Difference between revisions of "Healthcare Data Security"
Jump to navigation
Jump to search
BruceHecht (talk | contribs) |
BruceHecht (talk | contribs) |
||
Line 7: | Line 7: | ||
=== Roadmap Model Using OPM === | === Roadmap Model Using OPM === | ||
=== Figures of Merit === | === Figures of Merit === | ||
[[File:Telehealth Technology Overview shadow.png|thumb|Healthcare Data Security Architecture]] |
Revision as of 08:49, 1 October 2020
Healthcare Data Security Technology Roadmap
- 2HDS Healthcare Data Security
Roadmap Overview
The context, working principles, and architecture for healthcare data security is shown in the following diagram. Note the presence of a threat actor potentially compromising security and whose interference the healthcare data security technology is used to deter, prevent, detect, or mitigate.