychiatrists in Indore
 
Gross Anatomy and Histology of Tongue by Dr. Rabia Inam Gandapore.pptx
Gross Anatomy and Histology of Tongue by Dr. Rabia Inam Gandapore.pptxGross Anatomy and Histology of Tongue by Dr. Rabia Inam Gandapore.pptx
Gross Anatomy and Histology of Tongue by Dr. Rabia Inam Gandapore.pptx
 
DR. Neha Mehta Best Psychologist.in India
DR. Neha Mehta Best Psychologist.in IndiaDR. Neha Mehta Best Psychologist.in India
DR. Neha Mehta Best Psychologist.in India
 
SEMESTER-V CHILD HEALTH NURSING-UNIT-1-INTRODUCTION.pdf
SEMESTER-V CHILD HEALTH NURSING-UNIT-1-INTRODUCTION.pdfSEMESTER-V CHILD HEALTH NURSING-UNIT-1-INTRODUCTION.pdf
SEMESTER-V CHILD HEALTH NURSING-UNIT-1-INTRODUCTION.pdf
 
Is Rheumatoid Arthritis a Metabolic Disorder.pptx
Is Rheumatoid Arthritis a Metabolic Disorder.pptxIs Rheumatoid Arthritis a Metabolic Disorder.pptx
Is Rheumatoid Arthritis a Metabolic Disorder.pptx
 
Unveiling Alcohol Withdrawal Syndrome: exploring it's hidden depths
Unveiling Alcohol Withdrawal Syndrome: exploring it's hidden depthsUnveiling Alcohol Withdrawal Syndrome: exploring it's hidden depths
Unveiling Alcohol Withdrawal Syndrome: exploring it's hidden depths
 
Post-Cycle Therapy (PCT) in bodybuilding docx.pdf
Post-Cycle Therapy (PCT) in bodybuilding  docx.pdfPost-Cycle Therapy (PCT) in bodybuilding  docx.pdf
Post-Cycle Therapy (PCT) in bodybuilding docx.pdf
 
Histology of Epithelium - Dr Muhammad Ali Rabbani - Medicose Academics
Histology of Epithelium - Dr Muhammad Ali Rabbani - Medicose AcademicsHistology of Epithelium - Dr Muhammad Ali Rabbani - Medicose Academics
Histology of Epithelium - Dr Muhammad Ali Rabbani - Medicose Academics
 
ESC HF 2024 Spotlights Day-2.pptx heart failure
ESC HF 2024 Spotlights Day-2.pptx heart failureESC HF 2024 Spotlights Day-2.pptx heart failure
ESC HF 2024 Spotlights Day-2.pptx heart failure
 
Hemodialysis: Chapter 1, Physiological Principles of Hemodialysis - Dr.Gawad
Hemodialysis: Chapter 1, Physiological Principles of Hemodialysis - Dr.GawadHemodialysis: Chapter 1, Physiological Principles of Hemodialysis - Dr.Gawad
Hemodialysis: Chapter 1, Physiological Principles of Hemodialysis - Dr.Gawad
 
ROSE CASE SPINAL SBRT BY DR KANHU CHARAN PATRO
ROSE  CASE SPINAL SBRT BY DR KANHU CHARAN PATROROSE  CASE SPINAL SBRT BY DR KANHU CHARAN PATRO
ROSE CASE SPINAL SBRT BY DR KANHU CHARAN PATRO
 
Signs It’s Time for Physiotherapy Sessions Prioritizing Wellness
Signs It’s Time for Physiotherapy Sessions Prioritizing WellnessSigns It’s Time for Physiotherapy Sessions Prioritizing Wellness
Signs It’s Time for Physiotherapy Sessions Prioritizing Wellness
 
The Orbit & its contents by Dr. Rabia I. Gandapore.pptx
The Orbit & its contents by Dr. Rabia I. Gandapore.pptxThe Orbit & its contents by Dr. Rabia I. Gandapore.pptx
The Orbit & its contents by Dr. Rabia I. Gandapore.pptx
 
CONGENITAL HYPERTROPHIC PYLORIC STENOSIS by Dr M.KARTHIK EMMANUEL
CONGENITAL HYPERTROPHIC PYLORIC STENOSIS  by Dr M.KARTHIK EMMANUELCONGENITAL HYPERTROPHIC PYLORIC STENOSIS  by Dr M.KARTHIK EMMANUEL
CONGENITAL HYPERTROPHIC PYLORIC STENOSIS by Dr M.KARTHIK EMMANUEL
 

Module 6 Assignment 3

  • 1. By: Lhou Ghin T. Magluyan Security in Telemedicine
  • 3. Authentication -is the act of confirming the truth of an attribute of a datum or entity. Example: When entering a restricted establishment, you are required to be identified before you enter. An Identification Card (ID) is the perfect example to verify your identity which allows access. Username and password is often used to allow access on data. The server that contains the data determines if you are allowed to access the data.
  • 4. Transport Security (Encryption) - is the process of encoding messages (or information) in such a way that eavesdroppers or hackers cannot read it, but that authorized parties can. Example: A messenger is asked to deliver certain documents that contains financial information from a large company to another company. The documents was accidentally dropped somewhere on the road. Fortunately the information on the documents is encoded to prevent unauthorized persons to read it. When computers interact with each other, they send encrypted information through secured lines to prevent unauthorized persons from acquiring it.
  • 5. Authorization - is the function of specifying access rights to resources, which is related to information security and computer security in general and to access control in particular. Having multiple users has different levels of access which is determined by the server that holds the data. Example: Inside any establishment there is a door that says “authorized personnel only”. This informs you that if you are not authorized or an employee of the establishment that you are denied of access.
  • 6. Access Control is the selective restriction of access to a place or other resource. Different kinds of users has different levels of access. Some can access more data than the others. Example: Inside a bank, a client can only enter the lobby and interact with personnel while an employee can access the lobby and work stations to perform bank operations.
  • 7. Auditing The process of reviewing security logs that is acquired throughout a certain period or as it happens. Monitoring interactions between the server to anyone that is wanting and acquiring access to the data. Basically having a record of who goes in and out of the system. Example: Some establishments has strict guidelines on who enters and exits. A security guard would require you to write down your name and destination inside the establishment. This allows them to monitor the flow of people to the establishment.