Data Security Seminar, 18 March 2005


               Dr Lech J.Janczewski




  Technical Perspective of the
Vulnerabilities of Health Records
Agenda


1. Basic definitions
1. Basic definitions

2. Importance of security threats
2. Importance of security threats

3. Security threats: nature and handling
3. Security threats: nature and handling

4. System approach to IT security
4. System approach to IT security
Basic Definitions




   CIA triangle
Other definitons
• Accountability
• Authenticity
• Dependability
Importance to the health sector
•   Integrity
•   Dependability
•   Availability
•   Confidentiality
•   Authenticity
•   Accountability
Integrity protection
• Reliability of software
  – Testing
  – Testing
  – Testing.......
• Error-free data entry
  – Who is responsible for data entry?
  – How to verify results?
• Unathorised users
• Subversive software
Unauthorized access to computer networks
  • Who you are?
    – Password
    – Query
    – Token
  • Issues
    – Password confidentiality
    – Password complexity v human nature
    – Proximity card: the best for the health sector
Unauthorized access to computer networks
 • Attacks on password system
   – Dictionary attack
   – Grabber software
   – Human engineering
 • Protection
   – Password policy
        • No password disclosures
        • Format
   –   Updated version of software
   –   Virus scanners (latest version!)
   –   Get rid of the unused passwords and „guests”
   –   Double passwords are not useful!
Unauthorized access to computer networks
  • Two way authentication
    – Are you talking to the hospital?
    – Usually a parameter which you can not
      change
Subversive software
• Types
  – Virus
  – Trojan (bombs)
  – Worms
• Protection
  – Virus scanners (updated)
  – No mass data entry from work stations
     • USB ports, CD ROM drives, disk drives
  – Carefully monitored dial up access
  – Firewalls
     • AcitveX, cookies, etc
Denial of service attacks
• Worm type attack
  – Started in 1999
  – Could immobilize the network for many hours
  – Requires qualify specialists to handle
• Structure
Denial of service attacks
• Almost impossible to handle at the
  receiving end (workstations)
• Handled by the ISPs
BUT
• Good virus scanner stops your system
  to become a zombie
Cyber-terrorist attacks and collateral damages issue

    • Probability of a direct cyber-terrorist
      attack against a health IT system in NZ:
      very low
    • Slightly higher if there is a “hot patient”
      in a ward
    • Probability of collateral damages: very
      high:
       – Fires, floods, earthquakes
       – Need to plan for that!!!!!
          • back up data and systems
Approach to information security
• System approach
  – Goals of the organizations taken into
    consideration at every stage of the security
    planning, deployment and running
• NOT piecemeal approach!
  – This is not working, let’s fix it!
• Follow a staged procedure
10 stage procedure


Phase 1
Phase 1       Phase 2
              Phase 2       Phase 3
                            Phase 3




 Managerial       CISO        Information
   drive        appointed      inventory
10 stage procedure


Phase 4
Phase 4      Phase 5
             Phase 5       Phase 6
                           Phase 6




   Risk          Logical      Physical
  Analysis       Design        Design
10 stage procedure


Phase 7
Phase 7      Phase 8
             Phase 8           Phase 9
                               Phase 9




  Security    Implementation    Maintenance
  Polices
10 stage procedure


Phase 10
Phase 10     Phase …..
             Phase …..




  Revision       Revision
Summary
• Health security;
  – Confidentiality (privacy) is important but
  – Integrity is on the top of the list
• All protection mechanisms similar as in
  the other domains
• System approach should be enforced
• All that is a common sense and not very
  expensive at the base level!
Questions?
That’s all, folks!

More Related Content

PPT
Information systems
DOCX
Andrew Arington resume2014
PPTX
Apparatus finding bad(malware)
PPTX
Six steps for securing offshore development
DOCX
PPTX
Safety and security in mission critical IoT systems
PPT
Security
PPTX
Mobile device security using transient authentication
Information systems
Andrew Arington resume2014
Apparatus finding bad(malware)
Six steps for securing offshore development
Safety and security in mission critical IoT systems
Security
Mobile device security using transient authentication

What's hot (20)

