[1]王 成,潘 峰,杨建朝,等.互联网医疗信息系统等保建设研究与建议[J].计算机技术与发展,2021,31(增刊):91-95.[doi:10. 3969 / j. issn. 1673-629X. 2021. S. 018]
 WANG Cheng,PAN Feng,YANG Jian-chao,et al.Research and Suggestion of Network Security Level Protection Construction of Internet Healthcare Information System[J].,2021,31(增刊):91-95.[doi:10. 3969 / j. issn. 1673-629X. 2021. S. 018]
点击复制

互联网医疗信息系统等保建设研究与建议()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
31
期数:
2021年增刊
页码:
91-95
栏目:
系统工程
出版日期:
2021-12-31

文章信息/Info

Title:
Research and Suggestion of Network Security Level Protection Construction of Internet Healthcare Information System
文章编号:
1673-629X(2021)S0091-05
作者:
王 成1 潘 峰2 杨建朝2 韦 力2 安 健3
1. 首都医科大学 附属北京安贞医院,北京 100029;
2. 北京市医院管理中心,北京 100053;
3. 中国软件评测中心,北京 100048
Author(s):
WANG Cheng1 PAN Feng2 YANG Jian-chao2 WEI Li2 AN Jian3
1. Beijing Anzhen Hospital,Capital Medical University,Beijing 100029,China;
2. Beijing Hospital Authority,Beijing 100053,China;
3. China Software Testing Center,Beijing 100048,China
关键词:
互联网医疗信息安全等级保护数据安全个人隐私
Keywords:
Internet healthcareinformation securityclassified protection of cybersecuritydata securitypersonal privacy
分类号:
TP393. 08
DOI:
10. 3969 / j. issn. 1673-629X. 2021. S. 018
摘要:
突如其来的新冠疫情,让互联网医疗迅猛发展,在线问诊等互联网医疗平台流量暴增,有效分流线下医院的就诊压力。 然而在互联网医疗重构了医疗信息化基础支撑带来便利的同时,增加了资产暴露面,医疗卫生行业的数据集中且价值较高、安全机制弱导致其成为网络攻击的重灾区,安全性和个人信息保护将会是未来困扰用户使用互联网医疗健康服务的重要因素。 文中主要介绍了互联网医疗发展,对比分析了互联网医疗与传统医疗的差异,分析了互联网医疗的政策要求、网络安全现状,从信息系统网络安全等级保护的安全管理中心、安全计算环境、安全区域边界、安全通信网络的建设进行探讨研究,提出了人管技管结合、强化数据安全、常态化测评等建议,以期促进互联网医疗信息安全,推动数字医疗产业的健康发展。
Abstract:
The sudden COVID-19 makes internet healthcare develop rapidly. The traffic of online medical platforms such as online consultation has soared,effectively diverting the pressure of offline hospitals. However,while internet healthcare restructures the basic support of health care informatization to bring convenience,it increases the exposure of assets. The concentration and high value of data in the health care industry and weak security mechanisms have caused it to become major disaster area of cyber attacks. Security and the protection of personal information will be the important factors that will perplex users to use the Internet health service in the future. We mainly introduce the development of internet health care,compare and analyze the differences between Internet healthcare and traditional health care, analyze the policy requirements of Internet healthcare and the current situation of network security. Research on the construction of security management center, secure computing environment,secure area boundaries,and secure communication network,and put forward corresponding suggestions from the aspects of personnel & technical management,data security,normalization evaluation,so as to promote the internet healthcare information security and improve the medical service mode.

相似文献/References:

[1]黄松 夏洪亚 谈利群.基于模糊综合的信息安全风险评估[J].计算机技术与发展,2010,(01):185.
 HUANG Song,XIA Hong-ya,TAN Li-qun.Fuzzy Comprehensive Evaluation for Information Security[J].,2010,(增刊):185.
[2]郑江云 江巨浪.基于信噪比的自适应双彩色图像水印算法[J].计算机技术与发展,2010,(02):160.
 ZHENG Jiang-yun,JIANG Ju-lang.An Algorithm of Adaptive Double Color Digital Image Watermarking Based on SNR[J].,2010,(增刊):160.
[3]任参 刘少君 黄道平.一种改进的并行签密方案[J].计算机技术与发展,2010,(04):151.
 REN Shen,LIU Shao-jun,HUANG Dao-ping.An Improved Parallel Signcryption Scheme[J].,2010,(增刊):151.
[4]孟祥宏.信息安全攻防博弈研究[J].计算机技术与发展,2010,(04):159.
 MENG Xiang-hong.Study on Offence and Defense of Information Security Based on Game Theory[J].,2010,(增刊):159.
[5]赵锋 曹文杰.医院信息系统访问控制策略设计分析[J].计算机技术与发展,2010,(06):144.
 ZHAO Feng,CAO Wen-jie.Design and Analysis of Access Control Strategy for Hospital Information System[J].,2010,(增刊):144.
[6]杨蕴石 王颖 孙福玉 吕科 赵亚伟.商业银行安全保障体系设计[J].计算机技术与发展,2008,(03):177.
 YANG Yun-shi,WANG Ying,SUN Fu-yu,et al.Design on Information Security System for Commercial Bank[J].,2008,(增刊):177.
[7]刘华春.基于PKI的网上证券交易系统的构建[J].计算机技术与发展,2009,(07):173.
 LIU Hua-chun.Implementing a System of On - line Securities Trading Based on PKI Technology[J].,2009,(增刊):173.
[8]罗佳 杨世平.基于熵权系数法的信息安全模糊风险评估[J].计算机技术与发展,2009,(10):177.
 LUO Jia,YANG Shi-ping.Fuzzy Risk Assessment for Information Security Based on Method of Entropy - Weight Coefficient[J].,2009,(增刊):177.
[9]李超 王红胜 陈军广 孙蕊.加强计算机终端信息安全的两种解决方案[J].计算机技术与发展,2009,(01):165.
 LI Chao,WANG Hong-sheng,CHEN Jun-guang,et al.Two Solutions to Strengthen Computer's Terminal Information Security[J].,2009,(增刊):165.
[10]邓晓军.PKI技术及其应用的分析[J].计算机技术与发展,2008,(06):144.
 DENG Xiao-jun.Analysis of PKI Technology and Its Application[J].,2008,(增刊):144.

更新日期/Last Update: 2021-09-10