1 / 11

Information security control in telemedicine systems

Information security control in telemedicine systems. A. Novikov NTUU “KPI”, Kiev, Ukraine. Telemedicine Center. Router/ IPT Gateway. L3 Switch. L2 Switch. Hub. Internet. Router. MEDNET Project. Telemedicine Department. IPT Gateway. NTUU “KPI” backbone. 1 GB. Hub. Router.

nigel
Télécharger la présentation

Information security control in telemedicine systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information security control in telemedicine systems A. Novikov NTUU “KPI”, Kiev, Ukraine

  2. Telemedicine Center Router/ IPT Gateway L3 Switch L2 Switch Hub Internet Router MEDNET Project Telemedicine Department IPT Gateway NTUU “KPI” backbone 1 GB Hub Router WAN Router Data Storage Violator (Internal) Medical University (Teleworkers) Violator (External)

  3. Characteristics of the information • Confidentiality only authorized persons may become familiar with the information • Integrity only authorized persons may in any way modify the information • Accessibility any authorized object may obtain data within the certain (short) time interval

  4. Confidentiality • The violation of confidentiality (privacy): disclosure of information • Typical ways for disclosure of information: • “sniffing”: listening of the data transmitted via a telecommunication channel • “spoofing”: an authorized object of telecommunication exchange is substituted by an unauthorized object

  5. WAN Router/ IPT Gateway WAN Router Hub Internet Router Violation of confidentiality Sniffing WAN L3 Switch L2 Switch Hub Teleworkers Spoofing

  6. WAN Router/ IPT Gateway Hub Router Integrity • The violation of integrity: • partial or complete loss of the information • falsification of data

  7. WAN Router/ IPT Gateway Hub Router Accessibility • The violation of accessibility: denial of service (DoS) attacks

  8. Methods of information protection • Authentication of objects • Data ciphering (encryption) • Signing of data • Redundancy and backupin storage of data • Redundant data channels

  9. Virtual Private Networks IP Phones Private WAN (Clear-text or Encrypted Routing - Static, RIP, OSPF) FR or Leased Line (Intranet, trusted private network) Video conference Private Public Private Public Public Internet (Untrusted network) Branch Office Tunnel Public WAN (Clear-text, static routing) Public WAN VPN (Dynamic routing over encrypted tunnels)

  10. Transport Mode IP Header Data Original IP Header Sec Protocol Header Data Tunnel Mode Encryption New IP Header Sec Protocol Header Original IP Header Data Encryption Outer IP Header Inner IP Header Transport and Tunnel Mode

  11. VPN Services Firewall Services Adv Routing Software License Keys Base Services A good example: Nortel Networks Contivity • Contivity can function as • VPN device • Router • Firewall • Or any combination Decreased Cost Modular Service Options

More Related