Implementing Information Security in Healthcare: Building a Security Program (Ebook PDF) – Digital Instant Dowload.
Product details:
- ISBN-10 : 1938904346
- ISBN-13 : 978-1938904349
- Author: Terrell W. Herzig, MSHI, CISSP
Implementing Information Security in Healthcare: Building a Security Program offers a critical and comprehensive look at healthcare security concerns in an era of powerful computer technology, increased mobility, and complex regulations designed to protect personal information. Featuring perspectives from more than two dozen security experts, the book explores the tools and policies healthcare organizations need to build an effective and compliant security program.
Topics include information security frameworks, risk analysis, senior management oversight and involvement, regulations, security policy development, access control, network security, encryption, mobile device management, disaster recovery, and more. Information security is a concept that has never been more important to healthcare as it is today. Special features include appendices outlining potential impacts of security objectives, technical security features by regulatory bodies (FISMA, HIPAA, PCI DSS and ISO 27000), common technical security features, and a sample risk rating chart.
Table contents:
Chapter 1: The Importance of Information Security in Healthcare,
Chapter 2: Information Security Frameworks,
Chapter 3: Information Security Planning,
Chapter 4: Risk Analysis,
Chapter 5: Senior Management Oversight and Involvement,
Chapter 6: Information Security Regulations,
Chapter 7: Security Policy Development,
Chapter 8: The Concept of Security Controls
Chapter 9: Access Control,
Chapter 10: Network Security,
Chapter 11: Use of Encryption,
Chapter 12: Managing Mobile Devices,
Chapter 13: Application Security,
Chapter 14: Information Security Operations,
Chapter 15: Security Considerations in Technology Contracting,
Chapter 16: Business Continuity and Disaster Recovery,
Chapter 17: Change Control and Change Management,
Chapter 18: Testing Your Technical Controls,
Chapter 19: Auditing Your Program,
Chapter 20: Incident Handling,
Chapter 21: Information Systems Implementation