Skip to main content
Erschienen in: Journal of Digital Imaging 1/2017

11.10.2016

Cyber-Security Issues in Healthcare Information Technology

verfasst von: Steve G. Langer

Erschienen in: Journal of Imaging Informatics in Medicine | Ausgabe 1/2017

Einloggen, um Zugang zu erhalten

Abstract

In 1999–2003, SIIM (then SCAR) sponsored the creation of several special topic Primers, one of which was concerned with computer security. About the same time, a multi-society collaboration authored an ACR Guideline with a similar plot; the latter has recently been updated. The motivation for these efforts was the launch of Health Information Portability and Accountability Act (HIPAA). That legislation directed care providers to enable the portability of patient medical records across authorized medical centers, while simultaneously protecting patient confidentiality among unauthorized agents. These policy requirements resulted in the creation of numerous technical solutions which the above documents described. While the mathematical concepts and algorithms in those papers are as valid today as they were then, recent increases in the complexity of computer criminal applications (and defensive countermeasures) and the pervasiveness of Internet connected devices have raised the bar. This work examines how a medical center can adapt to these evolving threats.
Anhänge
Nur mit Berechtigung zugänglich
Glossar
Authentication
Is the agent who they claim to be
Authorization
Does the agent have rights to the resource
Confidentiality (data)
Is data secure from the eyes of unintended agents
Cyphertext
The encrypted version of an unencoded “clear” text
Denial of service
An attack that incapacitates a service running on a computer
Encryption
A reversible process to converts a clear text message that can be read by anyone into a cipher-text message that can be read by no one, unless they possess the decryption key(s).
Firewall
A device that contains two network cards on two different networks, and uses a rule base to select what data is passed through and in what direction
Hashing
An algorithm to generate a unique value from a unique text input
Integrity (Data)
Is data unaltered from its original sent state
Internet
The big “I” internet is the world wide network connecting the millions of private local area networks.
Local Area Network
Generally applied to a local Ethernet subnet where all computers have the same address suffix (i.e. xxx.corporationX.com)
Non-repudiation
Can an agent send/alter a message, then later deny having sent/altered it
One/two-factor authentication
One factor authentication may require only one piece of data, perhaps a password. Two factor methods use an additional item, perhaps a biometric (fingerprint, voice, etc.) to perform authentication.
Public Key Infrastructure
A trusted means of distributing individual’s public keys. Required in a large scale implementation of a public key encryption system.
Reliability
Is a service or system available and accurate when needed
Sniffing
Using a network interface card in a promiscuous mode to capture all data on the network, even if it is not meant for the local machine
Spoofing
Faking the Internet address of packets emanating from one’s computer so as to assume the identity of another computer and hide one’s true identity
Switched networks
As opposed to shared networks (which act like a party line in the telephone world), switched networks create private links momentarily between computers
Tripwire
A program that can detect intruder’s changes to a computer system’s critical files
Trojan Horse
A program that masquerades as something benign but actually contains Malware.
Virtual Private Network
A method of encrypting data passed on the open Internet so it is as if the users share a private link
Literatur
2.
Zurück zum Zitat Seibert T, Andriole K, Langer S, Siegel E, Morin R: Practice Guideline for Electronic Medical Information Privacy and Security. American College of Radiology Practice Guideline. 2004; 2004(Res. 12):471–77. PMID: 0 Seibert T, Andriole K, Langer S, Siegel E, Morin R: Practice Guideline for Electronic Medical Information Privacy and Security. American College of Radiology Practice Guideline. 2004; 2004(Res. 12):471–77. PMID: 0
8.
Zurück zum Zitat Zargar ST: A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks. IEEE Commun Surv Tutorials 11:2046–2069, 2013CrossRef Zargar ST: A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks. IEEE Commun Surv Tutorials 11:2046–2069, 2013CrossRef
10.
Zurück zum Zitat Lippmann R, Haines JW, Fried DJ, Korba J, Das K: “The 1999 DARPA Off-Line Intrusion Detection Evaluation”. Comput Netw 34(4):579–595, 2000CrossRef Lippmann R, Haines JW, Fried DJ, Korba J, Das K: “The 1999 DARPA Off-Line Intrusion Detection Evaluation”. Comput Netw 34(4):579–595, 2000CrossRef
12.
