Hayam A
Information Technology Systems Security, Jerusalem, Israel.
Int J Biomed Comput. 1994 Feb;35 Suppl:115-27.
As dependence upon interorganizational and international health care informatics becomes absolute, and with increased vulnerability of information networks and applications and the cunning sophistication of computer criminals, it becomes imperative to implement tight information systems security to ward off any possible threat to these vital life-dependent information systems. In a rapidly decentralizing environment, the author proposes centralized security control, implemented in a Security Audit Center under the direct supervision of an Information Systems Security Manager who is a high-ranking organization staff member. Of the various components of the Security Audit Center, the most significant is the security audit expert systems which analyze audit data files according to security rules and present a precise status of systems security and realtime suspicion alert of the various breaches and intrusions.
随着对组织间和国际医疗保健信息学的依赖变得绝对,以及信息网络和应用程序的脆弱性增加,再加上计算机犯罪分子的狡猾 sophisticated,实施严格的信息系统安全措施以抵御对这些至关重要的依赖生命的信息系统的任何可能威胁变得势在必行。在一个迅速分散的环境中,作者提议实施集中式安全控制,由信息系统安全经理(一名高级组织工作人员)直接监督的安全审计中心来执行。在安全审计中心的各个组成部分中,最重要的是安全审计专家系统,它根据安全规则分析审计数据文件,并呈现系统安全的精确状态以及对各种违规和入侵的实时可疑警报。