Best practices of information security
management
Health Information Security
Session 05:Best Practices of Information
Security Management
“Cyber security…
It’s not just about technology”
DEFENCE IN DEPTH
• Concept in which multiple layers of security controls (defence)
are placed throughout an information technology (IT) system.
• Its intent is to provide redundancy in the event of a security
control fails or a vulnerability is exploited.
• Cover aspects of personnel, procedural, technical and physical
for the duration of the system's life cycle.
DEFENCE IN DEPTH CONTINU......
DEFENCE IN DEPTH CONTINU......
SECURITY CONTROLS
1. Physical control
2. Technical control
3. administrative control
1. PHYSICAL CONTROLS
Implementation of security measures in a defined structure used
to defend or prevent unauthorized access to sensitive material.
e.g.:
• Closed-circuit surveillance cameras
• Motion or thermal alarm systems
• Security guards
• Picture Ids
2.TECHNICAL CONTROLS
• Use of technology as a basis for controlling the access and usage
of sensitive data throughout a physical structure and over a
network.
• e.g.:
• Encryption
• Access control lists (ACLs)
• File integrity auditing software
ADMINISTRATIVE CONTROLS
• Administrative controls define the human factors of security.
• It involves all levels of personnel within an organization and
determines which users have access to what resources and
information by such means as:
• e.g.:
• Information Security policy
• Training and awareness
• Disaster preparedness and recovery plans
BEST PRACTISES - PROTECT YOUR
NETWORK
1. Create Specific Access Controls
• Minimum user privileges
2. Collect Detailed Logs
• for security and troubleshooting purposes
• backup logs
3. Maintain Security Patches
• make sure your software and hardware security is up to date
4. Educate and Train Your Users
• users will always be your weakest link
BEST PRACTISES - PROTECT YOUR
NETWORK CONTIN..
5. Policies and Guidelines
• Clear User Policies for New Employees and Vendors
• Security policy and guidelines for staff
6. User Activity Monitoring
7. Data Breach Response Plan
8. Back up and Restore
BEST PRACTICES -PROTECT OURSELF
1. Install anti-virus software and keep all computer software
patched and updates.
2. Use a strong password
• Password Vs Pass phrase
3. Log off public computers/Lock your computer
4. Keep personal information safe
• Be wary of suspicious e-mails
• Use secure Wi-Fi connections
• properly delete any personal information before sell or dispose of your
hardware
5. Limit social network information
• you should be wary about how much personal
information you post.
6. Download files only from trusted souses
7. Regular data Back up
Thank you

More Related Content

PPTX
Health information security session 4 risk management
PPTX
How To Secure MIS
PPT
Information Assurance And Security - Chapter 1 - Lesson 3
PDF
Using automation to improve the effectiveness of security operations
PPTX
security and system mainatance
PPT
Lesson 3- Effectiveness of IDPS
PPTX
Management Information System Presentation
Health information security session 4 risk management
How To Secure MIS
Information Assurance And Security - Chapter 1 - Lesson 3
Using automation to improve the effectiveness of security operations
security and system mainatance
Lesson 3- Effectiveness of IDPS
Management Information System Presentation

What's hot (20)

PPT
Information Assurance And Security - Chapter 1 - Lesson 4
PPT
Lesson 1- Risk Managment
PPT
Lesson 1- Intrusion Detection
PPTX
It security controls, plans, and procedures
 
PPTX
Introduction to Ethical Hacking
PPTX
MIS: Information Security Management
PPTX
5 Step Data Security Plan for Small Businesses
PDF
Corporate security pdf
PPT
The Importance of Security within the Computer Environment
PPT
Lesson 1- Information Policy
PPT
Physical security
PPT
Lesson 3- Fair Approach
PPTX
12 security policies
ODP
Jupiter physical security ppt 2016 1
PDF
Ise viii-information and network security [10 is835]-solution
PPTX
Incident Response
PPT
Control System Cyber Security - A Different Approach
Information Assurance And Security - Chapter 1 - Lesson 4
Lesson 1- Risk Managment
Lesson 1- Intrusion Detection
It security controls, plans, and procedures
 