PDF
Using automation to improve the effectiveness of security operations
PDF
Linux Security best Practices with Fedora
PDF
Information systems security(1)
PPTX
Security and control in Management Information System
ODP
Network Security Topic 1 intro
PPTX
1 db security
PPSX
6 Physical Security
PPTX
Health information security session 4 risk management
PPT
Security & control in management information system
PPT
The Perimeter Protection Issues, Technique and Operation
PPTX
Health information secuirty session 5 best practise in information security
PPTX
Hardware Security
PPTX
Data/File Security & Control
PPT
Network security
PPTX
CISSP week 26
PDF
Better security through IT operations
DOC
Resume-John-Whitney
PPS
Physical security.ppt
PPTX
Essential Layers of IBM i Security: Physical Security
PDF
Considerations for a secure internet of things for cities and communities
Using automation to improve the effectiveness of security operations
Linux Security best Practices with Fedora
Information systems security(1)
Security and control in Management Information System
Network Security Topic 1 intro
1 db security
6 Physical Security
Health information security session 4 risk management
Security & control in management information system
The Perimeter Protection Issues, Technique and Operation
Health information secuirty session 5 best practise in information security
Hardware Security
Data/File Security & Control
Network security
CISSP week 26
Better security through IT operations
Resume-John-Whitney
Physical security.ppt
Essential Layers of IBM i Security: Physical Security
Considerations for a secure internet of things for cities and communities
Ad

Viewers also liked (20)

PPT
Medical decision making in critical illness
PPT
Transforming the landscape of clinical care: sharing international views and ...
PPT
National eHealth Initiatives Effecting Change for Better Outcomes
PDF
Electronic Health Record Privacy - CIO's Perspective
PPT
Health Informatics Professionalism and Improving Patient Care
PPT
HMSC - A Health Management System Collaborative
PPT
NZ Health IT Cluster
PPT
Telehealth in Australia
PPT
Primary Health Care Strategy
PPT
Evidence-based Healthcare IT
PPT
Health Informatics Professionalism and Improving Patient Care
PPT
Delivering Quality Education to Rural Health Professionals Using Videoconfere...
PPT
Health Information Systems – New Zealand: The Sector is the Enterprise
PPT
Electronic Health Recordsand Electronic Case Records in 2012
PPTX
From openEHR Domain Models to Advanced User Interfaces: a Case Study in Endos...
PPT
Health Information - A Primary Care Perspective
PPT
Deriving an ICU Subset of SNOMED CT from Clinical Notes
PDF
Electronic Health Record Privacy - District Health Board Perspective
PPT
The Role of Telehealth in Emerging Models of Care
PPT
Telehealth Heart Failure
Medical decision making in critical illness
Transforming the landscape of clinical care: sharing international views and ...
National eHealth Initiatives Effecting Change for Better Outcomes
Electronic Health Record Privacy - CIO's Perspective
Health Informatics Professionalism and Improving Patient Care
HMSC - A Health Management System Collaborative
NZ Health IT Cluster
Telehealth in Australia
Primary Health Care Strategy
Evidence-based Healthcare IT
Health Informatics Professionalism and Improving Patient Care
Delivering Quality Education to Rural Health Professionals Using Videoconfere...
Health Information Systems – New Zealand: The Sector is the Enterprise
Electronic Health Recordsand Electronic Case Records in 2012
From openEHR Domain Models to Advanced User Interfaces: a Case Study in Endos...
Health Information - A Primary Care Perspective
Deriving an ICU Subset of SNOMED CT from Clinical Notes
Electronic Health Record Privacy - District Health Board Perspective
The Role of Telehealth in Emerging Models of Care
Telehealth Heart Failure
Ad

Similar to Technical Vulnerabilities of Electronic Health Records (20)

DOCX
CYB 610 Effective Communication/tutorialrank.com
DOCX
CST 610 Effective Communication/tutorialrank.com
PPTX
Information+security rutgers(final)
DOCX
CSEC 610 Effective Communication/tutorialrank.com
PDF
CST 610 RANK Remember Education--cst610rank.com
DOCX
Cyb 610Education Specialist / snaptutorial.com
PDF
CST 610 RANK Introduction Education--cst610rank.com
PDF
Cyb 610 Education Organization-snaptutorial.com
DOCX
CYB 610 Exceptional Education - snaptutorial.com
DOCX
CST 610 RANK Redefined Education--cst610rank.com
DOC
Cyb 610 Enhance teaching / snaptutorial.com
DOCX
CYB 610 Effective Communication - snaptutorial.com
DOCX
CST 610 RANK Educational Specialist--cst610rank.com
DOCX
CST 610 RANK Inspiring Innovation--cst610rank.com
PDF
CST 610 RANK Become Exceptional--cst610rank.com
DOC
Cst 610 Enhance teaching / snaptutorial.com
PDF
Csec 610 Education Organization-snaptutorial.com
DOCX
Project securing a microsoft windows environment e
DOC
Csec 610 Enhance teaching / snaptutorial.com
DOCX
CSEC 610 Education Specialist / snaptutorial.com
CYB 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.com
Information+security rutgers(final)
CSEC 610 Effective Communication/tutorialrank.com
CST 610 RANK Remember Education--cst610rank.com
Cyb 610Education Specialist / snaptutorial.com
CST 610 RANK Introduction Education--cst610rank.com
Cyb 610 Education Organization-snaptutorial.com
CYB 610 Exceptional Education - snaptutorial.com
CST 610 RANK Redefined Education--cst610rank.com
Cyb 610 Enhance teaching / snaptutorial.com
CYB 610 Effective Communication - snaptutorial.com
CST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.com
Cst 610 Enhance teaching / snaptutorial.com
Csec 610 Education Organization-snaptutorial.com
Project securing a microsoft windows environment e
Csec 610 Enhance teaching / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.com

