| Literature DB >> 10461574 |
Abstract
As health care organizations continue on the path toward total digital operations, a topic often raised but not clearly understood is that of computer security. The reason for this is simply the vastness of the topic. Computers and networks are complex, and each service offered is a potential security hole. This article describes for the lay person the fundamental points of computer operation, how these can be points attacked, and how these attacks can be foiled--or at least detected. In addition, a taxonomy that should aid system administrators to evaluate and strengthen their systems is described.Entities:
Mesh:
Year: 1999 PMID: 10461574 PMCID: PMC3452437 DOI: 10.1007/bf03168630
Source DB: PubMed Journal: J Digit Imaging ISSN: 0897-1889 Impact factor: 4.056