security rule
Recently Published Documents


TOTAL DOCUMENTS

75
(FIVE YEARS 8)

H-INDEX

5
(FIVE YEARS 1)

2021 ◽  
pp. 81-92
Author(s):  
Colton D. Hood

Clinical information systems are becoming increasingly complex, and telehealth is no exception. Threats to information systems are far and wide including phishing, malware, ransomware and even advanced persistent threats. Maintaining good security practices is necessary in order to secure telehealth and other clinical information systems. Compliance with the HIPAA Security Rule is mandatory, while providing a practical framework for good security practices and self-guidance that ensure basic compliance to all covered entities regardless of their level of IT support. Good security practices are essential to build trust in the telehealth system for both providers, and clinicians, as well as patients.


2021 ◽  
Vol 15 (1) ◽  
pp. 99-116
Author(s):  
Sarra Namane ◽  
Nassira Ghoualmi ◽  
Mustafa Kaiiali

Access control mechanisms are the way to guarantee secure access to grid resources. Recent research works were focused on how to improve the representation of the resources' security policies for faster decisions making. PCM, HCM, GAG, and WGAG are all different ways to represent these security policies. This paper presents an enhancement to WGAG, the action-weighted grid authorization graph (Action-WGAG). A security policy-parser (SP-Parser) has been developed to implement the Action-WGAG. The evaluation results of the proposed model showed that it assures a smaller number of security rule checking in some cases and a reduction of the answer time to an access control request.


2020 ◽  
Vol 13 (3) ◽  
pp. 389-392
Author(s):  
Thomas J. Mortell ◽  
Austin T. Strobel

The novel coronavirus, the cause of COVID-19, has sent shockwaves throughout the world, shuttered many businesses essentially overnight, and has left billions living worldwide in quarantine. Not surprisingly, the health care industry has been significantly affected by the COVID-19 pandemic. This article focuses on how COVID-19 has influenced the Office for Civil Rights’ (OCR’s) enforcement of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy and Security Rules as they relate to telehealth remote communications, and opines about whether the COVID-19-related changes to HIPAA Privacy Rule and Security Rule enforcement might last beyond the current crisis.


Cyber Security is the protection of unauthorized access of the information. Different threat and issues are present in the network which stole unpredictable amount of data every year. For the information technology and computer systems, a cyber security rule is required to compel different group as well as businesses to secure their systems and information from cyber-attacks. In the healthcare sector huge amount of data can be theft every year which is dangerous for both government and personal view. The technical advancements have increased the risk’s potential in the network in Cloud and Cyber. Security & privacy cracks are the vital issues which need to mitigate to maintain the dignity of the network. This paper conducted a review to secure the network from network security issues. There are various attacks which are vulnerable to the network like DoS, DDoS and Spoofing. These attacks have been described to identify the attacker’s capability. In order to facilitate this, networks such as cloud, ad-hoc, cyber has been described to determine the security, a paradigm. A literature from past studies has been conducted to identify the threats and their behavior. Different types of attacks and their behavior is also studied, and a tabular structure is also presented for better understanding.


2019 ◽  
Vol 40 (4) ◽  
pp. 641-668 ◽  
Author(s):  
Hyunkang Hur ◽  
James L. Perry

This study assesses the impact of different job security rules on federal employees’ organizational commitment by looking at the effects of changes in the Department of Homeland Security (DHS) precipitated by MaxHR, introduced to DHS in 2005. The 2005 job security rule changes, as part of the “reformed” personnel system of the new DHS, reduced employee job security, which in turn weakened organizational commitment. The study found subsequent repeal of the job security rules in 2007 boosted organizational commitment among DHS workers by as much as 10 percentage points. Taken together, the results of difference-in-differences (DID) analysis for the new job security rules in the period 2005-2006 and subsequent repeal of the job security rules in the period 2007-2010 suggest that employees’ commitment to DHS was more favorable after the repeal of the job security rules than prior to the 2005 reforms.


2018 ◽  
Vol 2 (4) ◽  
pp. 286 ◽  
Author(s):  
Robinson ◽  
Memen Akbar ◽  
Muhammad Arif Fadhly Ridha

Web Application or website are widely used to provide functionality that allows companies to build and maintain relationships with their customers. The Information stored by web applications is often confidential and, if obtained by malicious attackers. Its exposure could result in substantial losses for both consumers and companies. SQL Injection and Cross Site Scripting are attacks that aiming web application database vulnerabilities. Its can allow malicious attackers to manipulate web server database that can cause various data lost, information thieving, and inconsistent of data. Therefore, this research propose the Open Web Application Security Project (OWASP) ModSecurity Core Rule Set which can help administrator securing the web servers. OWASP operate by blocking IP Address which try to breaking the security rule, monitoring network traffic and preventing suspicious network requesting from outside.


Sign in / Sign up

Export Citation Format

Share Document