More from Health Informatics New Zealand (20)

PPTX
The Austin Health Diabetes Discovery Initiative: Using technology to support ...
PPTX
Shaping Informatics for Allied Health - Refining our voice
PPTX
Surveillance of social media: Big data analytics
PPTX
The Power of Surface Modelling
PPTX
Laptop computers enhancing clinical care in community allied health service
PPTX
Making surgical practice improvement easy
PPTX
Safe IT Practices: making it easy to do the right thing
PPT
Beyond EMR - so you've got an EMR - what next?
PPT
PPTX
Reducing hospitalisations and arrests of mental health patients through the u...
PPTX
Using the EMR in early recognition and management of sepsis
PPTX
Allied Health and informatics: Identifying our voice - can you hear us?
PPTX
Change in the data collection landscape: opportunity, possibilities and poten...
PPTX
Overview of the New Zealand Maternity Clinical Information System
PPTX
Nhitb wednesday 9am plenary (sadhana first)
PPTX
Oncology treatment patterns in the South Island
PPTX
Electronic prescribing system medication errors: Identification, classificati...
PPTX
Global trends in technology for retailers and how they are impacting the phar...
PPT
"Not flying under the radar": Developing an App for Patient-led Management of...
PPTX
The quantified self: Does personalised monitoring change everything?
The Austin Health Diabetes Discovery Initiative: Using technology to support ...
Shaping Informatics for Allied Health - Refining our voice
Surveillance of social media: Big data analytics
The Power of Surface Modelling
Laptop computers enhancing clinical care in community allied health service
Making surgical practice improvement easy
Safe IT Practices: making it easy to do the right thing
Beyond EMR - so you've got an EMR - what next?
Reducing hospitalisations and arrests of mental health patients through the u...
Using the EMR in early recognition and management of sepsis
Allied Health and informatics: Identifying our voice - can you hear us?
Change in the data collection landscape: opportunity, possibilities and poten...
Overview of the New Zealand Maternity Clinical Information System
Nhitb wednesday 9am plenary (sadhana first)
Oncology treatment patterns in the South Island
Electronic prescribing system medication errors: Identification, classificati...
Global trends in technology for retailers and how they are impacting the phar...
"Not flying under the radar": Developing an App for Patient-led Management of...
The quantified self: Does personalised monitoring change everything?

Recently uploaded (20)

PPTX
Human Reproduction: Anatomy, Physiology & Clinical Insights.pptx
PDF
OSCE SERIES ( Questions & Answers ) - Set 5.pdf
PPTX
Vaccines and immunization including cold chain , Open vial policy.pptx
PDF
Plant-Based Antimicrobials: A New Hope for Treating Diarrhea in HIV Patients...
PDF
B C German Homoeopathy Medicineby Dr Brij Mohan Prasad
PPTX
preoerative assessment in anesthesia and critical care medicine
PPTX
Effects of lipid metabolism 22 asfelagi.pptx
PDF
OSCE Series Set 1 ( Questions & Answers ).pdf
PDF
Lecture on Anesthesia for ENT surgery 2025pptx.pdf
PPT
Infections Member of Royal College of Physicians.ppt
PDF
Calcified coronary lesions management tips and tricks
DOCX
PEADIATRICS NOTES.docx lecture notes for medical students
PDF
MNEMONICS MNEMONICS MNEMONICS MNEMONICS s
PPT
Rheumatology Member of Royal College of Physicians.ppt
PPTX
Acute Coronary Syndrome for Cardiology Conference
PDF
OSCE SERIES ( Questions & Answers ) - Set 3.pdf
PDF
SEMEN PREPARATION TECHNIGUES FOR INTRAUTERINE INSEMINATION.pdf
PPTX
Introduction to Medical Microbiology for 400L Medical Students
PDF
Copy of OB - Exam #2 Study Guide. pdf
PDF
The_EHRA_Book_of_Interventional Electrophysiology.pdf
Human Reproduction: Anatomy, Physiology & Clinical Insights.pptx
OSCE SERIES ( Questions & Answers ) - Set 5.pdf
Vaccines and immunization including cold chain , Open vial policy.pptx
Plant-Based Antimicrobials: A New Hope for Treating Diarrhea in HIV Patients...
B C German Homoeopathy Medicineby Dr Brij Mohan Prasad
preoerative assessment in anesthesia and critical care medicine
Effects of lipid metabolism 22 asfelagi.pptx
OSCE Series Set 1 ( Questions & Answers ).pdf
Lecture on Anesthesia for ENT surgery 2025pptx.pdf
Infections Member of Royal College of Physicians.ppt
Calcified coronary lesions management tips and tricks
PEADIATRICS NOTES.docx lecture notes for medical students
MNEMONICS MNEMONICS MNEMONICS MNEMONICS s
Rheumatology Member of Royal College of Physicians.ppt
Acute Coronary Syndrome for Cardiology Conference
OSCE SERIES ( Questions & Answers ) - Set 3.pdf
SEMEN PREPARATION TECHNIGUES FOR INTRAUTERINE INSEMINATION.pdf
Introduction to Medical Microbiology for 400L Medical Students
Copy of OB - Exam #2 Study Guide. pdf
The_EHRA_Book_of_Interventional Electrophysiology.pdf

