Biomedical Engineering Reference
In-Depth Information
areas of information. This may be done by desig-
nating emergency personnel in advance. Ironically,
emergency surveillance is often conducted by
temporarily employing unknown security guards
who are unfamiliar with the environment.
Transfer of Data . Transferring confidential,
valuable information (e.g., magnetic tapes, reports,
or disk packs) to backup sites and returning
these media, plus any new information created
at the backup site, presents many opportunities
for corruption or theft of information. Backup
and recovery often necessitate the use of more
vulnerable public communications networks, rather
than more secure, private data communications
networks so that exposures have to be anticipated
and the preventative actions taken.
Examples of various approaches to achieving
security during backup and recovery are listed
in Table F.2 and are discussed in detail in the
following sections.
Physical Access Control . Physical access at the
primary and backup sites and access to informa-
tion and materials in transit can be controlled by
retaining reliable security guard service. Tempo-
rary security services should be selected in
advance, and their references should be checked
carefully to avoid hurried, reactive decisions. Unre-
liable guard service can negate many of the secu-
rity controls of backup and recovery. At the same
time, contingency access procedures should be
developed at both primary and backup sites and
for primary and backup communications network
facilities, and authorized employees and the guard
service should be familiar with these proce-
dures. If electronic entry systems are employed,
an alternative method for gaining access should
Table F.2 Backup and recovery security procedures
Security control
Backup and recovery procedure
Physical Access
Guards—on site
Contract for guard service in advance and preassign employees to guard
duty.
Guards—in transit
Contract in advance with secured transportation service for relocating
media and equipment.
Electronic card entry
system
Provide emergency batter backup for security systems dependent upon
electricity and provide for manual override system invoked by
authorized personnel. Set up contingency access procedures in
advance.
Voice and data
communications
networks
Provide security on contingency lines and equipment equivalent, if
possible, to primary networks.
Logical Access
Passwords
Ensure that existing system passwords can be used on backup systems or
issue special contingency passwords. Ensure that changes to the
primary system are reflected in the contingency system.
Security software
Provide comparable and compatible security software and contingency
systems.
Dial-up procedures
Provide contingency dial-up numbers for authorized personnel.
Pre-specify contingency call-back numbers if the system is designed
to hand up and call the user back. Set up equipment and software and
specify telephone numbers in advance.
Network security
Ensure that network security measures (e.g., encryption for data,
scrambling for voice) are compatible with the backup systems and
that changes to the primary system are reflected in the contingency
system.
 
Search WWH ::




Custom Search