Final Project
Final Project
Final Project
Introduction
Relevant Laws & Regulations
The HIPAA Privacy Rule establishes national standards to protect individuals medical
records and other personal health information and applies to health plans, health care
clearinghouses, and those health care providers that conduct certain health care
transactions electronically. The Rule requires appropriate safeguards to protect the
privacy of personal health information, and sets limits and conditions on the uses and
disclosures that may be made of such information without patient authorization. The Rule
also gives patients rights over their health information, including rights to examine and
obtain a copy of their health records, and to request corrections (U.S. Department of
Health and Human Services, 2015).
The Health Information Technology for Economic and Clinical Health (HITECH) Act of
2009 [PDF - 266 KB] provides HHS with the authority to establish programs to improve
health care quality, safety, and efficiency through the promotion of health IT, including
electronic health records and private and secure electronic health information exchange.
Learn more about select portions of the HITECH Act that relate to ONCs work (Health IT,
2016).
The FOI/Privacy Acts Division is the focal point for HHS Privacy Act administration,
including the HHS System of Records Notices (SORN). The Privacy Act of 1974, as
amended at 5 U.S.C. 552a:
Protects records about individuals retrieved by personal identifiers such as
a name, social security number, or other identifying number or symbol. An
individual has rights under the Privacy Act to seek access to and request
correction (if applicable) or an accounting of disclosures of any such
records maintained about him or her.
Prohibits disclosure of such records without the prior, written consent of
the individual(s) to whom the records pertain, unless one of the twelve
disclosure exceptions enumerated in subsection (b) of the Act applies.
Requires such records to be described in System of Records Notices
(SORNs) published in the Federal Register and posted to the Internet.
Binds only federal agencies and covers only records under the control of
federal agencies (and, by contract, also applies to contractor personnel and
systems used by a federal agency to maintain the records).
HHS Privacy Act regulations (45 CFR Part 5b).
FDA Privacy Act regulations (21 CFR Part 21) (U.S. Department of
Health and Human Services, 2017).
Polices
It will also be company policy to keep operating systems updated: Whether you run on
Microsoft Windows or Apple OS X, the operating system needs to be set for automatic updates.
Turning off computers at night or rebooting promotes the installation of updates (as well as clean
out system clutter). System updates are especially important for server operating systems where
all patches and updates need be reviewed and updated on a recurring schedule. Employees need
to be reminded to have their smartphones and tablets also set to update iOS, Android, or
Microsoft Windows Phone operating systems automatically. Another update that will be required
on a regular basis will also be antivirus updates: Firms need to ensure that antimalware programs
are set to check for updates frequently and scan the device on a set schedule in an automated
fashion along with any media that is inserted (USB thumb and external hard drives) into a
workstation. In larger firms, workstations should be configured to report the status of the
antivirus updates to a centralized server, which can push out updates automatically when
required (Kepczyk, 2015).
Federal agencies are responsible for including policies and procedures that ensure
compliance with minimally acceptable system configuration requirements, as determined by the
agency within their information security program. Managing system configurations is also a
minimum-security requirement identified in FIPS 200, and NIST SP 800-537 defines security
controls that support this requirement. Configuration management has been applied to a broad
range of products and systems in subject areas such as automobiles, pharmaceuticals, and
information systems. Some basic terms associated with the configuration management discipline
are briefly explained below.
Configuration Management (CM) comprises a collection of activities focused on
establishing and maintaining the integrity of products and systems, through control of the
processes for initializing, changing, and monitoring the configurations of those products
and systems.
A Configuration Item (CI) is an identifiable part of a system (e.g., hardware, software,
firmware, documentation, or a combination thereof) that is a discrete target of
configuration control processes.
A Baseline Configuration is a set of specifications for a system, or CI within a system,
that has been formally reviewed and agreed on at a given point in time, and which can be
changed only through change control procedures. The baseline configuration is used as a
basis for future builds, releases, and/or changes.
