Computer Network Security for the Radiology Enterprise

Special Review
John Eng, MD
Index terms:
Computers
Digital imaging and communications
in medicine (DICOM)
Internet
Intranet
Picture archiving and communication
system (PACS)
Teleradiology
Published online: July 19, 2001
10.1148/radiol.2202001609
Radiology 2001; 220:303–309
Abbreviations:
DICOM ⫽ Digital Imaging and
Communications in Medicine
HCFA ⫽ Health Care Financing
Administration
HIPAA ⫽ Health Insurance Portability
and Accountability Act
PACS ⫽ picture archiving and
communication system
VPN ⫽ virtual private network
1
From the Russell H. Morgan Department of Radiology and Radiological
Science, Johns Hopkins University
School of Medicine, 600 N Wolfe St,
Central Radiology Viewing Area, Rm
117, Baltimore, MD 21287. Received
June 5, 2000; revision requested July
10; revision received November 6; accepted November 20. Address correspondence to the author (e-mail:
[email protected]).
©
RSNA, 2001
Computer Network Security
for the Radiology Enterprise1
As computer networks become an integral part of the radiology practice, it is
appropriate to raise concerns regarding their security. The purpose of this article is
to present an overview of computer network security risks and preventive strategies
as they pertain to the radiology enterprise. A number of technologies are available
that provide strong deterrence against attacks on networks and networked computer systems in the radiology enterprise. While effective, these technologies must
be supplemented with vigilant user and system management.
Computer networks are becoming an integral part of many radiology practices, being a
critical component in strategies for growth of radiology practices to an enterprise level and
in enhancing their workflow efficiency. The shareability, standardization, and geographic
independence provided by computer networks have made them a highly successful
method for transmitting data among medical image acquisition modalities, image display
workstations, and other computer equipment. However, these favorable characteristics are
also responsible for substantial security risks.
While computer network security is a complex, often arcane subject, a basic understanding
of security threats is helpful in making appropriate strategic decisions about allocating resources to deal with the problem. The purpose of this review is to provide a basic understanding of the security concepts and risks that arise when computers are connected to networks,
and special attention is paid to radiology applications. An attempt is made to avoid advanced
technical details that are thoroughly presented in numerous books (1,2) and articles (3). As in
other aspects of computer networking, the subject of security is rapidly evolving. One of the
most valuable sources of up-to-date advisories, reports, and technical tips is the CERT Coordination Center (4), a major Internet security clearinghouse funded by the U.S. government.
Computer network security can be divided into two major categories. One category
concerns the protection of computer systems against access by unauthorized users. For
convenience, in the following discussion this category will be referred to as access security.
The second category concerns the protection of data transmission against electronic
eavesdropping, content alteration, and faking of the identity of the sender. This category
will be referred to as data security. While it can be correctly argued that access security
involves computer systems and not necessarily computer networks, access security deserves to be included in any discussion of network security, because the network is a
common source of breaches of access security.
This review will not address some important topics in computer security that are not
directly related to networks, particularly the protection against accidental risks such as
computer hardware failure, electric outages, air conditioning failure, fire, and natural
disasters. However, these concerns must be addressed in any location in which data are
stored, despite the exclusion of these topics from the present discussion.
The discussion of access security will be divided into two major categories of networked
computing environments from which security threats originate: the internal institution
network, often called the intranet, and the external public Internet. Attention will be given
to how these environments relate to radiology practice. Data security will be discussed in
the context of teleradiology, a common network application in radiology. Some general
recommendations will be offered.
It will be apparent that user and system management is critical in many, if not all,
security strategies, despite the relatively unassuming connotation of these terms. User
management refers to the continuous active monitoring of users who are allowed to access
the computer system and to the control of privileges assigned to these users. System
management refers to the active ongoing maintenance of the computer and network
303
systems. Competent user and system
management requires the devotion of
tangible human and capital resources.
