Confidentiality, Privacy, and Security

Click here to start

Click here for session outline

Table of Contents

Confidentiality, Privacy, and Security

Overview

Definitions

Definitions (continued)

Definitions (continued)

Definitions (continued)

Definitions (continued)

Definitions (continued)

Definitions (continued)

Fair Information Practices

1. Relevance

2. Integrity

3. Written Purpose

4. Need-to-Know Access

5. Correction

6. Consent

Confidentiality Policies

Data Release Restrictions

Personnel Issues

Confidentiality Provisions

Data System Administrators

Legislation

Security

Authentication

Passwords

End-to-End Authentication

Kerberos

Kerberos

Cryptography

Cryptography

Public Key Cryptography

RSA Cryptography

Firewalls

Firewalls as Proxy Servers

Intrusion Detection

WWW Security

Security Pearls

Author: William A. Yasnoff, MD, PhD

Email: way2@cdc.gov

Download presentation source

Return to Curriculum