1 © 2007 chapter 10 information technology and systems infrastructure assessment
TRANSCRIPT
![Page 1: 1 © 2007 Chapter 10 Information Technology and Systems Infrastructure Assessment](https://reader035.vdocuments.net/reader035/viewer/2022062423/5697bf881a28abf838c89365/html5/thumbnails/1.jpg)
1© 2007
Chapter 10
Information Technology and Systems Infrastructure Assessment
![Page 2: 1 © 2007 Chapter 10 Information Technology and Systems Infrastructure Assessment](https://reader035.vdocuments.net/reader035/viewer/2022062423/5697bf881a28abf838c89365/html5/thumbnails/2.jpg)
© 2007
EHR System Architecture
• Computing architecture refers to the technical building blocks that support the operation and use of a computer system
• Fundamental computer system architecture supports– Input/output– Processing– Storage
![Page 3: 1 © 2007 Chapter 10 Information Technology and Systems Infrastructure Assessment](https://reader035.vdocuments.net/reader035/viewer/2022062423/5697bf881a28abf838c89365/html5/thumbnails/3.jpg)
© 2007
Input/Output (I/O) Devices• Also known as human-computer interfaces, because
they are the connection between a human and the computing power of the application in the computer
• Input/output devices:
• Personal computers• Workstations• Desktops• Laptops/Notebooks• Tablets• PDAs• Smart phones
• Keyboards• Display screens• Navigational devices• Optical character recognition
(OCR)• Document scanners• Bar codes• Voice/speech input• Printers
![Page 4: 1 © 2007 Chapter 10 Information Technology and Systems Infrastructure Assessment](https://reader035.vdocuments.net/reader035/viewer/2022062423/5697bf881a28abf838c89365/html5/thumbnails/4.jpg)
© 2007
I/O Considerations• Source of power
– Cabled to electrical outlet or battery
• Network connectivity– Wired vs. wireless connectivity
• Portability– Consider size, weight, heat
• Computers on wheels (COW)*• Wireless on wheels (WOW)• Workstations on wheels (WOW)
• Screen (real estate)– Size and resolution
• Navigational devices– Consider ease of use and loss concerns
* Not considered politically correct!
![Page 5: 1 © 2007 Chapter 10 Information Technology and Systems Infrastructure Assessment](https://reader035.vdocuments.net/reader035/viewer/2022062423/5697bf881a28abf838c89365/html5/thumbnails/5.jpg)
© 2007
Data Storage• “Secondary” storage devices = drives
– Secondary to primary storage in the computer’s processors
• Storage media– Magnetic tape
– Magnetic disks
– Optical disks
– Flash drives/USB drives
• Storage configuration: RAID
• Storage area networks (SAN)
• Storage management
![Page 6: 1 © 2007 Chapter 10 Information Technology and Systems Infrastructure Assessment](https://reader035.vdocuments.net/reader035/viewer/2022062423/5697bf881a28abf838c89365/html5/thumbnails/6.jpg)
© 2007
Computer Categories
• Supercomputer
• Mainframe computer
• Minicomputers
• Microcomputers
• Portable microcomputers
• Handheld computers
• Network computers (thin clients)
![Page 7: 1 © 2007 Chapter 10 Information Technology and Systems Infrastructure Assessment](https://reader035.vdocuments.net/reader035/viewer/2022062423/5697bf881a28abf838c89365/html5/thumbnails/7.jpg)
© 2007
Communications and Network Architecture
• Two or more computers communicate makes a network– Client/server architecture:
– Web services architecture:
![Page 8: 1 © 2007 Chapter 10 Information Technology and Systems Infrastructure Assessment](https://reader035.vdocuments.net/reader035/viewer/2022062423/5697bf881a28abf838c89365/html5/thumbnails/8.jpg)
© 2007
Network Configuration
• LAN
• WAN
• WLAN
• VPN
• Topology– Physical– Logical
![Page 9: 1 © 2007 Chapter 10 Information Technology and Systems Infrastructure Assessment](https://reader035.vdocuments.net/reader035/viewer/2022062423/5697bf881a28abf838c89365/html5/thumbnails/9.jpg)
© 2007
Network Components• Network Operating System
– Windows, Unix, or other• Network Interface
– NIC, LAN Adapters, wireless access card• Transmission Medium
– Hardwire cable, infrared light, radio frequencies• Other devices
– Hub– Bridge– Router switch– Gateway– Multiplexor– Modems
![Page 10: 1 © 2007 Chapter 10 Information Technology and Systems Infrastructure Assessment](https://reader035.vdocuments.net/reader035/viewer/2022062423/5697bf881a28abf838c89365/html5/thumbnails/10.jpg)
© 2007
Network Protocols
• Rules of the road
• OSI– Seven layers
• TCP/IP
• FTP
• HTTP
![Page 11: 1 © 2007 Chapter 10 Information Technology and Systems Infrastructure Assessment](https://reader035.vdocuments.net/reader035/viewer/2022062423/5697bf881a28abf838c89365/html5/thumbnails/11.jpg)
© 2007
Application Software• Operating System (O/S)
– Platform
• Application software (source code)– Makes applications perform their functions
• Application integration– Different applications which have been designed from the same
platform to work together
• Application interface– Hardware, software, data definition, messaging protocols to
exchange data between applications from different systems
![Page 12: 1 © 2007 Chapter 10 Information Technology and Systems Infrastructure Assessment](https://reader035.vdocuments.net/reader035/viewer/2022062423/5697bf881a28abf838c89365/html5/thumbnails/12.jpg)
© 2007
Standards Related Organizations• HL7
• DICOM
• NCPDP
• IEEE
• ANSI-ASC X12N
• ASTM
• HITSP
![Page 13: 1 © 2007 Chapter 10 Information Technology and Systems Infrastructure Assessment](https://reader035.vdocuments.net/reader035/viewer/2022062423/5697bf881a28abf838c89365/html5/thumbnails/13.jpg)
© 2007
Systems Reliability, Privacy & Security
• Reliability– Errors
– Crashes
– Performance problems
• Privacy and Security– HISPC
– HIPAA Privacy Rule
– HIPAA Security Rule
– State data breach notification laws
![Page 14: 1 © 2007 Chapter 10 Information Technology and Systems Infrastructure Assessment](https://reader035.vdocuments.net/reader035/viewer/2022062423/5697bf881a28abf838c89365/html5/thumbnails/14.jpg)
© 2007
Security Risk Analysis• Threats to security
– Agents– Targets– Events
• Unauthorized access• Modification, alteration, and
destruction• Denial of service• Repudiation
• Vulnerabilities– Gaps that occur in
administrative processes, physical facility, and technical infrastructure
![Page 15: 1 © 2007 Chapter 10 Information Technology and Systems Infrastructure Assessment](https://reader035.vdocuments.net/reader035/viewer/2022062423/5697bf881a28abf838c89365/html5/thumbnails/15.jpg)
© 2007
Security Controls
• Management support• Applications and data criticality analysis• Policies and procedures• Information security official• User responsibility• Administrative, physical, and technical controls• Training• Ongoing auditing and monitoring
![Page 16: 1 © 2007 Chapter 10 Information Technology and Systems Infrastructure Assessment](https://reader035.vdocuments.net/reader035/viewer/2022062423/5697bf881a28abf838c89365/html5/thumbnails/16.jpg)
© 2007
Conclusion
• Information technology and systems infrastructure assessment – Describes current environment– Compares to standards/user needs– Evaluates technical requirements for new
applications– Plans for acquisition of technology– Plans for technology obsolescence