INTERNAL THREATS TO THE
ACCESS SECURITY OF A
COMPUTER NETWORK
Address Spoofing
The Digital Imaging and Communications in Medicine (DICOM) standard (5)
is the one most commonly implemented
in medical imaging equipment. However, it is a standard for only data communication; therefore, access security at
the user level is beyond the scope of
DICOM. When one DICOM device connects to another, there is no requirement
for positive user identification such as
password confirmation. Most DICOM devices provide an informal measure of access security by only allowing connections from certain DICOM devices from a
predetermined list of network addresses.
It is sometimes possible, however, for a
computer to be configured in such a way
as to impersonate the network address of
another. This practice is called address
spoofing, and it is difficult to detect.
The simplest method of address spoofing is physically unplugging a computer
from the network and substituting another
computer from which an attack can be
mounted. Ordinary physical security (eg,
locked doors, security guards) is an important method of guarding against this type
of address spoofing. However, more sophisticated methods of address spoofing
do not require physical disconnection of
the impersonated computer.
In some networks, such as those in
which the dynamic host configuration
protocol (known as DHCP) is used, the
network address of each device is assigned whenever needed, and it is not
fixed. Therefore, reliance on network addresses as a way to identify authorized
connections may not be feasible in some
networks. The security supplement (6) recently adopted into the DICOM standard
includes provisions for access security between two DICOM devices that do not
rely on network address identification.
However, as mentioned previously, these
provisions do not extend to the user
level.
Sniffing
To communicate with one another
within an institution, computers are
commonly connected together with networks that are based on the Ethernet
standard. It is important to realize that
304
䡠
Radiology
䡠
August 2001
Ethernet is a shared network technology
composed of network segments in which
every computer is connected to essentially the same wire. Any data traveling
along a segment of an Ethernet network
are potentially readable by any computer
connected to that segment (Fig 1). This
sharing is used so that one wire can serve
many computers, and it is a major reason
for the popularity and cost-effectiveness
of Ethernet. This sharing is also responsible for unintentional security risks.
With ordinary operation, each computer on an Ethernet network segment
allows entry only of data addressed to it.
For some computers, however, programs
are available that allow the computer to
accept all data traveling on the Ethernet
network segment, regardless of the intended destination. This practice is called
“sniffing.” Since connections between
computers are usually not encrypted,
sniffing can be used to intercept sensitive
information, such as patient identification information contained in a DICOM
header. Since data transmitted over an
Ethernet network often cross several network segments between the source and
destination, sniffing is not limited to
data traveling between computers on the
same segment.
While fundamentally a problem of
data security, sniffing profoundly affects
access security. It is a particularly insidious problem because it can be used to
gain unauthorized access to other computers on the network. When a user logs
in to any computer over the network, a
user name and password is typically required. Because user names and passwords are usually not encrypted when
they are transmitted over a network, they
are vulnerable to discovery through sniffing. Software for sniffing passwords is
readily available. Armed with these passwords, an attacker could have access to
private information that is stored in patient information systems, billing computers, medical image acquisition equipment, and so on. Because the attacker
knows the actual user names and passwords, detection of unauthorized use of
the compromised systems can be nearly
impossible. In the case of radiology
equipment, the problem can even extend
beyond the boundaries of the compromised institution, because some vendors
are known to use the same user name and
password at all installations.
Preventive measures against sniffing
ensure that each computer on the network is only exposed to data that are
meant for it. This is most effectively accomplished by implementing a switch-
Figure 1. Drawing of computer devices connected to a hypothetical Ethernet during normal operation. Data addressed to different
computer devices are represented by Œ, 䊐, and
F. Because of the shared architecture of Ethernet networks, each computer is exposed to all
data being carried on the network, regardless
of the intended destination of the data. In
normal operation, each computer is responsible for filtering out data not addressed to it.
controlled Ethernet network, in which
each computer is connected to the network by means of a switch (Fig 2). In a
switch-controlled network, the switches
send each computer only data destined
for that computer. Each computer on a
switch-controlled network is effectively
on its own segment. The major barriers to
implementing a switch-controlled network— equipment cost and complexity
of installation—are steadily decreasing.
The installation of Ethernet switches also
improves network performance by simplifying the network and reducing the
frequency of data collisions that would
otherwise occur with an Ethernet not
controlled by switches.
