Download presentation
Presentation is loading. Please wait.
Published byAmberly Atkinson Modified over 9 years ago
1
Personal data security in telemedicine M. Grayvoronskyy, A. Novikov NTUU “KPI”, Kiev, Ukraine
2
Characteristics of the information Confidentiality only authorized persons may become familiar with the information Integrity only authorized persons may in any way modify the information Accessibility any authorized object may obtain data within the certain (short) time interval
3
Teleworkers Remote SitesCentral Sites ATM / FR / ISDN WAN Router Network Reference Model PBX Hub IPT Gateway Hub PSTN Router WAN Violator (internal) L3 Switch L2 Switch PBX Violator (External) Internet WAN Router/ IPT Gateway
4
Confidentiality The violation of confidentiality (privacy): disclosure of information Typical ways for disclosure of information: –“sniffing”: listening of the data transmitted via a telecommunication channel –“spoofing”: an authorized object of telecommunication exchange is substituted by an unauthorized object
5
Teleworkers Spoofing Sniffing WAN Router Violation of confidentiality Hub WAN L3 Switch L2 Switch Internet WAN Router/ IPT Gateway Router
6
Integrity The violation of integrity: –partial or complete loss of the information –falsification of data Hub WAN Router/ IPT Gateway Router
7
Accessibility The violation of accessibility: denial of service (DoS) attacks Hub WAN Router/ IPT Gateway Router
8
Methods of information protection Authentication of objects Data ciphering (encryption) Signing of data Redundancy and backup in storage of data Redundant data channels
9
Virtual Private Networks Public Internet (Untrusted network) Private Public Private Public FR or Leased Line (Intranet, trusted private network) Public WAN VPN (Dynamic routing over encrypted tunnels) Public WAN (Clear-text, static routing) Private WAN (Clear-text or Encrypted Routing - Static, RIP, OSPF) Branch Office Tunnel IP Phones Video conference
10
Transport and Tunnel Mode New IP Header Sec Protocol Header Data IP Header Data Tunnel Mode Original IP Header Sec Protocol Header Transport Mode Original IP Header Data Encryption Outer IP Header Inner IP Header
11
A good example: Nortel Networks Contivity Modular Service Options Decreased Cost Software License Keys Firewall Services VPN Services Adv Routing Base Services Contivity can function as –VPN device –Router –Firewall –Or any combination
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.