You are on page 1of 21

Introduction to Information and

Computer Science
Security
Lecture b
This material (Comp4_Unit8b) was developed by Oregon Health and Science University, funded by the Department of Health
and Human Services, Office of the National Coordinator for Health Information Technology under Award Number
IU24OC000015.
Security
Learning Objectives
List and describe common security concerns (Lecture a)
Describe safeguards against common security concerns
(Lecture b)
Describe security concerns for wireless networks and
how to address them (Lectures b and c)
List security concerns/regulations for health care
applications (Lecture c)
Describe security safeguards used for health care
applications (Lecture c)
2
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Introduction to Information and Computer Science
Security
Lecture b
Mitigating Security Issues
Security policy
User authentication
Firewalls
Antivirus software
Intrusion Protection Systems
Encrypt communications and stored data
Audit adherence to security policies
3
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Introduction to Information and Computer Science
Security
Lecture b
Security Policy
Most policies contain provisions related to:
Security definition
Enforcement
User access to the network, devices, software, and data
Password management
Email and Internet use
Antivirus software
Backup and recovery
Intrusion detection
Auditing
Others
4
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Introduction to Information and Computer Science
Security
Lecture b
Authentication Factors - Proving
User Identity
Something the user knows
Username and password
Something the user has
Smartcards and employee badges
Something that is a part of the user (biometrics)
Fingerprints, retinal scans, etc.
5
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Introduction to Information and Computer Science
Security
Lecture b
Factor Authentication
One-factor authentication
Simplest authentication process
Username and password needed
Two-factor authentication
Username and password needed
Also need one of other authentication types
Smartcard or fingerprint reader
Three-factor authentication
All three authentication types used
Such as username/password and smartcard and fingerprint reader
6
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Introduction to Information and Computer Science
Security
Lecture b
Firewalls
Software and/or hardware that blocks
unauthorized communications on computer
Windows OS provides Windows Firewall
Routers provide basic firewall protection
Most ISP routers act as firewalls
Inspects each piece of communication
Permits or denies traffic based on rules
For example, another user will not be able to connect to users
computer unless firewall is configured to allow communication
7
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Introduction to Information and Computer Science
Security
Lecture b
Windows Firewall Example
(PD-US, 2011)
8
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Introduction to Information and Computer Science
Security
Lecture b
Antivirus (AV) Software
Detects and removes malware
Can also protect against adware and spyware
Requires current virus pattern definitions
Updates cost about $50/year
Searches all computer files for virus signatures
Monitors for malicious computer activity
For example, if a running program attempts to
perform some odd action, the AV software will stop
and quarantine the program
9
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Introduction to Information and Computer Science
Security
Lecture b
Common Antivirus Software
Vendors
Avast! http://www.avast.com/index
AVG http://free.avg.com/us-en/homepage
HouseCall http://housecall.trendmicro.com/
Kaspersky http://usa.kaspersky.com/
McAfee http://www.mcafee.com/us/
Symantec http://www.symantec.com/index.jsp
10
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Introduction to Information and Computer Science
Security
Lecture b
Intrusion Protection Systems (IPS)
Similar to firewall functionalitybut more!
Hardware and/or software that monitors all
network traffic for malicious activity
Works to stop intrusions and alert network administrators
The Cisco Secure Intrusion
Detection System (formerly
NetRanger), is an enterprise-
scale, real-time, intrusion
detection system designed to
detect, report, and terminate
unauthorized activity throughout
a network.
Approximate cost: $700
(PD-US, 2011)

11
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Introduction to Information and Computer Science
Security
Lecture b
Encryption
Makes communication unreadable to
unauthorized viewers
Uses electronic private and public key set
Authorized viewers provided with encryption key,
with ability to encrypt and decrypt messages
Medical office encrypts data using its private key
Patient decrypts data using the medical offices public
key
Encryption keeps data confidential
Entities never share their private key
12
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Introduction to Information and Computer Science
Security
Lecture b
Encryption Example
Encrypting a Microsoft
Excel 2010 document
makes the spreadsheet
unreadable to anyone who
tries to open it without the
encrypting password.

Any Microsoft Office file can
be encrypted (password
protected) in this way.

