ABSTRACT

Implementing Information Security in Healthcare: Building a Security Program offers a critical and comprehensive look at healthcare security concerns in an era of powerful computer technology, increased mobility, and complex regulations designed to protect personal information. Featuring perspectives from more than two dozen security experts, the book explores the tools and policies healthcare organizations need to build an effective and compliant security program.

Topics include information security frameworks, risk analysis, senior management oversight and involvement, regulations, security policy development, access control, network security, encryption, mobile device management, disaster recovery, and more. Information security is a concept that has never been more important to healthcare as it is today. Special features include appendices outlining potential impacts of security objectives, technical security features by regulatory bodies (FISMA, HIPAA, PCI DSS and ISO 27000), common technical security features, and a sample risk rating chart.

chapter Chapter 2|12 pages

Information Security Frameworks

chapter Chapter 3|8 pages

Information Security Planning

chapter Chapter 4|18 pages

Risk Analysis

chapter Chapter 6|10 pages

Information Security Regulations

chapter Chapter 7|6 pages

Security Policy Development

chapter Chapter 8|4 pages

The Concept of Security Controls

chapter Chapter 9|16 pages

Access Control

chapter Chapter 10|18 pages

Network Security

chapter Chapter 11|14 pages

Use of Encryption

chapter Chapter 12|18 pages

Managing Mobile Devices

chapter Chapter 13|10 pages

Application Security

chapter Chapter 14|12 pages

Information Security Operations

chapter Chapter 16|20 pages

Business Continuity and Disaster Recovery

chapter Chapter 17|12 pages

Change Control and Change Management

chapter Chapter 18|14 pages

Testing Your Technical Controls

chapter Chapter 19|20 pages

Auditing Your Program

chapter Chapter 20|18 pages

Incident Handling

chapter Chapter 21|10 pages

Information Systems Implementation