Eng
Figure 3. Drawing of an internal network connected to the Internet through a service provider.
As data travel over the Internet, data may pass through the routing computers of many Internet
service providers, each a potential target for attack.
Figure 2. Drawing of a switch-controlled Ethernet. Data addressed to different computer
devices are represented by Œ, 䊐, and F. The
switches on this network forward data to a
connected computer only if data are addressed
to that computer. Unlike an Ethernet not controlled by switches, it is not possible for a computer on a switch-controlled Ethernet to read
data not addressed to it.
In lieu of a switch-controlled network,
rigorous system management is necessary to prevent unauthorized use of network computers for sniffing. Policies and
practices of system management include
active monitoring of all networked computers for suspicious activity that might
indicate operation of a sniffing program,
forcing users to change passwords periodically and allowing administrator-level
(root) computer accounts to be accessed
only from the computer console and not
over the network. The latter measure ensures that the passwords associated with
omnipotent administrator accounts do
not travel over the network and therefore
cannot be discovered with sniffing.
Password encryption is another method
Volume 220
䡠
Number 2
for preventing breaches in access security
that result from the sniffing of passwords.
With this method, the passwords of users
logging in over the network are made unreadable through encryption before being
transmitted over the network. Unfortunately, standards for password encryption
have not been universally adopted.
Many important procedures for protecting confidential information, from
passwords to patient information, do not
rely on sophisticated technology. The
placement of workstations in nonpublic
locations, timed log off, and forced password changes are examples of simple
procedures that help to prevent unauthorized viewing of confidential information. The ultimate form of password
changing is the one-time password system, in which the user is given a small
electronic device that generates an unpredictable series of numeric passwords,
each only valid for a limited time, perhaps 60 seconds (7). Another way to protect passwords is to eliminate them by
implementing a biometric identification
system. In such a system, access is based
on a physical feature or repeatable action
such as fingerprint pattern, retinal scan,
or voiceprint.
Broadcast Data and Storm
It is important to note that a switchcontrolled network places no restrictions
on the flow of broadcast data, which are
data intentionally sent to every computer on the network. For example, networks often rely on broadcast data to
identify all computers on the network
and to monitor the status of every com-
puter. An attacker might use broadcast
data to determine the presence of systems that contain certain vulnerabilities,
or an attacker might initiate a broadcast
storm by sending out large amounts of
meaningless broadcast data to overload
and disable the network. A broadcast
storm is an example of compromise of
availability, a security issue distinct from
that of either access security or data security.
EXTERNAL THREATS TO THE
ACCESS SECURITY OF A
COMPUTER NETWORK
A radiology network may be connected
through an Internet service provider (Fig
3) for access to the many useful information resources on the Internet, such as
MEDLINE. Internet connectivity is also
useful in reverse: Productivity is enhanced with access to the radiology network from home for electronic report
sign off, teleradiology, and so on. With
the convenience of Internet accessibility,
however, the risk of attack increases dramatically because attacks against the radiology network can then be mounted
from literally any computer worldwide
that has Internet access.
Because computers on an institutional
network are often configured to allow
connections that originate only from
within the same network, it is relatively
difficult for an external attacker to engage directly in sniffing, spoofing, or
other malicious activity. Therefore, a
common method of breaking into a computer network is first to break into a com-
Computer Network Security for the Radiology Enterprise
䡠
305
puter within the targeted network. Once
compromised by an external attacker, the
computer can serve as an electronic disguise, giving the attacker privileges ordinarily reserved for computers within the
institution. With these privileges, an external attacker can use any of the methods described in the previous section,
thereby becoming an internal threat.
As with internal threats, prevention
of external threats begins with sound
user and system management. Attackers may access inactive user accounts
relatively unnoticed; therefore, these accounts should be deleted when their
rightful users are no longer present. Since
operating system flaws are commonly exploited by external attackers, system software on all computer systems should be
kept current. In picture archiving and
communication system (PACS) networks,
user management and appropriate software maintenance may be difficult because of the proprietary nature of many
of the applications and computer systems used by PACS vendors. In an environment in which user and system management is difficult, the problem of
security from external threats is usually
solved by means of implementing a network firewall (8).
