What people are saying - Write a review
We haven't found any reviews in the usual places.
Nine Principles for the Security of lnformation
Cyberspace Security Threats
4 other sections not shown
Other editions - View all
837 version Access Control administrative agencies areas ASC X12N attack audit authentication clinical Code Sets communication confidentiality contingency plan Cooperation Council of Europe crime criminals critical infrastructure cybercrime cybersecurity cyberterrorism and cyberwarfare data protection Determine impact develop Digital signature documented electronic signature ensure European European Commission European Union facilities File integrity checkers hackers harm health information health plan health services healthcare information healthcare organizations healthcare providers HIPAA HlPAA identify implemented information assurance information systems information technology integrity interception limitations and constraints listed features lnformation Assurance lnformation Systems lnternet maintenance operation participants password Password cracking patient personnel Physical security potential processes Program requirements response risk analysis risk assessment risk management safeguards sector security and privacy security of information security policies security risk significant limitations standards systems and networks systems security testing Threat Agents transactions U.S. dollars Unauthorized access Unpredictable vendors