{"title":"Access Control","authors":"B. Evans","doi":"10.4324/9781003126294-9","DOIUrl":"https://doi.org/10.4324/9781003126294-9","url":null,"abstract":"","PeriodicalId":116149,"journal":{"name":"Implementing Information Security in Healthcare","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116979509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Managing Mobile Devices","authors":"Mark W Dill, B. Evans, T. Walsh","doi":"10.4324/9781003126294-12","DOIUrl":"https://doi.org/10.4324/9781003126294-12","url":null,"abstract":"","PeriodicalId":116149,"journal":{"name":"Implementing Information Security in Healthcare","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126329661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Change Control and Change Management","authors":"Michelle Bigelow","doi":"10.4324/9781003126294-17","DOIUrl":"https://doi.org/10.4324/9781003126294-17","url":null,"abstract":"","PeriodicalId":116149,"journal":{"name":"Implementing Information Security in Healthcare","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129412833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Incident Handling","authors":"Shelia T. Searson, J. Cole","doi":"10.4324/9781003126294-20","DOIUrl":"https://doi.org/10.4324/9781003126294-20","url":null,"abstract":"","PeriodicalId":116149,"journal":{"name":"Implementing Information Security in Healthcare","volume":"422 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132034906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Security","authors":"Buddy Gilbert","doi":"10.4324/9781003126294-10","DOIUrl":"https://doi.org/10.4324/9781003126294-10","url":null,"abstract":"","PeriodicalId":116149,"journal":{"name":"Implementing Information Security in Healthcare","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134088638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Business Continuity and Disaster Recovery","authors":"Tom Walsh","doi":"10.4324/9781003126294-16","DOIUrl":"https://doi.org/10.4324/9781003126294-16","url":null,"abstract":"1 Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.","PeriodicalId":116149,"journal":{"name":"Implementing Information Security in Healthcare","volume":"25 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134616831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application Security","authors":"Joseph Dalton, Ander Hoaglund","doi":"10.4324/9781003126294-13","DOIUrl":"https://doi.org/10.4324/9781003126294-13","url":null,"abstract":"When the time arrives to deploy an application that needs security, it becomes apparent that adding security is much harder than just adding a password protected login screen. This paper contains a collection of patterns for application security. Six patterns are presented in this paper: 1) Secure Access Layer, 2) Single Access Point, 3) Check Point, 4) Roles, 5) Session, and 6) Limited View. Secure Access Layer provides a communication interface for developers and provides a means for applications to use the security of the systems on which they are built. Single Access Point permits entry into the application through one single point. Check Point gives the developer a way to handle different types of security breaches without being too harsh on users who are just making mistakes. Groups of users have different Roles that define what they can and can not do. The global information about the user is distributed throughout the application via a Session. Finall y, users are only presented with legal options through a Limited View. These six patterns work together to provide a security framework for building applications.","PeriodicalId":116149,"journal":{"name":"Implementing Information Security in Healthcare","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116032746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Risk Analysis","authors":"Susan Lucci, T. Walsh","doi":"10.4324/9781003126294-4","DOIUrl":"https://doi.org/10.4324/9781003126294-4","url":null,"abstract":"","PeriodicalId":116149,"journal":{"name":"Implementing Information Security in Healthcare","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127190337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}