Zurück zum Zitat Becher M, Freiling FC, Hoffmann J, Holz T, Uellenbeck S, & Wolf C: Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices.” Security and Privacy (SP), 2011 I.E. Symposium on (pp. 96–111). IEEE 2011 Becher M, Freiling FC, Hoffmann J, Holz T, Uellenbeck S, & Wolf C: Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices.” Security and Privacy (SP), 2011 I.E. Symposium on (pp. 96–111). IEEE 2011
13.
Zurück zum Zitat Foster B, & Lejins Y: Ehealth security Australia: the Solution Lies with Frameworks and Standards. Proceedings of the 2nd Australian eHealth Informatics and Security Conference, 2–4 December 2013, Edith Cowan University, Perth, Western Australia, 2013 Foster B, & Lejins Y: Ehealth security Australia: the Solution Lies with Frameworks and Standards. Proceedings of the 2nd Australian eHealth Informatics and Security Conference, 2–4 December 2013, Edith Cowan University, Perth, Western Australia, 2013
14.
Zurück zum Zitat Maydanchik A: “Data Quality Assessment”, Technics Publications, LLC, Bradley Beach, NJ, 2007 Maydanchik A: “Data Quality Assessment”, Technics Publications, LLC, Bradley Beach, NJ, 2007
15.
Zurück zum Zitat Open Web Application Security Project (2005) “OWASP Developers Guide V2.0”. OWASP Publishing, Bel Air, MD Open Web Application Security Project (2005) “OWASP Developers Guide V2.0”. OWASP Publishing, Bel Air, MD
20.
Zurück zum Zitat The Honeynet Project (Gordon Lyon, 2001). “Know Your Enemy: Revealing the Security Tools, Tactics and Motives of the Blackhat Community”. ISBN-10: 0321166469 Addison Wesley, New York, NY The Honeynet Project (Gordon Lyon, 2001). “Know Your Enemy: Revealing the Security Tools, Tactics and Motives of the Blackhat Community”. ISBN-10: 0321166469 Addison Wesley, New York, NY
22.
Zurück zum Zitat Oechslin, Philippe (2003-08-17). “Making a Faster Cryptanalytical Time-Memory Trade-Off”. Advances in Cryptology: Proceedings of CRYPTO 2003, 23rd Annual International Cryptology Conference. Lecture Notes in Computer Science (Santa Barbara, California, USA: Springer). ISBN 3-540-40674-3 Oechslin, Philippe (2003-08-17). “Making a Faster Cryptanalytical Time-Memory Trade-Off”. Advances in Cryptology: Proceedings of CRYPTO 2003, 23rd Annual International Cryptology Conference. Lecture Notes in Computer Science (Santa Barbara, California, USA: Springer). ISBN 3-540-40674-3
23.
Zurück zum Zitat Takai TM, et al: “Guide for Conducting Risk Assessments”, National Institute of Standards and Technology-Computer Security Division, Gaithersburg, MD, 2012 Takai TM, et al: “Guide for Conducting Risk Assessments”, National Institute of Standards and Technology-Computer Security Division, Gaithersburg, MD, 2012
24.
Zurück zum Zitat Scarfone K, et al: “Technical Guide to Information Security and Assessment”. NIST Special Publication 800–115. National Institute of Standards and Technology-Computer Security Division, Gaithersburg, MD, 2008 Scarfone K, et al: “Technical Guide to Information Security and Assessment”. NIST Special Publication 800–115. National Institute of Standards and Technology-Computer Security Division, Gaithersburg, MD, 2008
25.
Zurück zum Zitat Sons S: Under the sink: security exercises. Linux J 276:42–58, 2016 Sons S: Under the sink: security exercises. Linux J 276:42–58, 2016
26.
Zurück zum Zitat Schneier B: Applied Cryptography”. Wiley and Sons, Hoboken, NJ, 1996 Schneier B: Applied Cryptography”. Wiley and Sons, Hoboken, NJ, 1996
27.
Zurück zum Zitat Schoen D, Kumar N: Getting Started with Spiceworks”. Packt Publishing, Birmingham, UK, 2013 Schoen D, Kumar N: Getting Started with Spiceworks”. Packt Publishing, Birmingham, UK, 2013
28.
Zurück zum Zitat Carter G: LDAP System Administration”. O’Reilly Media, Sebastopol, CA, 2003 Carter G: LDAP System Administration”. O’Reilly Media, Sebastopol, CA, 2003
29.
Zurück zum Zitat Snedaker S: Business Continuity and Disaster Recovery Planning for IT Professionals, 2nd edition. Elsevier Publishing, Amsterdam, Netherlands, 2013 Snedaker S: Business Continuity and Disaster Recovery Planning for IT Professionals, 2nd edition. Elsevier Publishing, Amsterdam, Netherlands, 2013
30.
Zurück zum Zitat Davies J: Implementing SSL/TLS Using Cryptography and PKI”. Wiley and Sons, Hoboken, NJ, 2011 Davies J: Implementing SSL/TLS Using Cryptography and PKI”. Wiley and Sons, Hoboken, NJ, 2011
31.
Zurück zum Zitat Garfinkel S: Pretty Good Privacy”. O’Reilly Media, Sebastopol, CA, 1994 Garfinkel S: Pretty Good Privacy”. O’Reilly Media, Sebastopol, CA, 1994
Metadaten
Titel
Cyber-Security Issues in Healthcare Information Technology
verfasst von
Steve G. Langer
Publikationsdatum
11.10.2016
Verlag
Springer International Publishing
Erschienen in
Journal of Imaging Informatics in Medicine / Ausgabe 1/2017
Print ISSN: 2948-2925
Elektronische ISSN: 2948-2933
DOI
https://doi.org/10.1007/s10278-016-9913-x

Weitere Artikel der Ausgabe 1/2017

Journal of Digital Imaging 1/2017 Zur Ausgabe

Update Radiologie

Bestellen Sie unseren Fach-Newsletter und bleiben Sie gut informiert.