279,484 research outputs found

    IT Security in Hospital Management

    Get PDF
    Hospital IT security presents many unique challenges that must be solved by the entire organization. Network and computer threats can cause thousands of dollars in lost time and resources, legal repercussions, and damaged reputation. Despite warnings from a wealth of public breach notifications, many hospitals are inadequately prepared to deal with today's computer-based attacks. This research explores the root causes of hospital network and computer in security, and addresses these problems with methods implemented in actual hospitals. A lack of comprehension of methods to assess and implement security measures by hospital IT security employees can hinder network visibility and prevent their ability to stop threats. In addition, these same people are unable to express security concerns in terms management can understand, harming their credibility within the business as a whole. Without this sup- port, organizational change is impossible. By addressing these concerns with a combination of people, process, and tools, we can solve complex problems, protect patient data, and ensure IT operations so hospitals can serve their community and save lives

    Dynamic Selection of Symmetric Key Cryptographic Algorithms for Securing Data Based on Various Parameters

    Full text link
    Most of the information is in the form of electronic data. A lot of electronic data exchanged takes place through computer applications. Therefore information exchange through these applications needs to be secure. Different cryptographic algorithms are usually used to address these security concerns. However, along with security there are other factors that need to be considered for practical implementation of different cryptographic algorithms like implementation cost and performance. This paper provides comparative analysis of time taken for encryption by seven symmetric key cryptographic algorithms (AES, DES, Triple DES, RC2, Skipjack, Blowfish and RC4) with variation of parameters like different data types, data density, data size and key sizes.Comment: 8 pages, 4 figures, Fifth International Conference on Communications Security & Information Assurance (CSIA 2014) May 24~25, 2014, Delhi, Indi

    Ultrasonic Data Transmission and Steganography

    Get PDF
    This project discusses the feasibility of using ultrasound to transmit data between computer systems, particularly computer systems that have been intentionally cut off from traditional networks for increased security. The goal of this project is to provide a synthesis of the current research that has been done into the use of ultrasonic data transmission, and to conduct a series of tests determining the validity of certain claims made in regards to ultrasonic data transmission within the information security community. All research, experiments, results, and inferences have been discussed in the context of how they relate to the realm of information security. All security concerns discovered during the course of this project have been outlined at the end of this paper, and potential remediation strategies have been suggested

    Password secured sites: stepping forward with keystroke dynamics

    Get PDF
    Computer Authentication is a critical component of most computer systems – especially those used in e- Commerce activities over the internet. Global access to information makes security, namely the authentication process, a critical design issue in these systems. In what concerns to authentication, what is required is a reliable, hardware independent and efficient security system. In this paper, we propose an extension to a keystroke dynamics based security system. We provide evidence that completely software based systems can be as effective as expensive and cumbersome hardware based systems. Our system is a behavioral based system that captures the normal typing patterns of a user and uses that information, in addition to standard login/password security to provide a system that is user-friendly and very effective at detecting imposters. The results provide a means of dealing with enhanced security that is growing in demand in web-based applications based on ECommerce

    The 2010 Personal Firewall Robustness Evaluation

    Get PDF
    With the advent of cheaper Internet connections, the number of Internet connections among home users is on the rise. Generally, home users have little understanding of the security concerns associated with Internet connectivity. To protect against computer attacks, generally a home user may install a personal firewall on his/her computer. To determine the effectiveness of personal firewalls, evaluation tests were performed against the ten firewall products available to users at local electronic stores and listed on popular firewall security websites. The firewalls were tested in their default and maximum security mode. The investigation was carried out by performing a port scan and vulnerability scan attacks against a computer with no firewall protection and computers running personal firewalls. The results of the investigation established that the computers running the firewalls exhibited some or all of the vulnerabilities detected on a computer with no firewall protection
    • …
    corecore