Target

Scope of this course is to provide an overview on the architectures of applications and on the means of integrating them. Despite the high technical focus of this course also calculations of operational costs, leverage potential of system integration, outsourcing and migration strategies will be discussed.

Description

This course examines different threat scenarios and identifies weaknesses in technology and security awareness. Strategies and technologies to limit the risks are discussed as well as an update on the legal situation is given.

Description

This course examines different threat scenarios and identifies weaknesses in technology and security awareness. Strategies and technologies to limit the risks are discussed as well as an update on the legal situation is given.

Target

Upon completion of this course the students should be able to

  • Explain the basics of symmetric and asymmetric encryption, public key infrastructures
  • Rate the underlying algorithms (MD5, 3DES etc.) and applying technologies and protocols (VPN, Ipsec etc.)
  • Differentiate LAN, WAN, WLAN scenarios
  • To apply appropriate security mechanisms, also in combination with digital signatures
  • Mention the most relevant norms and guidelines(EU but also US e.g. HIPAA, 21CRF11) and health care specifics
  • Know which products, help and services are available (certification, intrusion detection, firewalls)
  • Judge the risks of internal attacks and potential threats by own employees (social hacking)
  • Encryption of XML

 

Literatur

Detailansicht
   Trefferliste   " src="http://www.buchkatalog.de/images/pfeil_rechts.gif" border=0>
Datenschutz und Datensicherheit im Gesundheits- und Sozialwesen, m. CD-ROM.
Kartoniert
Hrsg. v. Christian Bake, Bernd Blobel u. Peter Münch 2., aktualis. u. überarb. Aufl. V, 274 S. 21 cm 400g  
2004   Datakontext
ISBN 3-89577-293-3 | KNV-Titelnr.: 10464825

 

Target

Upon completion of this course the students should be able to

  • Explain the basics of symmetric and asymmetric encryption, public key infrastructures
  • Rate the underlying algorithms (MD5, 3DES etc.) and applying technologies and protocols (VPN, Ipsec etc.)
  • Differentiate LAN, WAN, WLAN scenarios
  • To apply appropriate security mechanisms, also in combination with digital signatures
  • Mention the most relevant norms and guidelines(EU but also US e.g. HIPAA, 21CRF11) and health care specifics
  • Know which products, help and services are available (certification, intrusion detection, firewalls)
  • Judge the risks of internal attacks and potential threats by own employees (social hacking)