๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Implementing Information Security in Healthcare: Building a Security Program

โœ Scribed by Herzig, Terrell W(Editor);Walsh, Tom(Editor);Gallagher, Lisa A(Editor)


Publisher
Healthcare Information and Management Systems Society (HIMSS)
Year
2013
Tongue
English
Leaves
313
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Implementing Information Security in Healthcare: Building a Security Program offers a critical and comprehensive look at healthcare security concerns in an era of powerful computer technology, increased mobility, and complex regulations designed to protect personal information. Featuring perspectives from more than two dozen security experts, Implementing Information Security in Healthcare: Building a Security Program explores the tools and policies healthcare organizations need to build an effective and compliant security program. Topics include information security frameworks, risk analysis, senior management oversight and involvement, regulations, security policy development, access control, network security, encryption, mobile device management, disaster recovery, and more. Information security is a concept that has never been more important to healthcare as it is today. This book offers stakeholders key guidance in fostering information security while striving toward improved patient care.

โœฆ Table of Contents


Cover......Page 1
Title Page......Page 2
Copyright Page......Page 3
About the Editors......Page 4
About the Contributors......Page 6
Table of Contents......Page 12
Acknowledgements......Page 14
A Tribute to Terrell W. Herzig......Page 16
Chapter 1: The Importance of Information Security in Healthcare......Page 20
Chapter 2: Information Security Frameworks......Page 26
Chapter 3: Information Security Planning......Page 38
Chapter 4: Risk Analysis......Page 46
Chapter 5: Senior Management Oversight and Involvement......Page 64
Chapter 6: Information Security Regulations......Page 74
Chapter 7: Security Policy Development......Page 84
Chapter 8: The Concept of Security Controls......Page 90
Chapter 9: Access Control......Page 94
Chapter 10: Network Security......Page 110
Chapter 11: Use of Encryption......Page 128
Chapter 12: Managing Mobile Devices......Page 142
Chapter 13: Application Security......Page 160
Chapter 14: Information Security Operations......Page 170
Chapter 15: Security Considerations in Technology Contracting......Page 182
Chapter 16: Business Continuity and Disaster Recovery......Page 202
Chapter 17: Change Control and Change Management......Page 222
Chapter 18: Testing Your Technical Controls......Page 234
Chapter 19: Auditing Your Program......Page 248
Chapter 20: Incident Handling......Page 268
Chapter 21: Information Systems Implementation......Page 286
Appendix A......Page 296
Appendix B......Page 302
Index......Page 304


๐Ÿ“œ SIMILAR VOLUMES


Building a Practical Information Securit
โœ Jason Andress, Mark Leary ๐Ÿ“‚ Library ๐Ÿ› Syngress ๐ŸŒ English

<p><span>Building a Practical Information Security Program</span><span> provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate existing

Building a Practical Information Securit
โœ Jason Andress, Mark Leary ๐Ÿ“‚ Library ๐Ÿ“… 2017 ๐Ÿ› Syngress ๐ŸŒ English

<p><i>Building a Practical Information Security Program</i> provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate existing security pro

Building an Information Security Awarene
โœ Mark B. Desman ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐ŸŒ English

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't kno

Building and implementing a security cer
โœ Patrick D. Howard ๐Ÿ“‚ Library ๐Ÿ“… 2006 ๐Ÿ› Auerbach Publications ๐ŸŒ English

Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAP CBK demonstrates the practicality and effectiveness of certification and accreditation (C&A) as a risk management methodology for IT systems in both public and private organizations. It pro

Safeguarding critical e-documents: imple
โœ Robert F. Smallwood ๐Ÿ“‚ Library ๐Ÿ“… 2012 ๐Ÿ› Wiley ๐ŸŒ English

Practical, step-by-step guidance for corporations, universities and government agencies to protect and secure confidential documents and business recordsManagers and public officials are looking for technology and information governance solutions to "information leakage" in an understandable, concis