𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Securing medical networks

✍ Scribed by Ram Dantu; Herman Oosterwijk; Prakash Kolan; Husain Husna


Publisher
Elsevier Science
Year
2007
Tongue
English
Weight
228 KB
Volume
2007
Category
Article
ISSN
1353-4858

No coin nor oath required. For personal study only.

✦ Synopsis


The HIPAA regulations establish national standards on all healthcare systems, including digital medical imaging transactions. They outline a comprehensive risk analysis assisting in investigations of possible security breaches 1 . Such regulations are particularly important to medical imaging because picture archiving and communication systems (PACS), which handle the storage and distribution of medical images, provide easier access to a vast number of confidential records.

The global healthcare system

As PACS become more sophisticated, safeguarding this data has become even more challenging. Access and diagnosis methods require a strong security measures to safeguard patient privacy. We should therefore bring all of the separate medical entities into one global healthcare system to enable the proper flow of information while maintaining strict security policies to prevent unauthorised access 2 . These entities can range from a single medical device (such as a CT scanner) to an entire medical establishment (eg, a hospital).

Among these entities, PACS (which represent a network of image acquisition devices, display devices, storage devices, and imaging servers), plays a vital role in efforts to improve patient healthcare by providing radiologists and physicians with timely access to radiology exams and results.

"A security threat to PACS may introduce many unforeseen security risks to the remaining network components"

A security threat to PACS may introduce many unforeseen security risks to the remaining network components. In particular, the confidentiality of patient data could be jeopardised. Images sent to doctors' homes after hours must be sent over encrypted communication links. HIPAA specifies encryption requirements in the technical safeguards rules.

The regulations also address the integrity of the data through a requirement for audit trails (also part of the technical safeguards), so that changes can be tracked. Typically, audit trails track any modification of the radiology workstations and archive. Availability is also addressed through a requirement for emergency access procedures. This can be as simple as an internal emergency access number for physicians, enabling them to gain access to any clinical information on the institution's workstations 3 .


πŸ“œ SIMILAR VOLUMES


Securing IP networks
✍ Sindhu Xirasagar; Masoud Mojtahed πŸ“‚ Article πŸ“… 2010 πŸ› Elsevier Science 🌐 English βš– 357 KB

Security 13 eliminating the collateral damage of P2P applications. However, this won't address the vulnerability of files held on laptops or homeworkers' PCs used beyond the organisation's boundaries. For the time being, your best defence in these circumstances is education about the dangers. But we

Securing cognitive radio networks
✍ O. LeΓ³n; J. HernΓ‘ndez-Serrano; M. Soriano πŸ“‚ Article πŸ“… 2010 πŸ› John Wiley and Sons 🌐 English βš– 478 KB

## Abstract Cognitive radio is a promising technology aiming to improve the utilization of the radio electromagnetic spectrum. A cognitive radio device uses general purpose computer processors that run radio applications software to perform signal processing. The use of this software enables the de

Securing process control networks
✍ Dominic Storey πŸ“‚ Article πŸ“… 2009 πŸ› Elsevier Science 🌐 English βš– 145 KB

## PROCESS CONTROL in handling false positives, since many downloaded files or browser plugins are innocuous. Making this determination requires human antivirus expertise and systems that are outside of the scope of this article. Without a team of security experts checking sites and continually ad

Securing IP networks, part I
✍ Sindhu Xirasagar; Masoud Mojtahed πŸ“‚ Article πŸ“… 2009 πŸ› Elsevier Science 🌐 English βš– 365 KB