Abstract
As health care organizations continue on the path toward total digital operations, a topic often raised but not clearly understood is that of computer security. The reason for this is simply the vastness of the topic. Computers and networks are complex, and each service offered is a potential security hole. This article describes for the lay person the fundamental points of computer operation, how these can be points attacked, and how these attacks can be foiled—or at least detected. In addition, a taxonomy that should aid system administrators to evaluate and strengthen their systems is described.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
Makris L, Argiriou N, Strintzis M: Network and data security design for telemedicine applications. Med Informatics 22:133–142, 1997
Willenberg C: Strategy for securing medical documents by electronic signature and encryption. Radiology 37(4):305–312, 1997
Summers R: An overview of computer security. IBM Systems J 23:309–325, 1984
Wouters P: Designing a safe network using firewalls. Linux J 40:32–38, 1997
Thomas RO: Haunted by the ghost of smurfing. Sys-Admin 7:63–64, 1999
Stewart D, Maginnis P, Simpson T: Who is at the door: The SYN denial of service. Linux J 38:12–16, 1997
Brotzman L: Wrap a security blanket around your computer. Linux J 40:17–23, 1997
Corcoran D, Sims D, Hillhouse B: Smart cards and biomentrics: Your key to PKI. Linux J 59:68–71, 1999
Garfinkel S: PGP: Pretty Good Privacy. Sebastopol, CA, O’Reilly & Associates, www.oreilly.com
Scott C, Wolfe P, Erwin M: Virtual Private Networks (ed 2) Sebastopol, CA, O’Reilly & Associates, www.oreilly.com
Garfinkel S, Spafford G: Practical UNIX & Internet Security (ed 2). Sebastopol, CA, O’Reilly & Associates, www.oreilly.com
Stallings W: Network and Internetwork Security Principles and Practice. Newark, NJ, Prentice Hall, 1995
Schneier B: The IDEA encryption algorithm. Dr Dobb’s J 18:50–56, 1993
Stallings W: Pretty good privacy. ConnecXions 8:2–11, 1994
Giles B: Encrypted file systems. Linux J 51:64–67, 1997
Mauriello E: TCFS: Transparent cryptographic file system. Linux J 40:64–68, 1997
Richter J, Cabrera L: A file system for the 21st century: Previewing the Windows NT 5.0 file system. Microsoft Systems J November 1998
Whalin G: Virtual private networks. Sys-Admin 7:21–26, 1999
Stein JG, Neuman C, Schiller JL: Kerberos: An Authentication Service for Open Network Systems. USENIX Conference Proceedings, Dallas, TX, Winter 1998
Fenzi K, Wreski D: Linux Security HOWTO, 1998. http://metalab.unc.edu/mdw/HOWTO/Security-HOWTO.html
Havelt R: SATAN: Analyzing your network. Linux J 40:77–78, 1997
Ali S: Freeware based security. Sys-Admin 8:39–44, 1999
Fenzi K: Tripping up intruders with tripwire. Linux J 40:75–76, 1997
Russinovich M: NT vs. UNIX: Is one substantially better? Windows NT 4:121–132, 1998
Hare C: IT Security coming of age. Sys-Admin 7:57–64, 1998
Epstein MA, Pasieka MS, Lord WP, et al: Security for the digital information age of medicine: Issues, applications, and implementation. J Digit Imaging 11:33–44, 1998
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Langer, S., Stewart, B. Aspects of computer security: A primer. J Digit Imaging 12, 114–131 (1999). https://doi.org/10.1007/BF03168630
Issue Date:
DOI: https://doi.org/10.1007/BF03168630