Loading...

Healthcare Information Security and Privacy (All-In-One) by Sean Murphy

Healthcare Information Security and Privacy (All-In-One) by Sean Murphy

Author:Sean Murphy
Language: eng
Format: mobi, epub, azw3
Publisher: McGraw-Hill Education
Published: 2015-01-09T08:00:00+00:00


NOTE Depending on the type of exploit or attack, the incident response team will tailor its actions. If the incident is entirely internal (a lost removable media), certain actions are taken. If the exploit is a malicious piece of software found in an electronic health record (EHR), a different set of actions would be taken. That said, the variety and uncertainty surrounding the nature of the incidents make it imperative to build scenarios and practice the response before the incidents happen.

Here are some examples of relevant responsibilities that are accomplished within the detection and analysis phase:

• Initially evaluating whether there is actually an incident (interrogate false positives)

• Analyzing the precursors and indicators

• Looking for correlating information across the enterprise or complaints from end users

• Searching available incident reporting resources (Internet, internal case files, and so on)

• As more information about the incident surfaces, assessing prioritization or severity ratings

• Determining the internal or external nature of the incident (here will be a variety of possibilities of how much impact the incident is expected to have)

• Escalating results from the incident to keep senior management informed and, if required, getting additional resources or assistance from other departments such as the privacy office, legal review, or human resources

• Engaging system administrators or owners of infiltrated systems, as needed

• Collecting data relative to time and material used to investigate these incidents because they involve so many people from the healthcare organization

• The “downtime” is often forgotten at the end of a data incident. Even other types of breaches require a great deal of this downtime away from the regular healthcare mission. It comes at a cost.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Fusion 360 for Makers by Lydia Sloan Cline(1658)
Networking A Beginner's Guide by Bruce Hallberg(1645)
But How Do It Know? by J. Clark Scott(1620)
Arduino Project Handbook, Volume 2: 25 Simple Electronics Projects for Beginners by Geddes Mark(1587)
31 Days Before Your CompTIA A+ Exams (Shanette Luellen's Library) by Benjamin Patrick Conry(1513)
Hack and HHVM by Owen Yamauchi(1487)
Computers For Seniors For Dummies by Nancy C. Muir(1393)
PrestaShop Recipes by Arnaldo Pérez Castaño(1302)
Getting Started with Soldering: A Hands-On Guide to Making Electrical and Mechanical Connections by Vinck Marc de(1215)
Raspberry Pi Electronics Projects for the Evil Genius (Tab) by Norris Donald & Norris Donald(1212)
Healthcare Information Security and Privacy (All-In-One) by Sean Murphy(1192)
The Internet of Things (The MIT Press Essential Knowledge series) by Greengard Samuel(1185)
Shaping the Fourth Industrial Revolution by Klaus Schwab & Nicholas Davis & Satya Nadella(1159)
Raspberry Pi Beginners Guide: Ultimate Guide For Rasberry Pi, User guide To Get The Most Out Of Your Investment, Hacking, Programming, Python, Best Hardware, Beginners Guide To Rasberry Pi by Steven Giles(1157)
Home Robotics by Daniel Knox(1133)
Mobile Computing Deployment and Management by Robert J. Bartz(1125)
Mastering Docker - Second Edition by McKendrick Russ & Gallagher Scott(1118)
Getting Started with the micro:bit by Wolfram Donat(1117)
Building Evolutionary Architectures by Neal Ford(1098)
Arduino Project Handbook, Volume 2 by Mark Geddes(1055)