Technical Vulnerabilities of Electronic Health Records

  • 1. Data Security Seminar, 18 March 2005 Dr Lech J.Janczewski Technical Perspective of the Vulnerabilities of Health Records
  • 2. Agenda 1. Basic definitions 1. Basic definitions 2. Importance of security threats 2. Importance of security threats 3. Security threats: nature and handling 3. Security threats: nature and handling 4. System approach to IT security 4. System approach to IT security
  • 3. Basic Definitions CIA triangle
  • 4. Other definitons • Accountability • Authenticity • Dependability
  • 5. Importance to the health sector • Integrity • Dependability • Availability • Confidentiality • Authenticity • Accountability
  • 6. Integrity protection • Reliability of software – Testing – Testing – Testing....... • Error-free data entry – Who is responsible for data entry? – How to verify results? • Unathorised users • Subversive software
  • 7. Unauthorized access to computer networks • Who you are? – Password – Query – Token • Issues – Password confidentiality – Password complexity v human nature – Proximity card: the best for the health sector
  • 8. Unauthorized access to computer networks • Attacks on password system – Dictionary attack – Grabber software – Human engineering • Protection – Password policy • No password disclosures • Format – Updated version of software – Virus scanners (latest version!) – Get rid of the unused passwords and „guests” – Double passwords are not useful!
  • 9. Unauthorized access to computer networks • Two way authentication – Are you talking to the hospital? – Usually a parameter which you can not change
  • 10. Subversive software • Types – Virus – Trojan (bombs) – Worms • Protection – Virus scanners (updated) – No mass data entry from work stations • USB ports, CD ROM drives, disk drives – Carefully monitored dial up access – Firewalls • AcitveX, cookies, etc
  • 11. Denial of service attacks • Worm type attack – Started in 1999 – Could immobilize the network for many hours – Requires qualify specialists to handle • Structure
  • 12. Denial of service attacks • Almost impossible to handle at the receiving end (workstations) • Handled by the ISPs BUT • Good virus scanner stops your system to become a zombie
  • 13. Cyber-terrorist attacks and collateral damages issue • Probability of a direct cyber-terrorist attack against a health IT system in NZ: very low • Slightly higher if there is a “hot patient” in a ward • Probability of collateral damages: very high: – Fires, floods, earthquakes – Need to plan for that!!!!! • back up data and systems
  • 14. Approach to information security • System approach – Goals of the organizations taken into consideration at every stage of the security planning, deployment and running • NOT piecemeal approach! – This is not working, let’s fix it! • Follow a staged procedure
  • 15. 10 stage procedure Phase 1 Phase 1 Phase 2 Phase 2 Phase 3 Phase 3 Managerial CISO Information drive appointed inventory
  • 16. 10 stage procedure Phase 4 Phase 4 Phase 5 Phase 5 Phase 6 Phase 6 Risk Logical Physical Analysis Design Design
  • 17. 10 stage procedure Phase 7 Phase 7 Phase 8 Phase 8 Phase 9 Phase 9 Security Implementation Maintenance Polices
  • 18. 10 stage procedure Phase 10 Phase 10 Phase ….. Phase ….. Revision Revision
  • 19. Summary • Health security; – Confidentiality (privacy) is important but – Integrity is on the top of the list • All protection mechanisms similar as in the other domains • System approach should be enforced • All that is a common sense and not very expensive at the base level!