Muutke küpsiste eelistusi

E-raamat: Implementing Information Security in Healthcare: Building a Security Program [Taylor & Francis e-raamat]

(Jacobs School of Music, Indiana University, USA),
  • Formaat: 312 pages
  • Sari: HIMSS Book Series
  • Ilmumisaeg: 07-Feb-2013
  • Kirjastus: Healthcare Information & Management Systems Society
  • ISBN-13: 9781003126294
  • Taylor & Francis e-raamat
  • Hind: 253,89 €*
  • * hind, mis tagab piiramatu üheaegsete kasutajate arvuga ligipääsu piiramatuks ajaks
  • Tavahind: 362,70 €
  • Säästad 30%
  • Formaat: 312 pages
  • Sari: HIMSS Book Series
  • Ilmumisaeg: 07-Feb-2013
  • Kirjastus: Healthcare Information & Management Systems Society
  • ISBN-13: 9781003126294
Implementing Information Security in Healthcare: Building a Security Program offers a critical and comprehensive look at healthcare security concerns in an era of powerful computer technology, increased mobility, and complex regulations designed to protect personal information. Featuring perspectives from more than two dozen security experts, the book explores the tools and policies healthcare organizations need to build an effective and compliant security program.

Topics include information security frameworks, risk analysis, senior management oversight and involvement, regulations, security policy development, access control, network security, encryption, mobile device management, disaster recovery, and more. Information security is a concept that has never been more important to healthcare as it is today. Special features include appendices outlining potential impacts of security objectives, technical security features by regulatory bodies (FISMA, HIPAA, PCI DSS and ISO 27000), common technical security features, and a sample risk rating chart.
Acknowledgements xiii
A Tribute to Terrell W. Herzig xv
Chapter 1 The Importance of Information Security in Healthcare
1(6)
Terrell W. Herzig
Chapter 2 Information Security Frameworks
7(12)
Joseph W. Popinski
Chapter 3 Information Security Planning
19(8)
Kim E. Sassaman
Chapter 4 Risk Analysis
27(18)
Susan Lucci
Tom Walsh
Chapter 5 Senior Management Oversight and Involvement
45(10)
Mary Anne S. Canant
Chapter 6 Information Security Regulations
55(10)
Susan Gatehouse
Chapter 7 Security Policy Development
65(6)
Judi Hofman
Michele T. Kruse
Chapter 8 The Concept of Security Controls
71(4)
Kim E. Sassaman
Chapter 9 Access Control
75(16)
Brian Evans
Chapter 10 Network Security
91(18)
Buddy Gilbert
Chapter 11 Use of Encryption
109(14)
Brian Evans
Chapter 12 Managing Mobile Devices
123(18)
Mark W. Dill
Brian Evans
Tom Walsh
Chapter 13 Application Security
141(10)
Joseph Dalton
Ander Hoaglund
Chapter 14 Information Security Operations
151(12)
Darren D. Dannen
Chapter 15 Security Considerations in Technology Contracting
163(20)
Melissa Markey
Margaret Marchak
Chapter 16 Business Continuity and Disaster Recovery
183(20)
Tom Walsh
Chapter 17 Change Control and Change Management
203(12)
Michelle Bigelow
Chapter 18 Testing Your Technical Controls
215(14)
Tom Walsh
Dennis Henderson
Chapter 19 Auditing Your Program
229(20)
Mary Anne S. Canant
Chapter 20 Incident Handling
249(18)
Shelia T. Searson
Jennifer L. Cole
Chapter 21 Information Systems Implementation
267(10)
Linda Wilson
Appendix A 277(6)
Appendix B 283(2)
Index 285
Terrell W. Herzig, MSHI, CISSP, was Information Security Officer of the University of Alabama at Birmingham (UAB) Health System, the UAB HIPAA Security Officer, and an adjunct professor of Health Informatics at the UAB. Mr. Herzig taught graduate courses in Information Engineering, Programming, Computer Networks, and Information Security in the UAB School of Health Professions. Tom Walsh, CISSP, has partnered with Brian Evans, CISSP, CISM, CISA, CGEIT, to assist healthcare organizations throughout the country with building regulatory compliant information security programs.