A firewall is a computer device that has
two network connections: one to the internal network and one to the Internet
(Fig 4). For a firewall to be effective, no
other computer on the internal network
can be allowed to have a direct Internet
connection. The internal network is then
configured so that all data going to and
coming from the Internet passes through
the firewall. The firewall computer monitors all data traffic and is usually configured to allow only certain types of Internet traffic to pass through the firewall.
For example, a firewall may be configured
to allow only Web pages and e-mail to
pass. Remote logins and file transfers to
computers inside the firewall, which
might be used in network computer attacks, are usually not allowed to pass directly through the firewall.
While firewalls provide a substantial
amount of security to an internal network that contains computers at risk, it is
important to recognize the threats firewalls cannot prevent. Firewalls cannot
prevent attacks mounted from computers within the firewall. All of the previously discussed internal threats are unaffected. If a firewall allows unrestricted
connections from a trusted remote institution, then the local internal network is
immediately vulnerable to any and all
weaknesses of the network of the remote
306
䡠
Radiology
䡠
August 2001
Figure 4. Drawing depicts an internal network protected with a firewall. v represent data
from an attacker; Œ, 䊐, and F represent legitimate data. The firewall examines all data going
to and coming from the Internet. Potentially harmful data are not allowed to pass. For
example, data may be filtered if data originate from an unknown source or if the contents
appear suspicious.
institution. A password sniffing program
on the remote network would then be
effective, even if the local network were
impervious to sniffing.
A computer network may allow users
access by means of a direct modem connection. This is typically accomplished
by means of setting up a number of modems connected to a server, which is
connected to the internal network. This
modem pool effectively bypasses the security provided by a firewall. If an external attacker were to compromise the modem pool security and gain access to the
network, the attacker would gain network
access that is unrestricted by the firewall.
Prevention of such potential holes in the
firewall requires an institutional security
policy and the means to enforce it.
DATA SECURITY RISKS OF
TELERADIOLOGY
Teleradiology applications are often
limited by the speed of the data connection between the remote and main sites.
While dedicated high-speed data links
are available and offer a high degree of
security, their expense cannot be justified
for most teleradiology operations, which
typically involve a relatively modest volume of radiology images. The development of economical high-speed data
links, such as cable modems and digital
subscriber lines (known as DSL), has created the attractive possibility of using the
Internet instead of expensive dedicated
data links as the method of data communication. Network security issues associated with teleradiology also apply to
more complex enterprises, such as the
electronic exchange of patient information in health care organizations with
multiple inpatient and outpatient sites
that are distributed to many locations.
As medical images travel along the Internet, whether in a Web-based or other
format, the data pass through many routing computers. The computers of Internet service providers are a common target for attacks because of the potential
wealth of information carried by these
services. If any of these computers were
to be compromised, any sensitive data
passing through them, such as passwords
and account numbers, would be vulnerable to discovery by sniffing. The DICOM
data stream, in particular, contains patient identification information in plain
text, so DICOM communication over the
Internet poses a risk to patient privacy.
Since data security over the Internet
cannot be guaranteed, data encryption is
necessary for preventing the interception
of sensitive data such as identifiable patient information. In its fundamental
form, data encryption is the use of established cryptographic algorithms to mathematically transform the data, prior to
transmission, into a form that is unreadable without a private key. The private
key is usually a long sequence of numbers
known only to the sender and receiver.
Cryptography with private keys is severely hampered by the requirement for
prior exchange of private keys between
the sender and receiver, a process that is
potentially inconvenient and not secure.
To circumvent this problem, most current network-based encryption systems
Eng
implement some form of public key cryptography (9), a system in which the private key is known only to the recipient of
the data but not the sender. The sender
uses a different key, paired to the first, to
encrypt the data prior to transmission.
This second key is known as the public
key because it can be distributed publicly
without compromising the cryptographic
security of the system.
Public key cryptography works because
the public key can be used only to encrypt data and not decrypt it; decryption
can be accomplished only with the private key. Furthermore, the private key
cannot be derived from the public key,
and the public key works only with its
paired private key. With this arrangement, anyone can send encrypted messages to a particular recipient without
knowing any private keys.
