Abstract
As health care organizations continue on the path toward total digital operations, a topic often raised but not clearly understood is that of computer security. The reason for this is simply the vastness of the topic. Computers and networks are complex, and each service offered is a potential security hole. This article describes for the lay person the fundamental points of computer operation, how these can be points attacked, and how these attacks can be foiled - or at least detected. In addition, a taxonomy that should aid system administrators to evaluate and strengthen their systems is described.
Original language | English (US) |
---|---|
Pages (from-to) | 114-131 |
Number of pages | 18 |
Journal | Journal of Digital Imaging |
Volume | 12 |
Issue number | 3 |
DOIs | |
State | Published - 1999 |
ASJC Scopus subject areas
- Radiological and Ultrasound Technology
- Radiology Nuclear Medicine and imaging
- Computer Science Applications