Aspects of computer security: A primer

As health care organizations continue on the path toward total digital operations, a topic often raised but not clearly understood is that of computer security. The reason for this is simply the vastness of the topic. Computers and networks are complex, and each service offered is a potential security hole. This article describes for the lay person the fundamental points of computer operation, how these can be points attacked, and how these attacks can be foiled—or at least detected. In addition, a taxonomy that should aid system administrators to evaluate and strengthen their systems is described.

[1]  Bernard P. Zajac,et al.  Pretty good privacy , 1994 .

[2]  Simson L. Garfinkel,et al.  PGP: Pretty Good Privacy , 1994 .

[3]  Rob Havelt System Administration: SATAN: Analyzing Your Network , 1997 .

[4]  Christine Meierhöfer Pretty good privacy , 1996, SIGGRAPH '96.

[5]  M G Strintzis,et al.  Network and data security design for telemedicine applications. , 1997, Medical informatics = Medecine et informatique.

[6]  Kevin Fenzi Tripping Up Intruders with Tripwire , 1997 .

[7]  C Willenberg [Strategy for securing medical documents by electronic signature and encryption]. , 1997, Der Radiologe.

[8]  Joseph Berry Assessing CPU utilization , 1998 .

[9]  Jeffrey I. Schiller,et al.  An Authentication Service for Open Network Systems. In , 1998 .

[10]  Paul Wouters Designing a Safe Network Using Firewalls , 1997 .

[11]  Syed Ali Freeware-based security , 1999 .

[12]  Shireesh Reddy Annam An Overview of Computer security , 2001, ArXiv.

[13]  L. Chan-Lizardo,et al.  Virtual private networks , 1988 .

[14]  William Stallings Network and Internetwork Security: Principles and Practice , 1994 .

[15]  C. Willenberg,et al.  Strategies for the security of medical documents. Electronic signature and encryption , 1997, Der Radiologe.

[16]  Stephen T. C. Wong,et al.  Security for the digital information age of medicine: Issues, applications, and implementation , 1997, Journal of Digital Imaging.

[17]  Robert Owen Thomas Haunted by the ghost of smurfing , 1998 .

[18]  Lee Brotzman Wrap A Security Blanket Around Your Computer , 1997 .

[19]  Rita C. Summers An Overview of Computer Security , 1984, IBM Syst. J..

[20]  Thomas Simpson,et al.  Who Is At the Door , 1997 .

[21]  Bear Giles Encrypted File Systems , 1998 .