5 concepts of security telemedicine
-
Upload
yeng-oliva -
Category
Business
-
view
100 -
download
0
Transcript of 5 concepts of security telemedicine
![Page 1: 5 concepts of security telemedicine](https://reader034.fdocuments.in/reader034/viewer/2022052507/5585595fd8b42a2d498b518e/html5/thumbnails/1.jpg)
F RA N C E S M A R I E L L E M . O L I VA , R N
5 CONCEPTS OF SECURITY TELEMEDICINE
![Page 2: 5 concepts of security telemedicine](https://reader034.fdocuments.in/reader034/viewer/2022052507/5585595fd8b42a2d498b518e/html5/thumbnails/2.jpg)
SECURITY
• Is the degree of resistance to, or protection from harm.
![Page 3: 5 concepts of security telemedicine](https://reader034.fdocuments.in/reader034/viewer/2022052507/5585595fd8b42a2d498b518e/html5/thumbnails/3.jpg)
AUTHENTICATION
• Verifying the identity of the user or service• Involves trusting both
the authentication information and computer it is coming from• Verification is through:
User ID and PasswordFiltering of IP addressTokens and many more
![Page 4: 5 concepts of security telemedicine](https://reader034.fdocuments.in/reader034/viewer/2022052507/5585595fd8b42a2d498b518e/html5/thumbnails/4.jpg)
TRANSPORT SECURITY (ENCRYPTION)
• Process of encoding messages (or information) in such a way that only authorized parties can read it.• Keeps data safe and
confidential even if unauthorized access occurs.
![Page 5: 5 concepts of security telemedicine](https://reader034.fdocuments.in/reader034/viewer/2022052507/5585595fd8b42a2d498b518e/html5/thumbnails/5.jpg)
AUTHORIZATION
• Process of verifying if the user has rights/permission to access.
• It promotes hierarchy at how much a person can access at a given level.Ex. Patients are only
permitted to view their laboratory results but they are not permitted to view the Doctor’s notes.
![Page 6: 5 concepts of security telemedicine](https://reader034.fdocuments.in/reader034/viewer/2022052507/5585595fd8b42a2d498b518e/html5/thumbnails/6.jpg)
ACCESS CONTROL
• Users are granted access and certain privileges to the information or data.• Privileges to:
Read dataEdit dataDelete dataAdd data
![Page 7: 5 concepts of security telemedicine](https://reader034.fdocuments.in/reader034/viewer/2022052507/5585595fd8b42a2d498b518e/html5/thumbnails/7.jpg)
AUDIT CONTROL
• Logs or records of computer access.
• It is done to identify inappropriate or unauthorized access
• Recorded information include:User IP AddressPatientData TypeAccess TypeType of Access
![Page 8: 5 concepts of security telemedicine](https://reader034.fdocuments.in/reader034/viewer/2022052507/5585595fd8b42a2d498b518e/html5/thumbnails/8.jpg)
PHYSICAL SECURITY
• Addresses actions you can take to protect the data from intruders by: Housing all servers
containing valuable data in a main computer facility.
Staff should be present 24 hours per day,
Must be secured with biometric access controlled devices,
Installation of unauthorized software is prohibited.