Top Banner
Personal data security in telemedicine M. Grayvoronskyy, A. Novikov NTUU “KPI”, Kiev, Ukraine
11

Personal data security in telemedicine M. Grayvoronskyy, A. Novikov NTUU “KPI”, Kiev, Ukraine.

Dec 26, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Personal data security in telemedicine M. Grayvoronskyy, A. Novikov NTUU “KPI”, Kiev, Ukraine.

Personal data security in telemedicine

M. Grayvoronskyy, A. Novikov NTUU “KPI”, Kiev, Ukraine

Page 2: Personal data security in telemedicine M. Grayvoronskyy, A. Novikov NTUU “KPI”, Kiev, Ukraine.

Characteristics of the information

Confidentialityonly authorized persons may become familiar with the

information

Integrityonly authorized persons may in any way modify the information

Accessibilityany authorized object may obtain data within the certain (short)

time interval

Page 3: Personal data security in telemedicine M. Grayvoronskyy, A. Novikov NTUU “KPI”, Kiev, Ukraine.

Teleworkers

Remote SitesCentral Sites

ATM / FR / ISDN

WANRouter

Network Reference Model

PBX

Hub

IPTGateway

Hub

PSTN

Router

WAN

Violator (internal)

L3 SwitchL2

Switch

PBX

Violator (External)

Internet

WAN Router/IPT Gateway

Page 4: Personal data security in telemedicine M. Grayvoronskyy, A. Novikov NTUU “KPI”, Kiev, Ukraine.

Confidentiality

The violation of confidentiality (privacy): disclosure of information Typical ways for disclosure of information: – “sniffing”: listening of the data transmitted via a

telecommunication channel– “spoofing”: an authorized object of

telecommunication exchange is substituted by an unauthorized object

Page 5: Personal data security in telemedicine M. Grayvoronskyy, A. Novikov NTUU “KPI”, Kiev, Ukraine.

TeleworkersSpoofing

Sniffing

WANRouter

Violation of confidentiality

HubHub

WANL3 Switch

L2Switch

Internet

WAN Router/IPT Gateway

Router

Page 6: Personal data security in telemedicine M. Grayvoronskyy, A. Novikov NTUU “KPI”, Kiev, Ukraine.

Integrity

The violation of integrity: – partial or complete loss of the information– falsification of data

Hub

WAN Router/IPT Gateway

Router

Page 7: Personal data security in telemedicine M. Grayvoronskyy, A. Novikov NTUU “KPI”, Kiev, Ukraine.

Accessibility

The violation of accessibility: denial of service (DoS) attacks

Hub

WAN Router/IPT Gateway

Router

Page 8: Personal data security in telemedicine M. Grayvoronskyy, A. Novikov NTUU “KPI”, Kiev, Ukraine.

Methods of information protection

Authentication of objectsData ciphering (encryption)Signing of dataRedundancy and backup in storage of dataRedundant data channels

Page 9: Personal data security in telemedicine M. Grayvoronskyy, A. Novikov NTUU “KPI”, Kiev, Ukraine.

Virtual Private Networks

Public Internet(Untrusted network)

PrivatePublic

Private

Public

FR or Leased Line(Intranet, trusted private network)

Public WAN VPN(Dynamic routing over

encrypted tunnels)

Public WAN(Clear-text, static routing)

Private WAN(Clear-text or Encrypted

Routing - Static, RIP, OSPF)

Branch Office Tunnel

IP Phones

Video conference

Page 10: Personal data security in telemedicine M. Grayvoronskyy, A. Novikov NTUU “KPI”, Kiev, Ukraine.

Transport and Tunnel Mode

New IPHeader

Sec ProtocolHeader

Data

IP Header Data

Tunnel Mode

Original IPHeader

Sec ProtocolHeader

Transport Mode

Original IPHeader

Data

Encryption

Encryption

Outer IP Header

Inner IP Header

Page 11: Personal data security in telemedicine M. Grayvoronskyy, A. Novikov NTUU “KPI”, Kiev, Ukraine.

A good example: Nortel Networks Contivity

Mo

du

lar

Ser

vice

Op

tio

ns

Dec

reas

ed C

ost

Software License KeysSoftware License Keys

Firewall Firewall ServicesServices

VPN VPN ServicesServices

Adv Adv RoutingRouting

Base ServicesBase Services

Contivity can function as – VPN device– Router – Firewall– Or any combination