Healthcare Information Security and Privacy (All-In-One) by Sean Murphy


Healthcare Information Security and Privacy (All-In-One) by Sean Murphy

Author:Sean Murphy
Language: eng
Format: mobi, epub, azw3
Publisher: McGraw-Hill Education
Published: 2015-01-09T08:00:00+00:00


NOTE Depending on the type of exploit or attack, the incident response team will tailor its actions. If the incident is entirely internal (a lost removable media), certain actions are taken. If the exploit is a malicious piece of software found in an electronic health record (EHR), a different set of actions would be taken. That said, the variety and uncertainty surrounding the nature of the incidents make it imperative to build scenarios and practice the response before the incidents happen.

Here are some examples of relevant responsibilities that are accomplished within the detection and analysis phase:

• Initially evaluating whether there is actually an incident (interrogate false positives)

• Analyzing the precursors and indicators

• Looking for correlating information across the enterprise or complaints from end users

• Searching available incident reporting resources (Internet, internal case files, and so on)

• As more information about the incident surfaces, assessing prioritization or severity ratings

• Determining the internal or external nature of the incident (here will be a variety of possibilities of how much impact the incident is expected to have)

• Escalating results from the incident to keep senior management informed and, if required, getting additional resources or assistance from other departments such as the privacy office, legal review, or human resources

• Engaging system administrators or owners of infiltrated systems, as needed

• Collecting data relative to time and material used to investigate these incidents because they involve so many people from the healthcare organization

• The “downtime” is often forgotten at the end of a data incident. Even other types of breaches require a great deal of this downtime away from the regular healthcare mission. It comes at a cost.



Loading...
Download




Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Arduino Project Handbook, Volume 2: 25 Simple Electronics Projects for Beginners by Geddes Mark(200)
But How Do It Know? by J. Clark Scott(155)
Building Evolutionary Architectures by Neal Ford(139)
Computers For Seniors For Dummies by Nancy C. Muir(109)
Raspberry Pi Beginners Guide: Ultimate Guide For Rasberry Pi, User guide To Get The Most Out Of Your Investment, Hacking, Programming, Python, Best Hardware, Beginners Guide To Rasberry Pi by Steven Giles(103)
Getting Started with the micro:bit by Wolfram Donat(100)
Arduino Project Handbook, Volume 2 by Mark Geddes(99)
Getting Started with Soldering: A Hands-On Guide to Making Electrical and Mechanical Connections by Vinck Marc de(98)
31 Days Before Your CompTIA A+ Exams (Shanette Luellen's Library) by Benjamin Patrick Conry(97)
Mastering Docker - Second Edition by McKendrick Russ & Gallagher Scott(87)
The Internet of Things (The MIT Press Essential Knowledge series) by Greengard Samuel(86)
Assembly Language Using the Raspberry Pi: A Hardware Software Bridge by Robert Dunne(85)
Arduino: Simple and Effective Strategies to Learn Arduino Programming by Daniel Jones(85)
Mobile Computing Deployment and Management by Robert J. Bartz(85)
Healthcare Information Security and Privacy (All-In-One) by Sean Murphy(85)
Programming the Intel Galileo: Getting Started with the Arduino -Compatible Development Board by Rush Christopher(84)
Minecraft for Makers by John Baichtal(83)
Programming the BBC micro:bit by Simon Monk(82)
Networking A Beginner's Guide by Bruce Hallberg(79)
Running Linux (5th Edition) by Matthias Kalle Dalheimer; Matt Welsh(75)