[Next] [Up] [Previous]
Next: What are the Up: Evaluation and Design Previous: Evaluation and Design

What are the risks?

In a computerized medical information system, we should be clear about what the risks are for the parties involved before we decide on an effective strategy to implement security. After weighing these risks, we can then assess the seriousness of these risks and the potential for these risks to be experienced. Only then can we design an appropriate security mechanism.

Risks that can be recognized immediately include:



[Next] [Up] [Previous]
Next: What are the Up: Evaluation and Design Previous: Evaluation and Design



Kevin S. McCurley
Sat Mar 11 16:00:15 MST 1995