Featuring 18 Papers as of September 22, 2016
Healthcare Provider Breaches and Risk Management Road Maps: Results of the SANS Survey on Information Security Practices in the Healthcare Industry Analyst Paper
by Barbara Filkins - July 19, 2016
- Associated Webcasts: Health Care Provider Breaches and Risk Management Roadmaps: Part 2 - Health Care Security from the Top Down
- Sponsored By: ForeScout Technologies WhiteHat Security Carbon Black Trend Micro Inc. Anomali Great Bay Software
The number of attack surfaces continues to rise as the use of mobile medical- and health-related apps grows and as electronic health records (EHR) become ever more embedded in clinical settings. As this survey shows, many attacks stem from insiders with access, whether through simple negligence, malicious intent or just plain curiosity. To get the specifics, read on …
Breach Control: Best Practices in Health Care Application Security STI Graduate Student Research
by Brian Quick - February 25, 2016
Data breaches in the health care industry have surged in the past few years. The health care industry is currently the largest attack surface of the critical infrastructure.
eAUDIT: Designing a generic tool to review entitlements STI Graduate Student Research
by Francois Begin - June 22, 2015
In a perfect world, identity and access management would be handled in a fully automated way.
The What, Where and How of Protecting Healthcare Data by Kelli Tarala and James Tarala - April 6, 2015
Mitigating healthcare data-loss risk by understanding the What, Where, and How of Protecting Healthcare Data.
Inaugural Health Care Survey Analyst Paper
by Barbara Filkins - October 30, 2013
- Associated Webcasts: The SANS Survey of IT Security in Health Care
- Sponsored By: Tenable Network Security Oracle Trend Micro Inc. Redspin
This survey reveals aspects of security in the health care arena from the perspective of IT security staff—managers, analysts, and executives.
Electronic Medical Records: Success Requires an Information Security Culture by Thomas Roberts - June 5, 2013
The increased use of electronic medical records (EMR's) is certainly impacting the world of healthcare.
Incident Handling in the Healthcare Cloud: Liquid Data and the Need for Adaptive Patient Consent Management STI Graduate Student Research
by Barbara Filkins - October 18, 2012
The increasing use of electronic health record (EHR) systems, health information exchange (HIE) networks, and cloud computing significantly increases the exposure of sensitive medical information to loss of confidentiality, integrity, and availability due to data-related attacks, such as medical identity theft or insider threats (Ponemon Institute, 2011).
Cloudy with a Chance of Better Health Care: Security and Compliance Fundamentals for Protecting e-Health Data Analyst Paper
by Barbara Filkins - September 6, 2011
This paper explores challenges and considerations for the use of cloud computing in health care, paying particular attention to security and compliance issues related to cloud computing.
Risk Analysis for HIPAA Compliancy by Chris Ralph - March 9, 2005
This document describes the policy and procedure established by a small hospital, GIAC Health, for meeting the Risk Analysis Administrative Safeguard requirement for HIPAA compliancy.
Security Awareness and Training: Security Reminders by Kevin Sackett - January 17, 2005
Although an organization may have the means to purchase the best firewall technology, deploy the hardest encryption standards, and implement multi-factor authentication schemes, it still needs the complement of enlightened workforce members who understand what measures they can take to help reduce security risks.
A Small Business Search for HIPAA Compliant E-mail Security by Dayle Alsbury - July 25, 2004
This case study is of a small insurance business providing both health and non-health related products which are separated by divisions. HIPAA regulations impact approximately half of the user base in the business.
Developing & Implementing an Information Security Policy and Standard Framework by Peni Smith - June 9, 2004
Attacks against computers, in both home and business environments, have grown steadily over the past several years.
The Shift to Security Implementation in a HealthCare facility by Sean Mulch - June 8, 2004
There are a number of challenges presented to healthcare facilities as they begin the shift to implementing Information Security. One of these is that they have often been among the first to adopt new technologies.
Disaster Recovery in Healthcare Organizations: The Impact of HIPAA Security by James Murphy - March 4, 2004
Healthcare organizations are facing increasing regulatory burdens, and the latest to demand response is HIPAA Security. One major aspect of HIPAA Security is the disaster recovery plan, which seeks to restore appropriate access to information after a major calamity.
HIPAA Security Compliance Project - Identification of Logging and Auditing Requirements by Kurt Patti - October 10, 2003
This discussion will outline a project "plan of attack" for a covered entity to identify and address the electronic logging and auditing requirements within the Final HIPAA Security Rule.
Getting Started: The Impacts of Privacy and Security Under HIPAA - A Case Study STI Graduate Student Research
by Barbara Filkins - September 26, 2003
The paper describes how the Agency established an on-going, cost-effective security program integrated with current Agency business practices.
Case Study in Implementing Security for HIPAA Privacy Compliance by Ellen Robinson - August 22, 2003
The Health Insurance Portability and Accountability Act of 1996, otherwise known as HIPAA, set forth new standards for the privacy and security of protected health information (PHI).
HIPAA-compliant configuration guidelines for Information Security in a Medical Center environment by Robert Grenert - March 12, 2003
This paper will show that information security is an on-going project and encompasses more than just a few pieces of hardware plugged into a network.
Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact email@example.com.
All papers are copyrighted. No re-posting or distribution of papers is permitted.