Healthcare data security and privacy are major concerns for developers, users an
ID: 3742888 • Letter: H
Question
Healthcare data security and privacy are major concerns for developers, users and consumers of health IT. How do we prevent unauthorized access to healthcare data? There are three categories of authentication: something one knows, something one has or something that one is. Provide an example of each one and perform a web search for cutting-edge methods of authentication such as voice imprints. Healthcare data security and privacy are major concerns for developers, users and consumers of health IT. How do we prevent unauthorized access to healthcare data? There are three categories of authentication: something one knows, something one has or something that one is. Provide an example of each one and perform a web search for cutting-edge methods of authentication such as voice imprints.Explanation / Answer
Role of Data Security and Privacy in Healthcare sector:
Healthcare industry a billionaire industry which provides a employment to the millions of professional across the world and going increases with advancements. Hospitals across the globe are going through a rapid changing scenario from paper-based manual information processing to Electronic form information system. Using digital data widespread in healthcare industry has provided potentially uncountable benefits by instant access to patient’s historical health data from anywhere in the world. It saves a lot of time and makes a doctors or professional to keep updated and makes work more approachable to health data access of the patient. Database of Patients that is stored with the healthcare industry is not only with their health issues but also having personal details including their bank accounts, contact information and addresses which are also at higher risk. Sharing and availability of healthcare data over the Internet put the data vulnerable, security threats and risk the privacy of patients.
Prevention of unauthorized access to healthcare data:
There are some methods in order to prevent the unauthorized access to healthcare data and its security:
1. Authentication: Authentication is the foremost step in order to stop the unauthorised person to read, access, modify or delete the data of the health details and other information of the person. It plays a vital role in the data protection and privacy. It works on the network security with proper tools and other mechanism to prevent fraudulent to access the information.
2. Encryption: Data encryption is also other effective and efficient way to preventing unauthorized access of data. It encrypts the data of the patient by using several algorithm which are not human readable and stored on the database in the encrypted form and converts to human readable only by the decryption process by following the algorithm. It provides the safety and security to the database if unauthorised user entered into the system.
3. Data Masking: Masking or replaces the sensitive data with some unidentifiable value, which is not an encryption so, the original values cannot returned because decryption process is absent here. Data masking is like using some identifiers like name, social security number, patient code etc.
Three main categorises of authentication:
The authentication for the database access to avoid any fraudulent, which are commonly known and already in use but there are some other authentication methods which are yet to use.
1 & 2. Something one knows and one has:
Biometrics System
The term “biometrics” means “measuring life”. It normally identifies the physical attributes of a user to authenticate their identity. Two people never share the same and exact same physical appearance and traits. For instance fingerprint identification, voice recognition, retinal and iris scans and face recognition. It is one of the common and most widely used systems across the world and act as the secure authentic the authorized person to access the data.
Authentication by Token
A token is a physical material that is used to access secure systems. Commonly in the form of device like a dongle, card or RFID chip. It provides another level of security it makes it more difficult for a unauthorised user to access an account with token and credentials.
3. Something that one is:
Multi-Factor Authentication (MFA)
MFA is an authentication design that requires more than one independent ways of verifying an identity. For instance, authorised user possesses a combination of physical token with some inherent traits like biometric. ATM’s are prime examples of MFAs because you need a card (physical token) and a PIN (something known) in order to place transaction.
Biometric Authentication with Chatbots
A chatbot is a computer program that can communicate in written form in a way like simulates human conversation. Authenticating during a text chat, such as by using keystroke dynamics and even face biometrics, can make chatbots more useful for applications where security is needed.
Continuous Authentication
A real time authentication tends to more secure, biometric modalities such as keystroke dynamics and facial recognition analysis have introduced the concept of continuous authentication.
For instance, while typing information into a system, entering PIN can be analyzed in real time to detect any anomalies that indicate a fraudulent user. If there is a deviation that indicates a change in identity of the user, your session may be expired.
Invisible Authentication
Invisible biometric authentication makes a reality for background authentication which is invisible to the user without the active participation of the user and secures the system at the same time.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.