Difference between revisions of "Healthcare Data Security"

From MIT Technology Roadmapping
Jump to navigation Jump to search
Line 4: Line 4:
The context, working principles, and architecture for healthcare data security is shown in the following diagram.  Note the presence of a threat actor potentially compromising security and whose interference the healthcare data security technology is used to deter, prevent, detect, or mitigate.
The context, working principles, and architecture for healthcare data security is shown in the following diagram.  Note the presence of a threat actor potentially compromising security and whose interference the healthcare data security technology is used to deter, prevent, detect, or mitigate.


[[File:Healthcare data security.png|frameless|left|Healthcare Data Security Architecture]]
[[File:Healthcare data security.png|frame|left|Healthcare Data Security Architecture]]


=== Design Structure Matrix Allocation ===
=== Design Structure Matrix Allocation ===
=== Roadmap Model Using OPM ===
=== Roadmap Model Using OPM ===
=== Figures of Merit ===
=== Figures of Merit ===

Revision as of 09:00, 1 October 2020

Healthcare Data Security Technology Roadmap

  • 2HDS Healthcare Data Security

Roadmap Overview

The context, working principles, and architecture for healthcare data security is shown in the following diagram. Note the presence of a threat actor potentially compromising security and whose interference the healthcare data security technology is used to deter, prevent, detect, or mitigate.

Healthcare Data Security Architecture

Design Structure Matrix Allocation

Roadmap Model Using OPM

Figures of Merit