A Configuration Management Plan (CM Plan) is a comprehensive description of the
roles, responsibilities, policies, and procedures that apply when managing the
configuration of products and systems. The basic parts of a CM Plan include:
Configuration Control Board (CCB) Establishment of and charter for a group of
qualified people with responsibility for the process of controlling and approving
changes throughout the development and operational lifecycle of products and
systems; may also be referred to as a change control board;
Configuration Item Identification methodology for selecting and naming
configuration items that need to be placed under CM;
Configuration Change Control process for managing updates to the baseline
configurations for the configuration items; and
Configuration Monitoring process for assessing or testing the level of
compliance with the established baseline configuration and mechanisms for
reporting on the configuration status of items placed under CM (Johnson,
Dempsey, Ross, & Gup, 2011).
Threat Environment
The threat as a company that we are concerned with is people gaining access to our
systems via provider or patient portals. Outsider attacks where people try to gain access to the
networks via ports not secured properly or falsified credentials will also be a concern to the
company. Employees who do not possess the proper training can also be considered a threat.
Lack of proper training creates a threat because it means employees may not secure data properly
or use proper encryption when sending information. Training such as Email Awareness Training:
Personnel need to be reminded to be skeptical of emails they did not expect and are out of
character. Staff need to be reminded how to hover over an email link before clicking or to look
at email properties to see if the senders email address matches. They also need to be regularly
reminded to not click on or open suspicious attachments, instead sending them to the IT team to
review if there is any concern. If there is any questions about a link in an email, it is better to go
to the website directly by typing the address into a browser than to risk clicking on the link
(Kepczyk, 2015). The biggest take away in the training aspect is that employees need to be
trained. Educate Employees: Security education is as important as professional accounting CPE
and should be required annually. In addition to reviewing the firm policies, employees should be
educated on current cyber security attack methods such as phishing and pharming, and threats
including ransomware and social engineering used by hackers to get access to a users computer
(i.e. NEVER provide your login, password or confidential information over the phone and to
people you dont know) (Kepczyk, 2015).
Cryptographic Mechanisms and Enforcing Policies in the Presence of Threats
The many different Cryptographic mechanisms are meant to work together in order to
enforce policies laid out by the company. These policies are in place to help protect against
threats both inside and outside the company.
Figure 1.
Table 1
Components
#1 Customers: Hash-based Message Authentication Code (HMAC) is
a message authentication code that uses a cryptographic
key in conjunction with a hash function. HMAC provides
the server and the client each with a private key that is
known only to that specific server and that specific
client. The client creates a unique HMAC, or hash, per
request to the server by hashing the request data with the
private keys and sending it as part of a request. What
makes HMAC more secure than Message Authentication
Code (MAC) is that the key and the message are hashed
in separate steps. HMAC(key, msg) = H(mod1(key) ||
H(mod2(key) || msg)) This ensures the process is not
susceptible to extension attacks that add to the message
and can cause elements of the key to be leaked as
successive MACs are created. Once the server receives
the request and regenerates its own unique HMAC, it
compares the two HMACs. If they're equal, the client is
trusted and the request is executed. This process is often
called a secret handshake (Rouse, 2010).
Strong Password Policy (Administrative Controls):
IT policies should mandate complex passwords, meaning
at least eight characters with a combination of upper and
lower case letters, numbers and special characters.
Network settings should require personnel change their
passwords four times per year and personnel should not
be able to utilize any of the previous ten passwords. Best
practices point to using different passwords for each
login and not allowing anyone to know your password
(reset if necessary) (Kepczyk, 2015).
SSH public-key authentication relies on asymmetric
cryptographic algorithms that generate a pair of separate
keys (i.e., a key pair), one "private" and the other
"public". You keep the private key a secret and store it on
the computer you use to connect to the remote system.
