Hadi Syahrial (Health IT Security Forum)

Slides:



Advertisements
Presentasi serupa
INTRO (TO BPOS). What is BPOS? Apakah BPOS itu? •BPOS = (Microsoft) Business Productivity Online Suite (Service) •adalah sebuah layanan online Microsoft,
Advertisements

Developing Knowledge Management dalam perusahaan Week 10 – Pert 19 & 20 (Off Class Session)
Presented at “Indonesia MS Access Community Gathering 2012” By Haer Talib, Access MVPHaer Talib Auditorium PT Microsoft Indonesia, 19 April 2012.
INTRO TO BPOS ( Coffey’s Project Portal). What is BPOS? Apakah BPOS itu? •BPOS = (Microsoft) Business Productivity Online Suite (Service) •adalah sebuah.
Data Mining dan Aplikasi untuk Knowledge Management
Aplikasi Komputer dalam MRK batagem.com. Aplikasi Komputer dalam MK2 Komputer dan Konstruksi? Normative cost per unit value Construction Automobiles.
Teknologi Informasi. Materi 1.History of Computer 2.History of Telecommunication + Mobile 3.Operating System + Software & Story of Sillicon Valley 4.Video:
E-business STRATEGIES for GOVERNMENT
SOCIAL MEDIA Widianto Nugroho, S.Sn. |
PERUBAHAN VS PERBAIKAN Center for Continuous Improvement, Today is better than yesterday, tomorrow is better than today
INTERNET & E-COMMERCE Internet Marketing & eMarketing
Copyright © 2007 – Badan Meteorologi dan Geofisika.
© 2009 Fakultas Teknologi Informasi Universitas Budi Luhur Jl. Ciledug Raya Petukangan Utara Jakarta Selatan Website:
MIS to ERP and beyond • The term "MIS" arose to describe these kinds of applications, which were developed to provide managers with information about sales,
Administrasi Basis Data
Business Environment Analysis
IT SEBAGAI ALAT UNTUK MENCIPTAKAN KEUNGGULAN KOMPETISI
IT Project Management Based on PMBOK
Siklus Manajemen Pengetahuan
1.1 VISUAL STUDIO 2008 / VISUAL BASIC.NET By Wan hendra M
E-Commerce Kelompok 13 06PFM Ferry Setiawan Hendra Rizki R Winny Narwastu W Andri Gunawan Steven
Kelompok Toar Fandy T David Jordy S.P Andito Tri H Rendy Derrick A Johan Andrian Topik Topik Lanjutan.
PP ICT ITB Pusat Penelitian Information & Communication Technology Institut Teknologi Bandung Budi Rahardjo Dipresentasikan pada Rapat Pimpinan ITB 19.
Dipersiapkan oleh : Penny Handayani Tarmidi. Pengaruh IT pada Berbagai Aktivitas.
PENGANTAR URBAN DESAIN
Aplikasi Teknologi Informasi Dalam Pendidikan Bahan Kuliah Program Studi Manajemen Pendidikan-S2 Program Pascasarjana Universitas Ahmad Dahlan Dosen: Drs.
Taken From William Stallings Chapter 2 TCP/IP Models.
Introduction to The Design & Analysis of Algorithms
Principles of Marketing Fifth Canadian Edition Philip Kotler, Gary Armstrong, Peggy H. Cunningham.
1 KOMPONEN PERUMUSAN PROGRAM KOMUNIKASI 1.Assesment - Focus the target audience 2.Planning - Target audience - Key of consumer benefit - Believe of the.
IT , Jaringan,Internet,E-commerce
PROSES PADA WINDOWS Pratikum SO. Introduksi Proses 1.Program yang sedang dalam keadaan dieksekusi. 2.Unit kerja terkecil yang secara individu memiliki.
M. Suwarso Kegiatan Lembaga Standarisasi Internasional Dalam Hal Telepon Internet Telepon Internet.
Ch. 7 TECHLOGY INTELLIGENCE. (T) Technical Intelligence Market Intelligence (M)
Pengantar/pengenalan (Introduction)
Oleh: Agung Tri Wibowo ( ) Andannytia Kinasih ( )
Could not load an object because it is not avaliable on this machine. Tidak dapat memuat sebuah benda karena tidak tersedia pada mesin ini.
How human charactersitics, practitioners’ habits and health care system regulations affet the research and development of medical devices.
IT ASSESSMENTS Susanto Halim( ) Nobel Handika( ) Peby Sanjaya( ) M. Royfayusyar() Armagedon()
The Key Activity in Knowledge Organizations: Transferring Knowledge Karl Erik Sveiby All assets -tangible, intangible- are the result of human actions.
Risk Management.
Pengampu: Taufik Hidayat, S.Kom, MMSI, Lektor Kepala.
Ruang Lingkup Bisnis Dr. Mohammad Abdul Mukhyi. SE., MM
Sistem Teknologi Informasi Perbankan Materi setelah UTS
KULIAH I INTRODUCTION TO NETWORK SECURITY Imam Bukhari, S.Kom KOM Keamanan Jaringan 2012/2013 KOM Keamanan Jaringan 2012/2013.
Manajemen Sistem Informasi
Ancamanan Keamanan Informasi Pada Industri Finansial Universitas Bina Darma Palembang – 20 Juni 2014 Digit Oktavianto digit.
1 Magister Teknik Perencanaan Universitas Tarumanagara General View On Graduate Program Urban & Real Estate Development (February 2009) Dr.-Ing. Jo Santoso.
Roundtable discussion on citizen engagement for good governance in East Indonesia diskusi keterlibatan penduduk untuk tata pemerintahan yang baik di Indonesia.
LOGO Manajemen Data Berdasarkan Komputer dengan Sistem Database.
We are in search of passionate and driven individual to become one of the few Management Associates who will be developed to become bright leaders in the.
Human Resource Management MSDM strategis M-2 1Tony Soebijono.
Metodologi Penelitian dalam Bidang Informatika
3.1 © 2007 by Prentice Hall OVERVIEW Information Systems, Organizations, and Strategy.
Diagnose device problems that connected to the Wide Area Network Identify problems Through the Symptoms that arise HOME.
Transaksi Aman di eCommerce ? Kenapa Gak…. Pull Market.
MANPRO-M13: MUTU PROYEK SISTEM
THE IMMERSED TUNNELS MAIN BENEFITS AND INNOVATION BY. WAWAN SETIAWAN.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Fungsi dan Protokol Layer Aplikasi Network Fundamentals – Chapter 3.
Situasi Terkini tentang Penelitian dan Pelaksanaan Test danTreat di 28 Oktober 2014 Lecture Series Pusat Penelitian HIV dan AIDS.
KONSEP & MANFAAT e-GOV.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Pengalamatan Jaringan – IPv4 Dosen Pengampu: Resi Utami Putri, S.Kom.,
PENGANTAR KAJIAN BUDAYA URBAN
Web Teknologi I (MKB511C) Minggu 12 Page 1 MINGGU 12 Web Teknologi I (MKB511C) Pokok Bahasan: – Text processing perl-compatible regular expression/PCRE.
Slide 1 Chapter 1: Introduction to Systems Analysis and Design Alan Dennis, Barbara Wixom, and David Tegarden John Wiley & Sons, Inc.
Social Role Theory and Health Profession
Identifying the need BEIS funded strategy project – April 2017 to March 2018 One of nine in first funding round Tri-LEP Local Energy Investment & Delivery.
What is Kerberos? Network Security.
ForumPass Familiarization
NURS 737: Nursing Informatics Concepts and Practice in System Adoption
Transcript presentasi:

