Implementing Information Security in Healthcare最新文献

筛选
英文 中文
Access Control 访问控制
Implementing Information Security in Healthcare Pub Date : 2020-09-23 DOI: 10.4324/9781003126294-9
B. Evans
{"title":"Access Control","authors":"B. Evans","doi":"10.4324/9781003126294-9","DOIUrl":"https://doi.org/10.4324/9781003126294-9","url":null,"abstract":"","PeriodicalId":116149,"journal":{"name":"Implementing Information Security in Healthcare","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116979509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Managing Mobile Devices 管理移动设备
Implementing Information Security in Healthcare Pub Date : 2020-09-23 DOI: 10.4324/9781003126294-12
Mark W Dill, B. Evans, T. Walsh
{"title":"Managing Mobile Devices","authors":"Mark W Dill, B. Evans, T. Walsh","doi":"10.4324/9781003126294-12","DOIUrl":"https://doi.org/10.4324/9781003126294-12","url":null,"abstract":"","PeriodicalId":116149,"journal":{"name":"Implementing Information Security in Healthcare","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126329661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Change Control and Change Management 变更控制和变更管理
Implementing Information Security in Healthcare Pub Date : 2020-09-23 DOI: 10.4324/9781003126294-17
Michelle Bigelow
{"title":"Change Control and Change Management","authors":"Michelle Bigelow","doi":"10.4324/9781003126294-17","DOIUrl":"https://doi.org/10.4324/9781003126294-17","url":null,"abstract":"","PeriodicalId":116149,"journal":{"name":"Implementing Information Security in Healthcare","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129412833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Incident Handling 事件处理
Implementing Information Security in Healthcare Pub Date : 2020-09-23 DOI: 10.4324/9781003126294-20
Shelia T. Searson, J. Cole
{"title":"Incident Handling","authors":"Shelia T. Searson, J. Cole","doi":"10.4324/9781003126294-20","DOIUrl":"https://doi.org/10.4324/9781003126294-20","url":null,"abstract":"","PeriodicalId":116149,"journal":{"name":"Implementing Information Security in Healthcare","volume":"422 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132034906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Network Security 网络安全
Implementing Information Security in Healthcare Pub Date : 2020-09-23 DOI: 10.4324/9781003126294-10
Buddy Gilbert
{"title":"Network Security","authors":"Buddy Gilbert","doi":"10.4324/9781003126294-10","DOIUrl":"https://doi.org/10.4324/9781003126294-10","url":null,"abstract":"","PeriodicalId":116149,"journal":{"name":"Implementing Information Security in Healthcare","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134088638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Business Continuity and Disaster Recovery 业务连续性和灾难恢复
Implementing Information Security in Healthcare Pub Date : 2020-09-23 DOI: 10.4324/9781003126294-16
Tom Walsh
{"title":"Business Continuity and Disaster Recovery","authors":"Tom Walsh","doi":"10.4324/9781003126294-16","DOIUrl":"https://doi.org/10.4324/9781003126294-16","url":null,"abstract":"1 Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.","PeriodicalId":116149,"journal":{"name":"Implementing Information Security in Healthcare","volume":"25 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134616831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Application Security App 保护。
Implementing Information Security in Healthcare Pub Date : 2020-09-23 DOI: 10.4324/9781003126294-13
Joseph Dalton, Ander Hoaglund
{"title":"Application Security","authors":"Joseph Dalton, Ander Hoaglund","doi":"10.4324/9781003126294-13","DOIUrl":"https://doi.org/10.4324/9781003126294-13","url":null,"abstract":"When the time arrives to deploy an application that needs security, it becomes apparent that adding security is much harder than just adding a password protected login screen. This paper contains a collection of patterns for application security. Six patterns are presented in this paper: 1) Secure Access Layer, 2) Single Access Point, 3) Check Point, 4) Roles, 5) Session, and 6) Limited View. Secure Access Layer provides a communication interface for developers and provides a means for applications to use the security of the systems on which they are built. Single Access Point permits entry into the application through one single point. Check Point gives the developer a way to handle different types of security breaches without being too harsh on users who are just making mistakes. Groups of users have different Roles that define what they can and can not do. The global information about the user is distributed throughout the application via a Session. Finall y, users are only presented with legal options through a Limited View. These six patterns work together to provide a security framework for building applications.","PeriodicalId":116149,"journal":{"name":"Implementing Information Security in Healthcare","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116032746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Risk Analysis 风险分析
Implementing Information Security in Healthcare Pub Date : 2020-09-23 DOI: 10.4324/9781003126294-4
Susan Lucci, T. Walsh
{"title":"Risk Analysis","authors":"Susan Lucci, T. Walsh","doi":"10.4324/9781003126294-4","DOIUrl":"https://doi.org/10.4324/9781003126294-4","url":null,"abstract":"","PeriodicalId":116149,"journal":{"name":"Implementing Information Security in Healthcare","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127190337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信