itgs presentation 2013 conversations, security keys, and byod
TRANSCRIPT
![Page 1: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/1.jpg)
ITGS Presentation 2013
Conversations, Security Keys, and BYOD
![Page 2: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/2.jpg)
Dull & Boring Stuff
Communication Protocols
![Page 3: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/3.jpg)
• Transmission Control Protocolo Transport layer protocolo Breaks transmission into pieces (packets)o Supports resending of packetso Only supports one-to-one communication
http://www.dummies.com/how-to/content/the-tcpip-networking-protocol-suite.html
TCP
![Page 4: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/4.jpg)
• Internet Protocolo Network layer protocolo Delivers packetso Uses logical addresses instead of MAC addresseso IP address is comprised of two parts
Network part Host part
o Allows for communication to another network
http://www.dummies.com/how-to/content/the-tcpip-networking-protocol-suite.html
IP
![Page 5: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/5.jpg)
• URLo Uniform Resource Locationo More English-Like than TCP/IP addresso Domain Name Server (DNS)
Translates URL to TCP/IP addresso Lets you type www.hectic-dad.com and get to a real
website
http://computer.howstuffworks.com/dns1.htm
TCP/IP, URL, DNS blah blah blah
![Page 6: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/6.jpg)
• Envelope Examplehttp://www.thegeekstuff.com/2011/11/tcp-ip-fundamentals/http://technet.microsoft.com/en-us/library/cc786128(v=ws.10).aspx
TCP/IP Protocol Architecture
![Page 7: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/7.jpg)
• Internet Protocol addressingo IPv4
Address every device on the planet (hahahaha) 232 addresses (4,294,967,296) 4 octets (192.168.1.1)
o IPv6 2128 addresses (way more) 16 octets (192.168.1.1.1.0.0.0.2.0.0.3.0.0.0.0)
• Address like phone number, same evolutionhttp://en.wikipedia.org/wiki/IP_address
TCP/IP Addressing
![Page 8: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/8.jpg)
• 2345
• MO-2345
• MO2-2345
• 620-662-2345
• 1-620-662-2345
• 0011-1-620-662-2345
Growth of Addressing
![Page 9: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/9.jpg)
• Hypertext Transport Protocolo Request-Response protocol (ask & ye shall receive)o Not limited to world wide web (www) communicationo Can be used for other purposeso Runs on top of TCP networko Utilizes structured texto It’s a conversation
http://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol
HTTP
![Page 10: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/10.jpg)
• Example: You type www.janie-patterson.com
• User request to go to the URL GET / HTTP/1.1
Accept: text/*, image/jpeg, image/png, image/*, */*
Accept-Language: en, en_US
Host: www.janie-patterson.com
HTTP/1.1 200 OK
Date: Thu, 24 Jan 2002 17:33:52 GMT
Server: Apache/1.3.14
Last-Modified: Mon, 21 Jan 2002 22:08:33 GMT
Accept-Ranges: bytes
Content-Length: 9696
Connection: close
Content-Type: text/html
note: URL = Universal Resource Locator. Translated to a TCP/IP address 66.39.89.30
http://www.silicon-press.com/briefs/brief.http/brief.pdf
HTTP Example
![Page 11: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/11.jpg)
• File Transfer Protocolo Used to transfer entire fileso Request-Response protocol (ask & ye shall receive)o Client-server architectureo Runs on top of TCP-based connectiono Separate control and data connectionso It’s two conversations at once
http://www.webmonkey.com/2010/02/ftp_for_beginners/
FTP
![Page 12: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/12.jpg)
• User request to transfer a file Status:Connecting to ftp.fakesite.org ...
Status:Connected with ftp.fakesite.org.
Response:220 ProFTPD 1.2.4 Server (ProFTPD) [109.41.xx.xxx]
Command:USER mcalore
Response:331 Password required for mcalore.
Command:PASS **********
Response:230 User mcalore logged in.
Status:Connected
Status:Retrieving directory listing...
Command:PWD
Response:257 "/users/mcalore" is current directory.
Command:LIST
Response:150 Opening ASCII mode data connection for file list.
Response:226 Transfer complete.
