18
What is an EHR? What is an EHR? The EHR is a longitudinal electronic record of a patient health information generated by one or more encounters in any care delivery setting.

Electronic health records

Embed Size (px)

DESCRIPTION

The EHR is a longitudinal electronic record of a patient health information generated by one or more encounters in any care delivery setting. This Presentation Will tell what is EHR and Why Security of EHR Is Needed ?

Citation preview

Page 1: Electronic health records

What is an EHR?What is an EHR?

The EHR is a longitudinal electronic record of a patient health information generated by one or more encounters in any care delivery setting.

Page 2: Electronic health records

Advantages of EHRAdvantages of EHRCost can be reducedQuality of care can be improved

Record can be kept easilyMobility

Page 3: Electronic health records

Why Security of EHR Is Why Security of EHR Is Needed ?Needed ?

INSIDER ATTACKS

An Insider attack occurs when employees with legitimate access to their organization

information systems use these systems to sabotage their

organization IT infrastructure or commit fraud.

Page 4: Electronic health records

SOFTWARE SECURITY REQUIREMENTS

SOFTWARE SECURITY REQUIREMENTS

Use cases

Misuse cases

It specifies a negative use case i.e. behavior that is not allowed in the proposed system.

It is a description of the possible sequences of interactions between the system and it’s external actors.

Page 5: Electronic health records

Certification of EHR Certification of EHR SystemsSystemsIts certification began in 2006

It is primarily conducted by the Certification Commission of Healthcare IT (CCHIT)

Page 6: Electronic health records

Why EHR Systems Are Attacked ?

For Health Records

For ServiceFor Identity And Billing Information

Page 7: Electronic health records

Exploits Done On Targeted

Applications

Exploits Done On Targeted

Applications

Implementation Bugs

Design Flaws

They are code level software problems.

They are high-level problems associated with the architecture and design of the system.

Page 8: Electronic health records

Implementation Bugs Session Hijacking

Cross-Site Scripting

Phishing

SQL Injections

PDF ExploitsDenial of Service: File Uploads

Authorization Failure

Page 9: Electronic health records

SQL InjectionsSQL Injections

In this, an attacker exploits a lack of input validation to force unintended system behavior by inserting reserved words or characters into input fields that will alter the logical structure of a SQL statement.

Page 10: Electronic health records

Performed on

Admin Login - Amskrupajal.orgwww.giantstudios.com/buy-soft/adminlogin.aspwww.quickwrench.net/

Page 11: Electronic health records

Cross-Site Scripting

Cross-Site Scripting

It’s a computer security vulnerability that enables malicious attackers to inject client side script into web-page viewed by other users.

Page 12: Electronic health records
Page 13: Electronic health records

Denial of Service: File Uploads

Denial of Service: File Uploads

In this the attacker changes the state of web server to slow or unresponsive.

Page 14: Electronic health records

PhishingPhishing

It is an attempt to acquire sensitive information such as user names, passwords etc. by masking as a trustworthy entity.

Page 15: Electronic health records

Lack of Authorization

control

Lack of Authorization

control

In this the patient’s confidential health records and personal identification information can be viewed by the attacker.

Page 16: Electronic health records

ConclusionConclusion

The EHR will soon have ….

Better privacy and security protections …

Information will be available when we need it …

Page 17: Electronic health records

BibliographyBibliography1) Research paper

2) http://www.ncrr.nih.gov/publications/informatics/ehr.pdf

3) http://www.hhs.gov/health/healthnetwork/background/

4) Wikipedia.

5)http://mhcc.maryland.gov/electronichealth/mhitr/EHR

%20Links /challenges_to_ehr.pdf

7) www.drivencompany.com/nist.cfm

8) http://go4webapps.com/2010/04/24/webscarab-web-security-

application-testing-tool/ 

Page 18: Electronic health records

THANK YOU

Submitted by:

Shivani TyagiAnurag Deb