Data encryption was recently adopted
as a supplement to the DICOM standard
(6), but conformance is voluntary, and it
is likely that uniform implementation by
vendors is years away. This supplement
to DICOM supports data privacy through
encryption, as well as access security at
the machine level; but as mentioned previously, access security at the user level is
beyond the scope of DICOM.
In addition to privacy, another important aspect of data security is data integrity, the assurance that the data have not
been altered without authorization. Public key cryptography can be adapted to
ensure data integrity with the implementation of encrypted digital signatures (9).
In this adaptation, public key cryptography is run in reverse: The digital signature is encrypted with the signer’s private
key, and anyone wishing to verify the
signature can decrypt it with a public
key. The digital signature will be readable
only if it was originally encrypted with
the real signer’s private key. DICOM protocols for the cryptographic protection of
data integrity are being developed (10),
but their adoption and implementation
by vendors is also years away.
Standards for data encryption are
widely used in Web-based Internet commerce, and they are currently being used
by some vendors of teleradiology systems. Other vendors incorporate built-in
proprietary encryption. A better solution
would be to provide encryption to all
network applications, regardless of their
support of a Web interface or DICOM.
The most generalizable encryption solutions fall under the term virtual private
network (VPN) (11). In a VPN, data encryption over the Internet is used to virtually extend the internal network to a
Volume 220
䡠
Number 2
remote location. Data encryption and
decryption can be performed with software by means of two computers being
connected over the Internet, a method
known as tunneling protocols, or the encryption can be performed by means of
special network routing hardware at each
end of the Internet connection. A VPN
implemented by using special routers is
preferable because it adds data security to
any network application on any computer operating system without requiring
a special configuration or software installation on each computer, as in tunneling
protocols. The main drawback of VPN
routers is the required expertise and expense of installing special hardware at
each end of the Internet connection.
Currently, the implementation of VPN
hardware is far from universal. Also, installation of VPN hardware is probably
not economically justifiable if the remote
site is an individual user’s home or office.
In addition to Internet service providers, the communication link itself can be
a source of data security concerns. Digital
subscriber lines and even the ordinary
telephone modem rely on the telephone
company’s relatively secure switch-controlled technology. By contrast, cable
modems are usually connected to a
shared neighborhood cable and behave
like a shared Ethernet network segment
not controlled by a switch, with potentially all of the associated internal and
external security threats already discussed. Data encryption is particularly
important in such an environment, and
caution should be exercised even with
casual unencrypted use. For example,
software is currently available from the
Internet to show the Web pages being
browsed by literally everyone in a cable
modem neighborhood network segment.
GROWING NEED FOR SECURITY
Maintenance of patient privacy is an integral component of the traditional doctor-patient relationship, and this concept
is being formally extended to the Internet in several ways. In 1998, the Health
Care Financing Administration (HCFA)
issued an Internet security policy (12)
that required both access security and
data security to be used in transmitting
any data related to HCFA (eg, Medicare
and Medicaid billing information) over
the Internet. In 1996, Congress passed
the Health Insurance Portability and Accountability Act (HIPAA), which contains
provisions for both insurance reform and
administrative simplification. One part
of the provisions for administrative simplification is broad security requirements
for any health care organization electronically maintaining or transmitting individually identifiable health information.
As required by HIPAA, the U.S. Department of Health and Human Services (13)
has proposed rules to meet these security
requirements. As of this writing, the proposed security standards have not been
finalized. HIPAA standards are generally
required to be implemented within 2
years after the associated rules have been
finalized.
The proposed HIPAA security standards are organized into four sections:
administrative procedures, physical safeguards, technical services and mechanisms, and electronic signature. Each section describes a set of functional, rather
than technical, requirements to allow
flexibility in compliance and prevent
binding health care organizations to a
particular technology that may rapidly
become outdated. For example, transmission of data over a network is required to implement protection of data
integrity and privacy, but the methods
are purposely unspecified. The Appendix summarizes the technical section of
the proposed security standard (13) as
an example of its scope and detail. The
section about administrative procedures
focuses on planning and documentation
of procedures, such as disaster recovery,
user management, security risk analysis, system maintenance and testing,
and user education. Electronic signatures are not required by the security
standards, but functional requirements
are put forth if electronic signatures are
implemented.
