comp4 unit8c lecture slides

21
Introduction to Information and Computer Science Security Lecture c This material (Comp4_Unit8c) was developed by Oregon Health and Science University, funded by the Department of Health and Human Services, Office of the National Coordinator for Health Information Technology under Award Number IU24OC000015.

Upload: health-it-workforce-curriculum-2012

Post on 06-May-2017

229 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Comp4 Unit8c Lecture Slides

Introduction to Information and Computer Science

Security

Lecture c

This material (Comp4_Unit8c) was developed by Oregon Health and Science University, funded by the Department of Health and Human Services, Office of the National Coordinator for Health Information Technology under Award Number

IU24OC000015.

Page 2: Comp4 Unit8c Lecture Slides

SecurityLearning Objectives

• List and describe common security concerns (Lecture a)• Describe safeguards against common security concerns

(Lecture b)• Describe security concerns for wireless networks and

how to address them (Lectures b and c)• List security concerns/regulations for health care

applications (Lecture c)• Describe security safeguards used for health care

applications (Lecture c)

2Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture c

Page 3: Comp4 Unit8c Lecture Slides

Security and Wireless Networking• Wireless networks unsecure by their very nature

– Home networks– Hot spots– Campus environments

• Wireless networks are everywhere in medical environment– Doctors and nurses move from room to room

constantly

3Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture c

Page 4: Comp4 Unit8c Lecture Slides

Wireless Device Security

• Wireless Access Points (WAPs) must be configured for security:– Change default password– Select unique SSID– Do not broadcast SSID– Require WPA2 authentication– Restrict access to known devices

• Can program MAC addresses into WAP memory

4Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture c

Page 5: Comp4 Unit8c Lecture Slides

Wireless Device Security (continued)

• Install digital certificates on sensitive devices– Only devices with known/valid certificates can

communicate on network– Requires use of special servers– Not usually for small offices

The image below shows a partial browser address bar with a valid bank certificate.Clicking the gold lock will display the bank’s certificate.

(PD-US, 2006)

5Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture c

Page 6: Comp4 Unit8c Lecture Slides

Wireless Device Security (continued)

• Smartphones– All portable devices connecting to network need AV

protection– Do not use a portable device for sensitive

transactions unless it is AV protected– Do not open email or attachments from unsolicited

sources• Known sources might be virus-infected, meaning

that they did not send the email/attachment– No exceptions

6Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture c

Page 7: Comp4 Unit8c Lecture Slides

Health Care Applications and Security

• US Government’s stated goal:– Most Americans to have access to electronic health

records (EHRs) by 2014• Why EHRs?

– Improve quality of care– Decrease cost– Ensure privacy and security

• Outsourcing introduces risk– Medical transcriptionists in countries with different

cultural values and EHR regulations

7Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture c

Page 8: Comp4 Unit8c Lecture Slides

Concerned About Security of Health Data?

• Incorrect health data recorded– Someone else’s information in another’s record

• Job discrimination– Denied employment or health coverage based on pre-

existing condition• Personal privacy violated

– Friends and family find out about embarrassing but non-infectious condition

• Sharing of data between providers adds risk• Use of Internet always introduces risk

8Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture c

Page 9: Comp4 Unit8c Lecture Slides

What is an EHR System?• Collection of health data about the business,

patients, doctors, nurses • Health data stored as records in database

system• Records represent a complete event

– What is stored in a database as one record?• A patient’s personal information• An office visit to a doctor• A blood test• An x-ray

9Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture c

Page 10: Comp4 Unit8c Lecture Slides

EHRs Used by Health Care Providers

• EHRs maintained by health care providers• EHRs covered by HIPAA rules• EHRs use centralized database systems to integrate

patient intake, medical care, pharmacy, billing into one system

• Departments/entities may not be in same physical location, so patient data must travel over the Internet

• People can view own health record, taking ownership of its contents, ensuring accuracy

10Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture c

Page 11: Comp4 Unit8c Lecture Slides

EHR Security Q & A• How is data sent over the Internet?