Introduction to Ethical Hacking
MIS: Information Security Management
5 Step Data Security Plan for Small Businesses
Corporate security pdf
The Importance of Security within the Computer Environment
Lesson 1- Information Policy
Physical security
Lesson 3- Fair Approach
12 security policies
Jupiter physical security ppt 2016 1
Ise viii-information and network security [10 is835]-solution
Incident Response
Control System Cyber Security - A Different Approach
Ad

Similar to Health information secuirty session 5 best practise in information security (20)

PDF
Ch09 Information Security Best Practices
KEY
Mis
KEY
Chapter 10, part 1
PPTX
Cyber Security and Healthcare
PDF
Measures to Avoid Cyber-attacks
PDF
Measure To Avoid Cyber Attacks
PPTX
Understanding Cyber Security and benifit
PPTX
Information Security
PPTX
Digital literacy lecture 2 data security.pptx
PPTX
Chapter 1 Introduction about information assurance.pptx
PDF
Elementary-Information-Security-Practices
PPTX
InformationSecurity
PPTX
Information Systems Policy
PPTX
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
PDF
Mis 1
PDF
1. introduction to cyber security
PPTX
Cybersecurity Basics of awareness presentation .pptx
PPTX
Foundation of the information securiety
PPTX
Recommending information security measures
PPTX
Cyber crime and Information Security.pptx
Ch09 Information Security Best Practices
Mis
Chapter 10, part 1
Cyber Security and Healthcare
Measures to Avoid Cyber-attacks
Measure To Avoid Cyber Attacks
Understanding Cyber Security and benifit
Information Security
Digital literacy lecture 2 data security.pptx
Chapter 1 Introduction about information assurance.pptx
Elementary-Information-Security-Practices
InformationSecurity
Information Systems Policy
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Mis 1
1. introduction to cyber security
Cybersecurity Basics of awareness presentation .pptx
Foundation of the information securiety
Recommending information security measures
Cyber crime and Information Security.pptx
Ad

More from Dr. Lasantha Ranwala (6)

PPTX
Health information security 3 vulnerability threat and risk
PPTX
Health information security 2 : Basic concepts
PPTX
Health information security 1 overview
PPTX
Online application for drug stock management
PPTX
Common Foot Problems
PPTX
Foss for Health Care
Health information security 3 vulnerability threat and risk
Health information security 2 : Basic concepts
Health information security 1 overview
Online application for drug stock management
Common Foot Problems
Foss for Health Care

Recently uploaded (20)