As computers become simpler to install
and configure, it is sometimes easy to
forget factors determined during installation and configuration that affect the security of a computer and the network to
which it is connected. For example, the
end user of a workstation based on a
Unix-type operating system often knows
enough about Unix to set up the workstation but not enough to configure and
maintain the system to account for the
many well-known security flaws in default configurations of Unix-type operating systems. In the typical laboratory setting, the busy end user is under pressure
to begin productive work with the workstation and has insufficient time and experience to configure the system for secure operation. In the PACS setting, a
busy administrator may be under similar
time pressures. In these situations, it is
important to recognize that reasonable
Computer Network Security for the Radiology Enterprise
䡠
307
attention to security issues requires the
prospective commitment of tangible resources in addition to those spent on routine installation and maintenance. The
relative ease of installation and maintenance of modern computers should not
obviate the need for access to personnel
with specialized knowledge and experience in security matters.
DISCUSSION AND
RECOMMENDATIONS
From this overview, it is evident that a
radiology network is potentially open to
a wide range of attacks, perhaps more so
than the average computer network. Attack methods such as password sniffing
are particularly dangerous because the
compromise of just one computer can
result in an avalanche of easy access to
many other computers on the same network. Furthermore, it is impossible to design a network that is completely immune to attack. Because computers and
networks are extremely complex systems developed by humans, who are
fallible, there will always be an error or
oversight that an attacker will discover
and exploit.
Not mentioned in this review are additional malicious activities that cannot be
prevented with any technologic means.
For example, a denial of service attack
involves overwhelming a network or
computer with apparently legitimate
connection requests from an unknown
user. Since the user is unknown to the
network or computer, the connection requests are rejected. However, the sheer
number of these repeated requests may
eventually overload the network or computer, causing it to shut down or crash.
This type of attack can result in widespread slowdown of the Internet and major Web sites such as Yahoo, eBay, and
Amazon.com (14,15).
Electronic mail viruses, such as the
“ILOVEYOU” virus (16), have also resulted in widespread system problems.
Typifying the general behavior of computer viruses, e-mail viruses disguise
their malicious components in an apparently legitimate electronic mail message. Fundamentally, both the denial of
service attack and the electronic mail
virus cannot be prevented without
eliminating essential functions of networks and computers, which include servicing all connection requests and electronic mail.
However, it is appropriate to conclude
with some optimistic remarks. The tech308
䡠
Radiology
䡠
August 2001
nologies described herein are sufficient to
increase the level of security well above
that found in the average computer network, which results in a strong relative
deterrent against attack. Implementation
of switch-controlled networks virtually
eliminates the problem of internal sniffing and should be considered in any new
network installation, since the incremental cost is becoming small. A network in
which sniffing is impossible will be much
less desirable to a potential attacker. A
firewall strategy is a necessity for most
PACS networks because of the difficulty
in managing proprietary DICOM equipment. Because of their connection to external networks, firewalls are vulnerable
to attack, but they can be disconnected
from the external network if an attack
occurs, leaving internal network operation intact.
It cannot be overemphasized that a
policy and practice of vigilant system
management and monitoring for suspicious activity is arguably the most important and effective security measure for a
computer network. It is the only measure
that minimizes the risk of future attacks
by yet unknown methods, as well as by
those methods that are without effective
preventive measures, such as denial of
service attacks and electronic mail viruses. User and system management are
essential components of security strategies in all areas discussed herein and require appropriate allocation of equipment and human resources.
APPENDIX
This Appendix contains a summary of
technical security requirements of the
proposed HIPAA security rule and was
compiled and paraphrased from reference 13.
