Difference between revisions of "Healthcare Data Security"
Jump to navigation
Jump to search
BruceHecht (talk | contribs) |
BruceHecht (talk | contribs) |
||
Line 4: | Line 4: | ||
The context, working principles, and architecture for healthcare data security is shown in the following diagram. Note the presence of a threat actor potentially compromising security and whose interference the healthcare data security technology is used to deter, prevent, detect, or mitigate. | The context, working principles, and architecture for healthcare data security is shown in the following diagram. Note the presence of a threat actor potentially compromising security and whose interference the healthcare data security technology is used to deter, prevent, detect, or mitigate. | ||
[[File:Healthcare data security.png| | [[File:Healthcare data security.png|frame|left|Healthcare Data Security Architecture]] | ||
=== Design Structure Matrix Allocation === | === Design Structure Matrix Allocation === | ||
=== Roadmap Model Using OPM === | === Roadmap Model Using OPM === | ||
=== Figures of Merit === | === Figures of Merit === |
Revision as of 09:00, 1 October 2020
Healthcare Data Security Technology Roadmap
- 2HDS Healthcare Data Security
Roadmap Overview
The context, working principles, and architecture for healthcare data security is shown in the following diagram. Note the presence of a threat actor potentially compromising security and whose interference the healthcare data security technology is used to deter, prevent, detect, or mitigate.