Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Unit Objectives Security and Wireless Networking, Lecture notes of Wireless Networking

Describe security concerns for wireless networks and h t dd th how to address them. • List security concerns/regulations for health care applications.

Typology: Lecture notes

2022/2023

Uploaded on 05/11/2023

edmond
edmond 🇺🇸

3.8

(10)

251 documents

1 / 6

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
1
Component 4: Introduction
to Information and Computer
Science
Unit 8: Security
Lecture 3
This material was developed by Oregon Health & Science University, funded by the Department of Health and Human
Services, Office of the National Coordinator for Health Information Technology under Aw ard Number IU24OC000015.
Unit Objectives
List and describe common security concerns
Describe safeguards against common security concerns,
including firewalls, encryption, virus protection software
and patterns, programming for security, etc.
Describe security concerns for wireless networks and
htdd th
h
ow
t
o a
dd
ress
th
em
List security concerns/regulations for health care
applications
Describe security safeguards used for health care
applications
2
Component 4/Unit 8-3 Health IT Workforce Curriculum
Version 2.0/Spring 2011
Security and Wireless
Networking
Wireless networks unsecure by their very nature.
Home networks.
Hot spots.
Campus environments.
Wireless networks are everywhere in medical
environment.
Doctors & nurses move from room-to-room
constantly.
3
Component 4/Unit 8-3 Health IT Workforce Curriculum
Version 2.0/Spring 2011
pf3
pf4
pf5

Partial preview of the text

Download Unit Objectives Security and Wireless Networking and more Lecture notes Wireless Networking in PDF only on Docsity!

Component 4: Introduction

to Information and Computer

Science

Unit 8: Security Lecture 3

This material was developed by Oregon Health & Science University, funded by the Department of Health and HumanServices, Office of the National Coordinator for Health Information Technology under Award Number IU24OC000015.

Unit Objectives

  • List and describe common security concerns
  • Describe safeguards against common security concerns, including firewalls, encryption, virus protection software and patterns, programming for security, etc.
  • Describe security concerns for wireless networks and hhow to address them t dd th
  • List security concerns/regulations for health care applications
  • Describe security safeguards used for health care applications

Component 4/Unit 8-3 Health IT Workforce CurriculumVersion 2.0/Spring 2011 2

Security and Wireless

Networking

  • Wireless networks unsecure by their very nature.
    • Home networks.
    • Hot spots.
    • Campus environments.
  • Wireless networks are everywhere in medical environment. - Doctors & nurses move from room-to-room constantly.

Component 4/Unit 8-3 Health IT Workforce CurriculumVersion 2.0/Spring 2011 3

Wireless Device Security

  • Wireless Access Points (WAPs) must be configured for security: - Change default password. - Select unique SSID. - Do not broadcast SSID. - Require WPA2 authentication. - Restrict access to known devices. - Can program MAC addresses into WAP memory.

Component 4/Unit 8-3 Health IT Workforce CurriculumVersion 2.0/Spring 2011 4

Wireless Device Security

(cont’d)

  • Install digital certificates on sensitive

devices.

  • Only devices with known/valid certificates can communicate on networkcommunicate on network.
  • Requires use of special servers.
  • Not usually for small offices.

Component 4/Unit 8-3 Health IT Workforce CurriculumVersion 2.0/Spring 2011 5

  • The image shows a partial browser address bar with a valid bank certificate.
  • Click the gold lock to view the bank’s certificate.

Wireless Device Security

(cont’d)

  • Smartphones
    • All portable devices connecting to network need AV protection.
    • Do not use a portable device for sensitiveDo not use a portable device for sensitive transactions unless it is AV protected.
    • Do not open e-mail or attachments from unsolicited sources. - Known sources might be virus infected, meaning that they did not send the e-mail/attachment.
    • No exceptions. Component 4/Unit 8-3 Health IT Workforce CurriculumVersion 2.0/Spring 2011 6

EHRs Used by Health Care

Providers

  • EHRs are maintained by health care providers.
  • EHRs are covered by HIPAA rules.
  • EHRs utilize centralized database systems to integrate patient intake, medical care, pharmacy, billing etc into one systembilling, etc. into one system.
  • Departments/entities may not be in same physical location, so patient data must travel over the Internet.
  • People can view their own health record, taking ownership of its contents, ensuring accuracy, etc.

Component 4/Unit 8-3 Health IT Workforce CurriculumVersion 2.0/Spring 2011 10

EHR Security Q & A

  • How is my data sent over the Internet?  It should be sent in an encrypted, secure manner over the Internet.
  • Is my data safe?
    • Much depends on each organization’s physicalMuch depends on each organization s physical record and network security practices.
    • No data is 100% secure against theft or misuse.
  • Who can view my health records?  Only those who need to know or view the contents of your health record should be able to view it.  You must authorize all other access.

Component 4/Unit 8-3 Health IT Workforce CurriculumVersion 2.0/Spring 2011 11

Federal Regulations

  • HIPAA (Health Insurance Portability and Accountability Act) was enacted in 1996 by the federal government.
  • HIPAA requires that health care providers,q p insurance companies, and employers abide by privacy and security standards.

Component 4/Unit 8-3 Health IT Workforce CurriculumVersion 2.0/Spring 2011 12

HIPAA and Privacy

  • Privacy Rule  HIPAA requires those covered by the act to provide patients a “Notice of Privacy Practices” when care is first provided.  The Privacy Rule covers paper and electronic private health information.
  • Security Rule  Covers administrative, physical, and technical data safeguards that secure electronic health record data.

Component 4/Unit 8-3 Health IT Workforce CurriculumVersion 2.0/Spring 2011 13

What is Privacy?

  • Most privacy law revolves around privacy between a person and the government.
  • According to Wikipedia, “The law of privacy regulates the type of information which may be collected and how this information may be usedcollected and how this information may be used and stored.”  i.e., privacy relates to people.

Component 4/Unit 8-3 Health IT Workforce CurriculumVersion 2.0/Spring 2011 14

What is Confidentiality?

  • Not the same as privacy.
  • According to Wikipedia, “Confidentiality is commonly applied to conversations between doctors and patients. Legal protections prevent physicians from revealing certain discussionsphysicians from revealing certain discussions with patients, even under oath in court. The rule only applies to secrets shared between physician and patient during the course of providing medical care.”  i.e., confidentiality relates to data.

Component 4/Unit 8-3 Health IT Workforce CurriculumVersion 2.0/Spring 2011 15