What is a HIT Security Firewall?

Understanding Concepts and Terms

By Dr. Richard J. Mata; MIS

www.HealthcareFinancials.com

Firewalls are devices or systems that control the flow of health information network traffic between networks or between a host and a network. A firewall acts as a protective barrier because it is the single point through which communications pass. Internal information that is being sent can be forced to pass through a firewall as it leaves a network or host. Incoming data can enter only through the firewall.

www.HealthDictionarySeries.com

The Federal publication NIST Special Publication 800-41, Guidelines on Firewalls and Firewall Policy provides details of firewalls and firewall product selection that are beyond the scope of this post.

Implications Beyond Internet Connectivity

While firewalls and firewall environments are often discussed in the context of Internet connectivity, firewalls have applicability in network environments beyond Internet connectivity.

For example, many corporate healthcare enterprise intranets employ firewalls to restrict connectivity to and from internal networks servicing more sensitive functions, such as the accounting or personnel department. By employing firewalls to control connectivity to these areas, an organization can prevent unauthorized access to the respective systems and resources within the more sensitive areas. The inclusion of an internal firewall environment can therefore provide an additional layer of security that would not otherwise be available.

Imperfect Security

Although firewalls afford protection of certain resources within an organization, there are some threats that firewalls cannot protect against: connections that bypass the firewall, new threats that have not yet been identified, and viruses that have been injected into the internal network.

Assessment

It is important to remember these shortcomings because considerations will have to be made in addition to the firewall in order to counter these additional threats and provide a more comprehensive security solution.

Conclusion

Join Our Mailing List

So, tell us what you think about this information. Feel free to review our top-left column, and top-right sidebar materials, links, URLs and related websites, too. Then, be sure to subscribe to the ME-P. It is fast, free and secure.

Get our Widget: Get this widget!

Our Other Print Books and Related Information Sources:

Practice Management: http://www.springerpub.com/prod.aspx?prod_id=23759

Physician Financial Planning: http://www.jbpub.com/catalog/0763745790

Medical Risk Management: http://www.jbpub.com/catalog/9780763733421

Healthcare Organizations: www.HealthcareFinancials.com

Health Administration Terms: www.HealthDictionarySeries.com

Physician Advisors: www.CertifiedMedicalPlanner.com

Subscribe Now: Did you like this Medical Executive-Post, or find it helpful, interesting and informative? Want to get the latest ME-Ps delivered to your email box each morning? Just subscribe using the link below. You can unsubscribe at any time. Security is assured.

Link: http://feeds.feedburner.com/HealthcareFinancialsthePostForcxos

Sponsors Welcomed

And, credible sponsors and like-minded advertisers are always welcomed.

Link: https://healthcarefinancials.wordpress.com/2007/11/11/advertise

One Response

  1. Dear ME-P Readers and Staff

    I found this today.

    http://www.acorn-online.com/joomla15/thereddingpilot/news/localnews/48332-police-warn-be-on-alert-for-computer-phishing-scam.html

    Police warn: Be on alert for computer phishing scam

    Written by Officer Christopher McManus

    Wednesday, 03 February 2010 11:41

    What is a phishing scam? This is an old sleight-of-hand trick that criminals have adapted to the online cyber world. How the scam works is simple. You go to a Web site to check your e-mail, pay a bill, or buy an item. Most Web sites you have an account with require you to put in a username and a password.

    The problem starts when the Web site you went to is a fake site, designed to look just like your e-mail, store, or even bank account. You think you’re looking at the real Web site, but it is a replica designed for only one purpose, to have you enter in your Susanne and password, or other sensitive information. Once that data is captured, the criminals have everything they need to steal your identity. By the time you discover the crime, the criminals have already taken what they wanted and moved on to other victims. The criminal is almost impossible to find, because many of these crimes are committed from another country.

    The first question you’re asking is how I got to this fake Web site in the first place. The most common mistake people make on the computer is clicking on a Web site link in an e-mail they received, or off a search engine such as Google. You’re confused because you have a good virus scanner installed on your computer. Unfortunately, a virus scanner can’t stop you from clicking on that link.

    This can happen to anyone, as it recently did for a Redding family. In this case, the family member was somehow directed to a fake SBC Yahoo e-mail login page. Once the user name and password were entered, the criminals used that information to log in to that e-mail account. The criminal then sent an e-mail to every contact in the SBC Yahoo e-mail account masquerading as the Redding family, saying they were away in another country, had been robbed, and asked for money to be sent to an overseas Western Union account to help them out. With more than 70 contacts in their list, the criminals are hoping for just one person to take the plea for help seriously and send the money.

    How can you protect yourself from going to these fake Web sites? Here are a couple of tips:

    First, never click on a link to a Web site from an unknown e-mail source or search engine for any of your important accounts, such as e-mail services, banks, stores, and anything you may have an account with. A good practice to get into is typing out the proper Web address in your Web browser. Once you have reached the legitimate site, bookmark it. You can always go to your bookmarks in the future.

    Once you have entered in the Web address, check the spelling before you go to the site. Criminals take advantage of spelling mistakes by creating fake sites on Web addresses that are spelled wrong.

    Always check the monthly statements for illegal activity on all your accounts. The sooner you discover something wrong, the quicker you can protect yourself from identity theft.

    Finally, if you’re new to the cyber world, check with your local schools, colleges, or libraries. There are classes available to develop your computer skills and make you more aware of the online dangers we face today.

    ——————————————————————————–

    Christopher McManus is a Redding police officer and the department’s IT specialist.

    Like

Leave a comment