PPTX
ANESTHETIC CONSIDERATION IN ALCOHOLIC ASSOCIATED LIVER DISEASE.pptx
PPTX
thio and propofol mechanism and uses.pptx
PPTX
Vaccines and immunization including cold chain , Open vial policy.pptx
PPT
Opthalmology presentation MRCP preparation.ppt
PPTX
NRP and care of Newborn.pptx- APPT presentation about neonatal resuscitation ...
PDF
OSCE SERIES - Set 7 ( Questions & Answers ).pdf
PPTX
abgs and brain death dr js chinganga.pptx
PPTX
Impression Materials in dental materials.pptx
PPTX
Vesico ureteric reflux.. Introduction and clinical management
PPTX
Physiology of Thyroid Hormones.pptx
DOCX
PEADIATRICS NOTES.docx lecture notes for medical students
PPT
Infections Member of Royal College of Physicians.ppt
PPTX
Wheat allergies and Disease in gastroenterology
PDF
Adverse drug reaction and classification
PPTX
CARDIOVASCULAR AND RENAL DRUGS.pptx for health study
PDF
B C German Homoeopathy Medicineby Dr Brij Mohan Prasad
PPTX
NUCLEAR-MEDICINE-Copy.pptxbabaabahahahaahha
PDF
The_EHRA_Book_of_Interventional Electrophysiology.pdf
PPT
Rheumatology Member of Royal College of Physicians.ppt
PPTX
Hypertensive disorders in pregnancy.pptx
ANESTHETIC CONSIDERATION IN ALCOHOLIC ASSOCIATED LIVER DISEASE.pptx
thio and propofol mechanism and uses.pptx
Vaccines and immunization including cold chain , Open vial policy.pptx
Opthalmology presentation MRCP preparation.ppt
NRP and care of Newborn.pptx- APPT presentation about neonatal resuscitation ...
OSCE SERIES - Set 7 ( Questions & Answers ).pdf
abgs and brain death dr js chinganga.pptx
Impression Materials in dental materials.pptx
Vesico ureteric reflux.. Introduction and clinical management
Physiology of Thyroid Hormones.pptx
PEADIATRICS NOTES.docx lecture notes for medical students
Infections Member of Royal College of Physicians.ppt
Wheat allergies and Disease in gastroenterology
Adverse drug reaction and classification
CARDIOVASCULAR AND RENAL DRUGS.pptx for health study
B C German Homoeopathy Medicineby Dr Brij Mohan Prasad
NUCLEAR-MEDICINE-Copy.pptxbabaabahahahaahha
The_EHRA_Book_of_Interventional Electrophysiology.pdf
Rheumatology Member of Royal College of Physicians.ppt
Hypertensive disorders in pregnancy.pptx

Health information secuirty session 5 best practise in information security

  • 1. Best practices of information security management Health Information Security Session 05:Best Practices of Information Security Management
  • 2. “Cyber security… It’s not just about technology”
  • 3. DEFENCE IN DEPTH • Concept in which multiple layers of security controls (defence) are placed throughout an information technology (IT) system. • Its intent is to provide redundancy in the event of a security control fails or a vulnerability is exploited. • Cover aspects of personnel, procedural, technical and physical for the duration of the system's life cycle.
  • 4. DEFENCE IN DEPTH CONTINU......
  • 5. DEFENCE IN DEPTH CONTINU......
  • 6. SECURITY CONTROLS 1. Physical control 2. Technical control 3. administrative control
  • 7. 1. PHYSICAL CONTROLS Implementation of security measures in a defined structure used to defend or prevent unauthorized access to sensitive material. e.g.: • Closed-circuit surveillance cameras • Motion or thermal alarm systems • Security guards • Picture Ids
  • 8. 2.TECHNICAL CONTROLS • Use of technology as a basis for controlling the access and usage of sensitive data throughout a physical structure and over a network. • e.g.: • Encryption • Access control lists (ACLs) • File integrity auditing software
  • 9. ADMINISTRATIVE CONTROLS • Administrative controls define the human factors of security. • It involves all levels of personnel within an organization and determines which users have access to what resources and information by such means as: • e.g.: • Information Security policy • Training and awareness • Disaster preparedness and recovery plans
  • 10. BEST PRACTISES - PROTECT YOUR NETWORK 1. Create Specific Access Controls • Minimum user privileges 2. Collect Detailed Logs • for security and troubleshooting purposes • backup logs 3. Maintain Security Patches • make sure your software and hardware security is up to date 4. Educate and Train Your Users • users will always be your weakest link
  • 11. BEST PRACTISES - PROTECT YOUR NETWORK CONTIN.. 5. Policies and Guidelines • Clear User Policies for New Employees and Vendors • Security policy and guidelines for staff 6. User Activity Monitoring 7. Data Breach Response Plan 8. Back up and Restore
  • 12. BEST PRACTICES -PROTECT OURSELF 1. Install anti-virus software and keep all computer software patched and updates. 2. Use a strong password • Password Vs Pass phrase 3. Log off public computers/Lock your computer 4. Keep personal information safe • Be wary of suspicious e-mails • Use secure Wi-Fi connections • properly delete any personal information before sell or dispose of your hardware
  • 13. 5. Limit social network information • you should be wary about how much personal information you post. 6. Download files only from trusted souses 7. Regular data Back up