Table of Contents
Confidentiality, Privacy, and Security
Overview
Definitions
Definitions (continued)
Definitions (continued)
Definitions (continued)
Definitions (continued)
Definitions (continued)
Definitions (continued)
Fair Information Practices
1. Relevance
2. Integrity
3. Written Purpose
4. Need-to-Know Access
5. Correction
6. Consent
Confidentiality Policies
Data Release Restrictions
Personnel Issues
Confidentiality Provisions
Data System Administrators
Legislation
Security
Authentication
Passwords
End-to-End Authentication
Kerberos
Kerberos
Cryptography
Cryptography
Public Key Cryptography
RSA Cryptography
Firewalls
Firewalls as Proxy Servers
Intrusion Detection
WWW Security
Security Pearls
|
Author: William A. Yasnoff, MD, PhD
Email: way2@cdc.gov
Download presentation source
Return to Curriculum
|