(PD-US, 2011)

13
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Introduction to Information and Computer Science
Security
Lecture b
Encryption Example (continued)
Opening an encrypted document requires the
user to enter the password used to encrypt it.

If the user does not enter the correct password, the encrypted document
cannot be opened. Entering the correct password allows the document to be
decrypted so that it can be viewed.

(PD-US, 2011)

(PD-US, 2011)

14
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Introduction to Information and Computer Science
Security
Lecture b
Encryption Example (continued)
Any file on a Windows-based PC can be
encrypted. To encrypt a document:
1. Create a new folder.
2. Right-click the folder and select Properties.
3. Click Advanced.
4. Click Encrypt contents to secure data.
All files placed in this folder will be encrypted.

(PD-US, 2011)

15
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Introduction to Information and Computer Science
Security
Lecture b
Audit Security Policy Practices
Is organization doing what it says it will do?
If nurses are to log off nursing stations when they
leave the station, is this being done?
Is the database server kept up to date with critical
updates?
Is all access of medical records logged?
Are backups being done regularly and stored
according to the security policy?
Do employees adhere to email policies?
Others?
16
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Introduction to Information and Computer Science
Security
Lecture b
Additional Steps to Take...
Educate employees
Dont open unsolicited attachments
Users lock screens when not at station
Dont click on popup ads while surfing
Report strange activity to network admins
Create secure software applications
Only authenticated and authorized use of software
Non-repudiation of network actions
Means that a user or device cannot deny having done
something
17
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Introduction to Information and Computer Science
Security
Lecture b
Additional Steps to Take...
Use of password policies
Password complexity
Passwords changed regularly (60 days, etc.)
No reuse of old passwords
Passwords not written down anywhere
Domain-based network environment
Server manages users, devices, and policies
No use of network assets unless part of domain
Restricted number of network administrators
18
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Introduction to Information and Computer Science
Security
Lecture b
Additional Steps to Take...
Physical security of assets
Servers bolted to floor/wall in locked room
No unauthorized physical access of equipment
Protect devices with passwords at all times
UPS and power surge equipment used
No access to data without authentication
Validation of data entered into database
All database entries validated before stored in
database
Test for expected and unexpected database entries
19
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Introduction to Information and Computer Science
Security
Lecture b
Security
Summary Lecture b
Describe safeguards against common security
concerns
Describe security concerns for wireless networks
and how to address them
20
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Introduction to Information and Computer Science
Security
Lecture b
Security
References Lecture b
References
SANS. Information Security Policy Templates. [Internet]. 2010 [cited 2011 Nov 07]. Available from:
http://www.sans.org/security-resources/policies.
GIAC. The Basics of an IT Security Policy. [Internet]. 2010 [cited 2011 Nov 07]. Available from:
http://www.giac.org/certified_professionals/practicals/gsec/1863.php.
Wikipedia. Firewall (computing). [Internet]. 2010 [cited 2011 Nov 07]. Available from:
http://en.wikipedia.org/wiki/Firewall_(computing).
Wikipedia. Antivirus software. [Internet]. 2010 [cited 2011 Nov 07]. Available from:
http://en.wikipedia.org/wiki/Antivirus_software.
Wikipedia. Malware. [Internet]. 2010 [cited 2011 Nov 07]. Available from: http://en.wikipedia.org/wiki/Malware.
Wikipedia. Intrusion detection system. [Internet]. 2010 [cited 2011 Nov 07]. Available from:
http://en.wikipedia.org/wiki/Intrusion_detection_system.
IT Security. Create your own security audit. [Internet]. 2010 [cited 2011 Nov 07]. Available from:
http://www.itsecurity.com/features/it-security-audit-010407/.
Images
Slide 11: Cisco Secure Intrusion Detection System [image on the Internet]. c2010 [cited 2011 Nov 07]. Available from:
http://www.google.com/products/catalog?q=Intrusion+detection+system&cid=3672983121990923567&ei=wPGHTJ
blBomeiwSew5nYAg&sa=title&ved=0CEEQ8wIwBTgA#p.

21
Health IT Workforce Curriculum
Version 3.0/Spring 2012
Introduction to Information and Computer Science
Security
Lecture b

You might also like