I. Access Control Requirements (to restrict access to only privileged entities)
A. Procedure for emergency access
B. At least one of the following access control methods
1. Context-based access—based
on time of day or user location, for example
2. Role-based access—based on
each user’s assignment to one
or more predefined roles, each
associated with specific privileges
3. User-based access—based on
specific identity of user
C. Encryption (optional)
II. Audit Control Requirements (to record
system activity)—unspecified
III. Authorization Control Requirements
(information is disclosed only to
those with need to know and is based
on at least one of the following)
A. Role-based access
B. User-based access
IV. Data Authentication Requirements
(protection against unauthorized alteration or destruction)—unspecified
V. Entity Authentication Requirements
(to verify identity of users)
A. Automatic log off
B. Unique user identification—each
user is assigned a unique name
and/or number
C. At least one of the following authentication methods
1. Biometric system—identification is based on a physical feature or repeatable action by an
individual, such as hand geometry, retinal scan, iris scan,
facial characteristics, fingerprint pattern, handwritten
signature, or voice print
2. Password system
3. Personal identification number (PIN)
4. Telephone callback—system
that calls the user back at a predetermined telephone number
to establish a requested connection
5. Token—identification is based
on user’s possession of a device, such as a key card
VI. Communication Control Requirements
A. Integrity controls—ensure validity of information
B. Message authentication—ensures
data received match data sent
C. At least one of the following
communication control methods
1. Access controls—protection
against reception and interpretation by parties other
than intended recipient
2. Encryption
VII. Networking Control Requirements
A. Alarm—senses abnormal system
conditions and provides a signal
B. Audit trail—collects data to facilitate an audit
C. Entity authentication—corroboration that an entity is the one
claimed
D. Event reporting—network message indicating irregularities or
monitoring of network operation
Eng
References
1. Atkins D, Buis P, Hare C, et al. Internet
security. 2nd ed. Indianapolis, Ind: New
Riders, 1997.
2. Garfinkel S, Spafford G. Practical UNIX
and Internet security. 2nd ed. Sebastopol,
Calif: O’Reilly and Associates, 1996.
3. Langer S, Stewart B. Aspects of computer
security: a primer. J Digit Imaging 1999;
12:114 –131.
4. CERT Coordination Center. Available at:
www.cert.org. Accessed May 22, 2001.
5. National Electrical Manufacturers Association. Digital Imaging and Communications in Medicine. Document PS 3. Rosslyn, Va: National Electrical Manufacturers
Association, 1999.
6. DICOM Standards Committee. Digital
Imaging and Communications in Medicine: security enhancements one. Docu-
Volume 220
䡠
Number 2
7.
8.
9.
10.
11.
ment PS 3, supplement 31. Rosslyn, Va:
National Electrical Manufacturers Association, 2000.
RSA SecurID. Available at: www.rsasecurity.com/products/securid. Accessed May 22,
2001.
Zwicky ED, Cooper S, Chapman DB.
Building Internet firewalls. 2nd ed. Sebastopol, Calif: O’Reilly and Associates,
2000.
Zimmermann PR. Cryptography for the
Internet. Sci Am 1998; 279(4):110 –115.
DICOM Standards Committee. Digital
Imaging and Communications in Medicine: security enhancements two— digital signatures. Document PS 3, supplement 41. Rosslyn, Va: National Electrical
Manufacturers Association, 2000.
Scott C, Wolfe P, Erwin M. Virtual private
networks. 2nd ed. Sebastopol, Calif:
O’Reilly and Associates, 1998.
12.
13.
14.
15.
16.
Health Care Financing Administration.
Internet security policy. Available at:
www.hcfa.gov/security/isecplcy.htm. Accessed
May 22, 2001.
United States Department of Health and
Human Services, Office of the Secretary.
Security and electronic signature standards. Federal Register 1998; 63:43242–
43280.
Levy S, Stone B. Hunting the hackers.
Newsweek 2000; Feb 21:38 – 44.
Fithen KT. Internet denial of service attacks
and the federal response. Available at: www.
cert.org/congressional_testimony/Fithen
_testimony_Feb29.html. Accessed May 22,
2001.
CERT Coordination Center. Love letter
worm. Available at: www.cert.org/advisories/CA-2000-04.html. Accessed May 22,
2001.
Computer Network Security for the Radiology Enterprise
䡠
309