Conceivably, you can share the public key with anyone
without compromising the private key; you store it on the
remote system in a .ssh/authorized_keys directory
(Indiana University, 2016). (Figure 2)
The PKI environment is made up of five components:
Conclusion
In order for a company to excel in its cyber security program there are many elements
that need to be covered. One such element is that of cryptography. This report laid out all the
different moving pieces and ideals to cryptography. The other aspects are that of policies a
company creates to help support their cyber security program. For our company I think some of
the things that need to be focused on are ideals like training. It is important for a company to
make sure everyone they employ is properly trained so that they do not inadvertently release
information to the wrong people or allow information to be stolen from servers.
As a health insurance company it is vital that we stay in compliance with all laws
especially those regarding patient information. It is imperative that we not allow information
belonging to patients, providers, or other customers to be leaked or stolen off servers.
References
Bajo, G. (2011). The algorithms behind OTP tokens. Retrieved from Giovanni Bajo's swapfile:
http://giovanni.bajo.it/post/47121329280/the-algorithms-behind-otp-tokens
Hamilton, G. (UNK). CA642: CRYPTOGRAPHY AND NUMBER THEORY. Retrieved 2017,
from Computing.DCU.IE:
http://www.computing.dcu.ie/~hamilton/teaching/CA642/notes/Block.pdf
Health IT. (2016). Health IT Legislation and Regulations. Retrieved from Health IT:
https://www.healthit.gov/policy-researchers-implementers/health-it-legislation
Indiana University. (2016). How do I set up SSH public-key authentication to connect to a
remote system? Retrieved from Indiana University - Knowledge Base:
https://kb.iu.edu/d/aews
InfoSec. (2017). e-Authentication . Retrieved from InfoSec:
https://www.infosec.gov.hk/english/itpro/e_auth_method.html
Johnson, A., Dempsey, K., Ross, R., & Gup, S. (2011, AUG). Guide for Security-Focused
Configuration Management of Information Systems. Retrieved from NIST:
http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-128.pdf
Kepczyk, R. H. (2015, JUL 07). Top 20 Cybersecurity Checklist . Retrieved from AICPA:
https://www.aicpa.org/interestareas/privatecompaniespracticesection/qualityservicesdeliv
ery/informationtechnology/pages/cybersecurity-checklist.aspx
Lawton, S. (2015, MAR 17). Introduction To Public Key Infrastructure (PKI). Retrieved from
Tom's IT Pro: http://www.tomsitpro.com/articles/public-key-infrastructure-
introduction,2-884.html
Microsoft. (2007, NOV 30). Kerberos Key Distribution Center. Retrieved from Microsoft -
Windows Server: https://technet.microsoft.com/en-us/library/cc734104(v=ws.10).aspx
Rouse, M. (2010, NOV). Hash-based Message Authentication Code (HMAC). Retrieved from
TechTarget: http://searchsecurity.techtarget.com/definition/Hash-based-Message-
Authentication-Code-HMAC
U.S. Department of Health and Human Services. (2015). The HIPAA Privacy Rule. Retrieved
from U.S. Department of Health and Human Services: https://www.hhs.gov/hipaa/for-
professionals/privacy/index.html
U.S. Department of Health and Human Services. (2017). The Privacy Act. Retrieved from U.S.
Department of Health and Human Services: https://www.hhs.gov/foia/privacy/index.html
Ubuntu. (2012). MIT Kerberos key server (KDC). Retrieved from Ubuntu:
https://apps.ubuntu.com/cat/applications/saucy/krb5-kdc/
UC Irvine . (2017). Information Security and Privacy. Retrieved from UCI:
https://security.uci.edu/security-plan/plan-control7.html
UC Irvine. (2017). Security Control 10: Secure Configurations for Network Devices such as
Firewalls, Routers, and Switches. Retrieved from UC Irvine Information Security and
Privacy: https://security.uci.edu/security-plan/plan-control10.html
VOCAL Technologies, Ltd. (2017). DSA Digital Signature Algorithm. Retrieved from VoCal:
https://www.vocal.com/cryptography/dsa-digital-signature-algorithm/