Hadi Syahrial (Health IT Security Forum) www.healthitsecurity.org Ancaman-ancaman Terhadap Keamanan Informasi Pada eHealth (Security Threats in eHealth) Hadi Syahrial (Health IT Security Forum) www.healthitsecurity.org

eHealth eHealth is the use of emerging information and communication technology, especially the Internet, to improve or enable health and health care. The term "eHealth" has evolved into the dominant term used by the Information Technology (IT) industry and mass media to describe this area. It was derived from the term "electronic commerce" ("eCommerce"), which was coined in the mid-1990s to reflect the expanding commercial use of the Internet. In addition to eHealth, other terms have been widely used in the past several years to describe the application of information, computer, or communication technology to some aspect of health or health care. These terms include medical informatics, consumer health informatics, public health informatics, telemedicine, telehealth, and interactive health communication.

eHealth http://www.who.int/trade/glossary/story021/en/ E-health is the transfer of health resources and health care by electronic means. It encompasses three main areas: The delivery of health information, for health professionals and health consumers, through the Internet and telecommunications. Using the power of IT and e-commerce to improve public health services, e.g. through the education and training of health workers. The use of e-commerce and e-business practices in health systems management.

Data Breaches by Sector in 2012 Symantec: Internet Security Threat Report 2013 :: Volume 18

Ancaman-ancaman (threats) Pihak manajemen rumah sakit (CEO) tidak sepenuhnya mengerti tentang resiko keamanan informasi dan cara mengelola dan menanganinya. Sulit mencari professional yang berbakat di bidang keamanan informasi. Orang dalam (insiders) yang sengaja atau tidak sengaja membocorkan informasi personal dan rahasia.

Ancaman-ancaman (threats) - lanjutan Hacktivists Crime as a Service (CaaS) Kebocoran informasi (Information leaks) BYOD (bring your own device) BYOC (bring your own cloud) Regulasi (regulation) dari pemerintah tentang keamanan informasi rumah sakit Big Data

Impact Pasien Keluarga Reputasi (reputation) rumah sakit

Solusi (rekomendasi) Teknologi (technology) Proses (process) Orang (people) Kepatuhan (compliance) Resiko (risk) Tata kelola keamanan informasi (information security governance)

Pentingnya Melakukan Security Review Security requirement analysis Threat modeling IT infrastructure architecture analysis Code review Penetration testing Compliance audit Security maturity

Kesimpulan Penting menerapkan Cyber Hygiene untuk semua karyawan dan operasional rumah sakit.

Terimakasih Q&A