Healthcare Information Security and Privacy (All-In-One) by Sean Murphy

Healthcare Information Security and Privacy (All-In-One) by Sean Murphy

Author:Sean Murphy
Language: eng
Format: mobi, epub, azw3
Publisher: McGraw-Hill Education
Published: 2015-01-09T08:00:00+00:00

NOTE Depending on the type of exploit or attack, the incident response team will tailor its actions. If the incident is entirely internal (a lost removable media), certain actions are taken. If the exploit is a malicious piece of software found in an electronic health record (EHR), a different set of actions would be taken. That said, the variety and uncertainty surrounding the nature of the incidents make it imperative to build scenarios and practice the response before the incidents happen.

Here are some examples of relevant responsibilities that are accomplished within the detection and analysis phase:

• Initially evaluating whether there is actually an incident (interrogate false positives)

• Analyzing the precursors and indicators

• Looking for correlating information across the enterprise or complaints from end users

• Searching available incident reporting resources (Internet, internal case files, and so on)

• As more information about the incident surfaces, assessing prioritization or severity ratings

• Determining the internal or external nature of the incident (here will be a variety of possibilities of how much impact the incident is expected to have)

• Escalating results from the incident to keep senior management informed and, if required, getting additional resources or assistance from other departments such as the privacy office, legal review, or human resources

• Engaging system administrators or owners of infiltrated systems, as needed

• Collecting data relative to time and material used to investigate these incidents because they involve so many people from the healthcare organization

• The “downtime” is often forgotten at the end of a data incident. Even other types of breaches require a great deal of this downtime away from the regular healthcare mission. It comes at a cost.


Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Arduino Project Handbook, Volume 2: 25 Simple Electronics Projects for Beginners by Geddes Mark(361)
But How Do It Know? by J. Clark Scott(339)
31 Days Before Your CompTIA A+ Exams (Shanette Luellen's Library) by Benjamin Patrick Conry(286)
Building Evolutionary Architectures by Neal Ford(285)
Networking A Beginner's Guide by Bruce Hallberg(218)
Computers For Seniors For Dummies by Nancy C. Muir(215)
Raspberry Pi Beginners Guide: Ultimate Guide For Rasberry Pi, User guide To Get The Most Out Of Your Investment, Hacking, Programming, Python, Best Hardware, Beginners Guide To Rasberry Pi by Steven Giles(205)
The Internet of Things (The MIT Press Essential Knowledge series) by Greengard Samuel(203)
Getting Started with Soldering: A Hands-On Guide to Making Electrical and Mechanical Connections by Vinck Marc de(201)
Healthcare Information Security and Privacy (All-In-One) by Sean Murphy(197)
Getting Started with the micro:bit by Wolfram Donat(185)
Mastering Docker - Second Edition by McKendrick Russ & Gallagher Scott(184)
Hack and HHVM by Owen Yamauchi(178)
Mobile Computing Deployment and Management by Robert J. Bartz(177)
Assembly Language Using the Raspberry Pi: A Hardware Software Bridge by Robert Dunne(175)
Arduino Project Handbook, Volume 2 by Mark Geddes(169)
Arduino: Simple and Effective Strategies to Learn Arduino Programming by Daniel Jones(166)
Programming the BBC micro:bit by Simon Monk(162)
Running Linux (5th Edition) by Matthias Kalle Dalheimer; Matt Welsh(154)
Minecraft for Makers by John Baichtal(152)
Web Analytics