Wir benötigen Ihre Einwilligung zur Verwendung der einzelnen Daten, damit Sie unter anderem Informationen zu Ihren Interessen einsehen können. Klicken Sie auf "OK", um Ihre Zustimmung zu erteilen.
Standard Guide for Internet and Intranet Healthcare Security (Withdrawn 2009)
Automatische name übersetzung:
Standard-Leitfaden für Internet- und Intranet- Healthcare Sicherheit (Withdrawn 2009)
NORM herausgegeben am 10.4.2000
Bezeichnung normen: ASTM E2086-00
Anmerkung: UNGÜLTIG
Ausgabedatum normen: 10.4.2000
SKU: NS-44241
Zahl der Seiten: 6
Gewicht ca.: 18 g (0.04 Pfund)
Land: Amerikanische technische Norm
Kategorie: Technische Normen ASTM
Keywords:
internet, internet security, intranet, ICS Number Code 35.240.80 (IT applications in health care technology)
Significance and Use |
This guide recommends security mechanisms for protection of healthcare information transmitted using the IPS. The IPS consists of multiple protocol layers. The lowest layer which can provide end–to–end security is the Internet Protocol (IP). IP may run over a variety of subnetwork technologies, such as Ethernet, X.25, ATM, and even asynchronous dial–up lines. While it is possible to provide security services directly over those technologies, such approaches only protect a single subnetwork and are not discussed further. A variety of protocols may be run on top of IP. These include the Transmission Control Protocol (TCP), which provides reliable, sequenced data delivery (sessions), and the User Datagram Protocol (UDP), which provides unsequenced data delivery (datagrams). Other protocols at this layer include various routing and configuration protocols used by the network itself. Application protocols typically make use of either TCP or UDP. A variety of standard application protocols have been defined for such applications as file transfer (FTP), electronic mail (SMTP), and the World Wide Web (HTTP). Some applications have their own security requirements, dictated by the structure of the application or its protocols. The remainder of this guide is organized as follows: Section 5 discusses security threats and the countermeasures which can be used to protect against these threats. Section 6 presents a brief overview of cryptography, as most network security mechanisms rely on its use. Section 7 distinguishes between network and application security and discusses when each level of security might be useful. The remaining sections recommend specific security protocols and mechanisms for both network and application security needs. |
1. Scope |
1.1 This guide covers mechanisms that can be used to protect healthcare information which is being transmitted over networks using the Internet Protocol Suite (IPS). This includes the actual Internet itself, as well as corporate intranets constructed from off-the-shelf components implementing these protocols. An organization's security policy will determine when these mechanisms are used, based on risk analysis. 1.2 The Internet Engineering Task Force (IETF) is defining security standards for use with the IPS. This guide covers the relevant standards and recommends, where needed, particular options (such as cryptographic transformations) to be used with the standards. Most standards referenced here are proposed standards issues as Request for Comments (RFC's). Some are in the draft stage, but are stable enough (and widely enough implemented) to be recommended for use at this time. |
Wollen Sie sich sicher sein, dass Sie nur die gültigen technischen Normen verwenden?
Wir bieten Ihnen eine Lösung, die Ihnen eine Monatsübersicht über die Aktualität der von Ihnen angewandten Normen sicher stellt.
Brauchen Sie mehr Informationen? Sehen Sie sich diese Seite an.
Letzte Aktualisierung: 2024-12-22 (Zahl der Positionen: 2 217 000)
© Copyright 2024 NORMSERVIS s.r.o.