It should be sent in an encrypted, secure manner over the Internet

• Is data safe?• Much depends on each organization’s physical record

and network security practices• No data is 100% secure against theft or misuse

• Who can view my health records? Only those who need to know or view the contents of

a health record should be able to view it Patient must authorize all other access

11Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture c

Page 12: Comp4 Unit8c Lecture Slides

Federal Regulations

• HIPAA (Health Insurance Portability and Accountability Act) was enacted in 1996 by the federal government

• HIPAA requires that health care providers, insurance companies, and employers abide by privacy and security standards

12Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture c

Page 13: Comp4 Unit8c Lecture Slides

HIPAA and Privacy• Privacy Rule

HIPAA requires those covered by the act to provide patients a “Notice of Privacy Practices” when care is first provided

The Privacy Rule covers paper and electronic private health information

• Security Rule Covers administrative, physical, and technical data

safeguards that secure electronic health record data

13Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture c

Page 14: Comp4 Unit8c Lecture Slides

What is Privacy?• Most privacy law revolves around privacy

between a person and the government• According to Wikipedia, “The law of privacy

regulates the type of information which may be collected and how this information may be used and stored.” Privacy relates to people

14Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture c

Page 15: Comp4 Unit8c Lecture Slides

What is Confidentiality?

• Not same as privacy• According to Wikipedia, “Confidentiality is

commonly applied to conversations between doctors and patients. Legal protections prevent physicians from revealing certain discussions with patients, even under oath in court. The rule only applies to secrets shared between physician and patient during the course of providing medical care.” i.e., confidentiality relates to data

15Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture c

Page 16: Comp4 Unit8c Lecture Slides

Steps to Secure EHR & Records

• Authenticate and authorize all record access– Only those with “need to know” can view– Only pertinent people can change records– Limit who can print electronic documents– All views and changes recorded for audit trail

• Examples:– A clerk can view the dates and charges related to an

office visit but nothing about treatment– Nurses and doctors can view medical records for

patients under their care and no one else

16Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture c

Page 17: Comp4 Unit8c Lecture Slides

Steps to Secure EHR & Records (continued)

• Device security– Apply OS critical updates immediately– AV definitions always current– Restrict physical access to servers– Allow only authenticated device access

• Secure electronic communications– Encrypt all EHR communications– Client-server environment– Configure user accounts and groups– Implement network access protection mechanisms

17Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture c

Page 18: Comp4 Unit8c Lecture Slides

Steps to Secure EHR & Records (continued)

• Web environment considerations– Implement HTTPS for all Web transactions– Validate all data entered into Web forms– Perform regular audits of access and changes

• Implement redundant devices– Ensures that devices are available as expected– Load-balance heavily used hardware devices

• Prosecute security violations vigorously• Backup EHR data with secure storage

18Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture c

Page 19: Comp4 Unit8c Lecture Slides

SecuritySummary – Lecture c

• Wireless networks• Security concerns for healthcare applications• Regulations for healthcare applications

19Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture c

Page 20: Comp4 Unit8c Lecture Slides

SecuritySummary

• Common security concerns• Safeguards• Wireless networks security• Concerns, mitigations, regulations re: healthcare

applications

20Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture c

Page 21: Comp4 Unit8c Lecture Slides

SecurityReferences – Lecture c

References• Wikipedia. Network security. [Internet]. 2010 [cited 2011 Nov 07]. Available from:

http://en.wikipedia.org/wiki/Network_security. • Wikipedia. Wireless security. [Internet]. 2010 [cited 2011 Nov 07]. Available from:

http://en.wikipedia.org/wiki/Wireless_security. • Wikipedia. Wireless LAN security. [Internet]. 2010 [cited 2011 Nov 07]. Available from:

http://en.wikipedia.org/wiki/Wireless_LAN_security. • Wikipedia. Electronic health record. [Internet]. 2010 [cited 2011 Nov 07]. Available from:

http://en.wikipedia.org/wiki/Electronic_health_record. • Wikipedia. Electronic medical record. [Internet]. 2010 [cited 2011 Nov 07]. Available from:

http://en.wikipedia.org/wiki/Electronic_medical_record. • Health and Human Services. HHS Announces Project to Help 3.6 Million Consumers Reap Benefits of Electronic

Health Records. [Internet]. 2010 [cited 2011 Nov 07]. Available from: http://www.hhs.gov/news/press/2007pres/10/pr20071030a.html.

• Informatics Professor, Meaningful Use: A Highly Useful Construct for Informatics. [Internet]. 2010 May [cited 2011 Nov 07]. Available from: http://informaticsprofessor.blogspot.com/2010/05/meaningful-use-highly-useful-construct.html.

Images• Slide 5: Screenshot of a partial browser address bar with a valid bank certificate. (PD-US, 2006)

21Health IT Workforce Curriculum Version 3.0/Spring 2012

Introduction to Information and Computer Science Security

Lecture c