Saturday, November 13, 2010

Blog Entry 7.1 Securing Informations Systems

There are several primary threats to IS security Accidents and Natural Disasters, Employee and Consultants, Links to outside business contacts, and outsiders ie. hackers, and viruses and or malicious code. By implementing various security systems to secure access, data, and usage, we at ferrum Medical can effectivly deter the damage possible by malicious intent. By safeguarding all of our data and usage with the use of a combination of hardware and software based firewalls as wells as anti-viral and anti-malicious code software; to allow for safe user environmental which doesn't allow for tampering or infection of the database. The IS is also safeguarded by a user time limit, so that after a certain preprogrammed amount of time has elapsed,  the session becomes inactive and the user is logged out to avoid any potential tampering under a logged in account.Through the use of specialized authentication hardware and software, Ferrum medical can ensure that the users accessing the server through the online site or through the in house terminals are authorized to have access. The access is divided into types and location. For one, only secure data can be accessed onsite, and not sensitive data such as appointment data being viewed by a patient can be viewed outside as well as in side the site. There are administrator, employee, and client types of access. The administrator, being the person who runs the business of Ferrum Medical, has complete access to all data, but sensitive data can only be accessed from a terminal located within the physical building. The Employee has access to all patient, and appointment data as well as supply and prescirption requisition, and the ability to edit any of said data. And the Client level access is to allow the patient to view all their personal data and appointments, only allowing them to access and edit such things as address and to apply for an appointment. Also through the use of human verification and biometrics the system is also made much more secure.

No comments:

Post a Comment