Difference between revisions of "System Security"

From Clinfowiki
Jump to: navigation, search
(Created page with "'''System Security'''- The totality of safeguards including hardware, software, personnel policies, information practice policies, disaster preparedness, and oversight of thes...")
 
 
(2 intermediate revisions by one user not shown)
Line 1: Line 1:
'''System Security'''- The totality of safeguards including hardware, software, personnel policies, information practice policies, disaster preparedness, and oversight of these components.  
+
'''System Security'''- The totality of safeguards including hardware, software, personnel policies, information practice policies, disaster preparedness, and oversight of these components.
Security protects both the system and the information contained within from unauthorized access from without and from misuse from within.  
+
 +
Security protects both the system and the information contained within from unauthorized access from without and from misuse from within.
 +
 
Security enables the entity or system to protect the confidential information it stores from unauthorized access, disclosure, or misuse, thereby protecting the privacy of the individuals who are the subjects of the stored information.<ref name="System Security">Suzy A. Buckovich , Helga E. Rippen , Michael J. Rozen. Driving Toward Guiding Principles A Goal for Privacy, Confidentiality, and Security of Health Information. Journal of the American Medical Informatics Association Mar 1999, 6 (2) 122-133; DOI: 10.1136/jamia.1999.0060122 Retrieved from http://jamia.oxfordjournals.org/content/6/2/122</ref>
 
Security enables the entity or system to protect the confidential information it stores from unauthorized access, disclosure, or misuse, thereby protecting the privacy of the individuals who are the subjects of the stored information.<ref name="System Security">Suzy A. Buckovich , Helga E. Rippen , Michael J. Rozen. Driving Toward Guiding Principles A Goal for Privacy, Confidentiality, and Security of Health Information. Journal of the American Medical Informatics Association Mar 1999, 6 (2) 122-133; DOI: 10.1136/jamia.1999.0060122 Retrieved from http://jamia.oxfordjournals.org/content/6/2/122</ref>
  
 +
== References ==
 +
<references/>
  
 +
== Second Review ==
 +
 +
The National Institute of Standards and Technology (NIST), the federal agency responsible for developing information security guidelines, defines information security as the preservation of data confidentiality, integrity, availability, which is commonly referred to as the “CIA” triad.
 +
<ref name ="Laurinda 2012"> Laurinda, 2012. AMA Journal of ethics. September 2012, Volume 14, Number 9: 712-719. http://journalofethics.ama-assn.org/2012/09/stas1-1209.html</ref>
 +
 +
== Reference ==
  
== References ==
 
 
<references/>
 
<references/>

Latest revision as of 10:09, 20 November 2015

System Security- The totality of safeguards including hardware, software, personnel policies, information practice policies, disaster preparedness, and oversight of these components.

Security protects both the system and the information contained within from unauthorized access from without and from misuse from within.

Security enables the entity or system to protect the confidential information it stores from unauthorized access, disclosure, or misuse, thereby protecting the privacy of the individuals who are the subjects of the stored information.[1]

References

  1. Suzy A. Buckovich , Helga E. Rippen , Michael J. Rozen. Driving Toward Guiding Principles A Goal for Privacy, Confidentiality, and Security of Health Information. Journal of the American Medical Informatics Association Mar 1999, 6 (2) 122-133; DOI: 10.1136/jamia.1999.0060122 Retrieved from http://jamia.oxfordjournals.org/content/6/2/122

Second Review

The National Institute of Standards and Technology (NIST), the federal agency responsible for developing information security guidelines, defines information security as the preservation of data confidentiality, integrity, availability, which is commonly referred to as the “CIA” triad. [1]

Reference

  1. Laurinda, 2012. AMA Journal of ethics. September 2012, Volume 14, Number 9: 712-719. http://journalofethics.ama-assn.org/2012/09/stas1-1209.html