Skip to main content
Log in

Aspects of computer security: A primer

  • Published:
Journal of Digital Imaging Aims and scope Submit manuscript

Abstract

As health care organizations continue on the path toward total digital operations, a topic often raised but not clearly understood is that of computer security. The reason for this is simply the vastness of the topic. Computers and networks are complex, and each service offered is a potential security hole. This article describes for the lay person the fundamental points of computer operation, how these can be points attacked, and how these attacks can be foiled—or at least detected. In addition, a taxonomy that should aid system administrators to evaluate and strengthen their systems is described.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Makris L, Argiriou N, Strintzis M: Network and data security design for telemedicine applications. Med Informatics 22:133–142, 1997

    Article  CAS  Google Scholar 

  2. Willenberg C: Strategy for securing medical documents by electronic signature and encryption. Radiology 37(4):305–312, 1997

    Article  CAS  Google Scholar 

  3. Summers R: An overview of computer security. IBM Systems J 23:309–325, 1984

    Article  Google Scholar 

  4. Wouters P: Designing a safe network using firewalls. Linux J 40:32–38, 1997

    Google Scholar 

  5. Thomas RO: Haunted by the ghost of smurfing. Sys-Admin 7:63–64, 1999

    Google Scholar 

  6. Stewart D, Maginnis P, Simpson T: Who is at the door: The SYN denial of service. Linux J 38:12–16, 1997

    Google Scholar 

  7. Brotzman L: Wrap a security blanket around your computer. Linux J 40:17–23, 1997

    Google Scholar 

  8. Corcoran D, Sims D, Hillhouse B: Smart cards and biomentrics: Your key to PKI. Linux J 59:68–71, 1999

    Google Scholar 

  9. Garfinkel S: PGP: Pretty Good Privacy. Sebastopol, CA, O’Reilly & Associates, www.oreilly.com

  10. Scott C, Wolfe P, Erwin M: Virtual Private Networks (ed 2) Sebastopol, CA, O’Reilly & Associates, www.oreilly.com

  11. Garfinkel S, Spafford G: Practical UNIX & Internet Security (ed 2). Sebastopol, CA, O’Reilly & Associates, www.oreilly.com

  12. Stallings W: Network and Internetwork Security Principles and Practice. Newark, NJ, Prentice Hall, 1995

    Google Scholar 

  13. Schneier B: The IDEA encryption algorithm. Dr Dobb’s J 18:50–56, 1993

    Google Scholar 

  14. Stallings W: Pretty good privacy. ConnecXions 8:2–11, 1994

    Google Scholar 

  15. Giles B: Encrypted file systems. Linux J 51:64–67, 1997

    Google Scholar 

  16. Mauriello E: TCFS: Transparent cryptographic file system. Linux J 40:64–68, 1997

    Google Scholar 

  17. Richter J, Cabrera L: A file system for the 21st century: Previewing the Windows NT 5.0 file system. Microsoft Systems J November 1998

  18. Whalin G: Virtual private networks. Sys-Admin 7:21–26, 1999

    Google Scholar 

  19. Stein JG, Neuman C, Schiller JL: Kerberos: An Authentication Service for Open Network Systems. USENIX Conference Proceedings, Dallas, TX, Winter 1998

  20. Fenzi K, Wreski D: Linux Security HOWTO, 1998. http://metalab.unc.edu/mdw/HOWTO/Security-HOWTO.html

  21. Havelt R: SATAN: Analyzing your network. Linux J 40:77–78, 1997

    Google Scholar 

  22. Ali S: Freeware based security. Sys-Admin 8:39–44, 1999

    Google Scholar 

  23. Fenzi K: Tripping up intruders with tripwire. Linux J 40:75–76, 1997

    Google Scholar 

  24. Russinovich M: NT vs. UNIX: Is one substantially better? Windows NT 4:121–132, 1998

    Google Scholar 

  25. Hare C: IT Security coming of age. Sys-Admin 7:57–64, 1998

    Google Scholar 

  26. Epstein MA, Pasieka MS, Lord WP, et al: Security for the digital information age of medicine: Issues, applications, and implementation. J Digit Imaging 11:33–44, 1998

    Article  CAS  PubMed  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Langer, S., Stewart, B. Aspects of computer security: A primer. J Digit Imaging 12, 114–131 (1999). https://doi.org/10.1007/BF03168630

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF03168630

Key Words

Navigation