Status:Directory listing successful
FTP Example
![Page 13: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/13.jpg)
Slightly More Interesting Stuff
EHR Security, Using EHRs, BYOD, VPN, Intranets, and
TANSTAAFL
![Page 14: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/14.jpg)
Electronic Health Records
An alphabet soup and a can of worms
![Page 15: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/15.jpg)
• Lots of nameso CPRo EMRo EHRo PHR
• Two varietieso Specialtyo Patient or Longitudinal
• Beware of data silos
Electronic Health Records
![Page 16: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/16.jpg)
• Information accessibility
• Information transportability
• Improved Clinical Outcomeso Qualityo Reduced Medical errors
• Reduced Costso Individualo Societal
• Data mining
EHR Advantages
![Page 17: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/17.jpg)
• Upfront acquisition costs
• Training costs
• Ongoing maintenance costs
• Disruptions in workflows
• Losses in productivity
• Transfer of data entry tasks to providers
• Inaccuracy
• Physician liability risks
EHR Disadvantages
![Page 18: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/18.jpg)
• Information accessibility
• Information transportability
• Improved Clinical Outcomeso Qualityo Reduced Medical errors
• Reduced Costso Individualo Societal
• Data mining
EHR (DIS)Advantages
![Page 19: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/19.jpg)
• Complicationso Interoperabilityo Transferabilityo Data siloageo Lexicon / Terminology
• Concernso Securityo Privacyo Patient Targeting
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3270933/
EHR Complications & Concerns
![Page 20: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/20.jpg)
• Authenticationo One stepo Two step
• Underlying computer security
• Underlying network security
• No holes allowed
EHR Security
![Page 21: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/21.jpg)
• Computer/network steps
• EHR login
• Patient selection
• Patient viewo By encountero By diagnosiso By treatment
EHR Access Practicum
![Page 22: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/22.jpg)
BYOD
It’s really easy until you have to actually support it
![Page 23: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/23.jpg)
• Policy-based
• Allow employees to bring personally owned mobile devices to work and use those devices to access privileged company information and applications
http://en.wikipedia.org/wiki/BYOD
BYOD
![Page 24: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/24.jpg)
• Save company money
• Appease workers
• Users select their own devices
• High device familiarity
• Increased mobility
• Higher job satisfaction
• Improvements in efficiency and productivity
http://www.businesszone.co.uk/blogs/scott-drayton/optimus-sourcing/advantages-and-disadvantages-byod
http://www.mcpc.com/benefits-of-BYOD
BYOD Advantages
![Page 25: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/25.jpg)
• Heterogenous devices
• Lack of control over data
• Security
• Privacy
• Device control / Acceptable use
• Cost-sharing Complications
• Support nightmareshttp://searchconsumerization.techtarget.com/guides/How-to-weigh-BYOD-benefits-and-risks
http://searchconsumerization.techtarget.com/tip/BYOD-pros-and-cons-Spend-less-on-devices-more-on-support
BYOD Disadvantages
![Page 26: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/26.jpg)
Virtual Private Networks
Playing hide-and-seek on the world wide web
![Page 27: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/27.jpg)
• Method of connecting distant computers
• Goes through a public network
• Extends a private network across public network
• Shares functionality
• Security is main goal
http://en.wikipedia.org/wiki/Virtual_private_network
Virtual Private Networks
![Page 28: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/28.jpg)
Intranets
Playing in your own sandbox
![Page 29: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/29.jpg)
• Collection of local network items
• Utilize standard network itemso Hardwareo Softwareo Ethernet, Wi-Fi, TCP/IPo Web browserso Web servers
• Local network using internet technologieshttp://compnetworking.about.com/cs/intranets/g/bldef_intranet.htm
http://medicalexecutivepost.com/2009/06/26/healthcare-intranets-and-extranets/
Intranets
![Page 30: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/30.jpg)
• Lightning can be VPN
• Really *should be*http://www.skullbox.net/intranet.php
Intranets & Extranets
![Page 31: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/31.jpg)
TAANSTAFL
Any guesses?
![Page 32: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/32.jpg)
• There Ain’t No Such Thing As A Free Lunch
• Costs associated with technologieso TCP/IP - overheado HTTP - overhead, interpretation timeo FTP - overheado EHR Security - hassle, inaccuracy, not perfecto BYOD - support, heterogenous nature, securityo VPN - support, complexityo Intranet - support, complexity, overhead
TANSTAAFL
![Page 33: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/33.jpg)
Project Simulation
Kill me now...this is too hard
![Page 34: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/34.jpg)
• The Seven Questionso Whoo Whato Wheno Whyo Whereo Howo What aren’t you telling me?
Implementation Scenario
![Page 35: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/35.jpg)
• The Seven Questionso Who - Dr. Hanna Schreibero What - Wired networko When - Yesterday (it’s always yesterday)o Why - To allow the practice to functiono Where - New Buildingo How - Computer networko What aren’t you telling me? - I dunno
Single Provider’s Office
![Page 36: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/36.jpg)
• Wired workstations
• Limited connectivity
http://en.wikipedia.org/wiki/Computer_network_diagram
Single Provider’s Office
![Page 37: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/37.jpg)
• The Seven Questionso Who - Dr. Hanna Schreiber & Dr. Maddie Pageo What - Wired + Wireless networko When - Yesterday (it’s always yesterday)o Why - To allow the practice to functiono What aren’t you telling me? - I dunno
Multiple Providers
![Page 38: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/38.jpg)
http://www.conceptdraw.com/samples/resource/images/solutions/network-diagram/Network-Diagram.png
Drs. Schreiber & Page
![Page 39: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/39.jpg)
• The Seven Questionso Who - Dr. Colton “I can do better” Harpero What - Wired + Wireless networko Why - Because I can provider better medical careo Where - Right next door in the same buildingo What aren’t you telling me? - I want to crush them
Dr. Colton “I can do better” Harper
![Page 40: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/40.jpg)
• Two networks - one wireless airspacehttp://www.conceptdraw.com/samples/resource/images/solutions/network-diagram/Network-Diagram.png
Dr. Colton “I can do better” Harper
![Page 41: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/41.jpg)
• The Seven Questionso What - Wired + Wireless + Patient Accesso Who - Dr. Josh “Rule the world” Pattersono Why - To provide one-stop medical careo Where - The entire floor above the other practiceso What aren’t you telling me? - Mwahahaha
Dr. Josh “Rule the world” Patterson
![Page 42: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/42.jpg)
Even more complex
![Page 43: ITGS Presentation 2013 Conversations, Security Keys, and BYOD](https://reader036.vdocuments.net/reader036/viewer/2022062421/56649e4e5503460f94b457e0/html5/thumbnails/43.jpg)
• Bandwidth
• Wireless cross-over
• Privacy
• Security
Inter-office Network Issues