Difference between revisions of "Healthcare Data Security"
Jump to navigation
Jump to search
BruceHecht (talk | contribs) |
BruceHecht (talk | contribs) |
||
Line 2: | Line 2: | ||
* 2HDS Healthcare Data Security | * 2HDS Healthcare Data Security | ||
=== Roadmap Overview === | === Roadmap Overview === | ||
The context, working principles, and architecture for healthcare data security is shown in the following diagram. Note the presence of a threat actor potentially compromising the security. | The context, working principles, and architecture for healthcare data security is shown in the following diagram. Note the presence of a threat actor potentially compromising security and whose interference the healthcare data security technology is used to deter, prevent, detect, or mitigate. | ||
=== Design Structure Matrix Allocation === | === Design Structure Matrix Allocation === | ||
=== Roadmap Model Using OPM === | === Roadmap Model Using OPM === | ||
=== Figures of Merit === | === Figures of Merit === |
Revision as of 08:05, 1 October 2020
Healthcare Data Security Technology Roadmap
- 2HDS Healthcare Data Security
Roadmap Overview
The context, working principles, and architecture for healthcare data security is shown in the following diagram. Note the presence of a threat actor potentially compromising security and whose interference the healthcare data security technology is used to deter, prevent, detect, or mitigate.