Advantages Of Crystography

Great Essays
SYSTEM ANALYSIS, DESIGN & METHODOLOGY
3.1 INTRODUCTION
Crystography is basically the adoption of two information hiding techniques and fusing them together in order to enhance data security. This concept is aim at intensifying security in instances in which data confidentiality is of utmost importance. This technique of data hiding enhances security since it involves the combination of two strong techniques. It would not only encrypt the data but also hide them in an unattractive body. The implementation of this technique in the health sector would protect any patient’s information and in the case such information gets into the wrong hands, it still of no use to the intruding party involved. Advantages of Crystography
i. It involves the combination
…show more content…
The outlined steps just shows a surface of the entire process involved in achieving this task. The steps would be divided into two phases. The first phase outlines the encryption and data hiding process while the second phase shows the steps involved in un-hiding and decrypting the record.
Phase One
Encryption and Data Hiding
The following are the steps involved in the encryption and data hiding process
1. The patient would be prompted to login. For a new user, he/she would have to register in order to gain access.
2. During the registration process, some necessary information would have to be provided. The registration form would include the details which would be present in the medical record, which would be stored in a database.
3. After registration, the patient would be redirected to the login page to view his or her profile. Sensitive information provided during the registration process would be subjected to the encryption and data hiding process.
4. The patient profile would display the encrypted data details but the plaintext can be viewed if the patient supplies the key to decrypt which would replace the encrypted data with the plain

Related Documents

  • Decent Essays

    Nt1310 Unit 4

    • 239 Words
    • 1 Pages

    What are the security systems used other than Doctor Authentication? Structure Issues: 1. Missing: Some elaboration on any similar previous work that tried to use a similar method of analysis. 2. Fig.…

    • 239 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Hcr/304 Week 1 Case Study

    • 232 Words
    • 1 Pages

    • Store and maintain medical records in a centralized and secured location accessible only to authorized personnel and provide equivalent security for electronic medical records • Ensure that documents are fastened securely within…

    • 232 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Healthcare landing page SEO: HIPAA COMPLIANCE - 5 Page title: HIPAA Compliance Endpoint Security How Visibility, Control & Automated Response Helps Healthcare Organizations Compensate for BYOD and IoT security Gaps The rise in IoT, BYOD and mobile devices, has made network endpoints one of the most vulnerable security gaps in most networks. What makes the healthcare industry unique, is its need to secure information while maintaining the delicate balance between patient privacy and the need for readily available information to ensure efficient, accurate diagnosis and treatment.…

    • 370 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The security HIPAA data is driven by mandatory requirements and the potential to improve the quality of healthcare delivery meanwhile reducing the costs, these massive quantities of data. To deliver the quality of healthcare information, it is referred to electronic health data is sets to be extremely large and complex which cause difficulty to use with traditional software or hardware in a data management tools or methods. Looking at what the future will hold for security HIPPA data that can identify predictive events and support prevention initiatives, collecting and publishing data on medical procedures, assisting patients in determining the care protocols or regimens that offer the best value and identifying, predicting and minimizing fraud…

    • 1227 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    A good resource for the patient is the patient portal available online via the website which allows patient access to their information at different times of the day. This facility utilized paper and electronic medical records that are consisted of hybrid medical record system. The authorized users access this electronic system via login and password the other access such as the paper medical record would be a lock file…

    • 640 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Conclusion: This review depicts, that both electronic health records and paper health records have vulnerabilities that have the potential to compromise patient data security. There are many who argue that the paper health records are more secure than the electronic health records. While electronic health records have their security vulnerabilities and have been more prevalent in the news, paper health records are not much more secure. Patient data security breaches in paper health records were not publicized as much as the electronic health records, because there is no way of knowing that they exist in order to report…

    • 1371 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Cost Benefit Analysis

    • 1774 Words
    • 7 Pages

    Choosing the appropriate EMR (electronic medical record) vendor is essential to a successful transition from paper records to electronic medical records. Many factors must be weighed in this selection process. One method to help hospitals and practices make this complex decision is to complete a cost-benefit analysis. Entire books have been written on how to conduct cost-benefit analysis and an in-depth analysis goes well beyond the scope of this paper. Instead, this discussion will focus on how cost-benefit analysis can help to determine an appropriate EMR vendor.…

    • 1774 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    HealthIT Topic of Week Valerie Ritter Chamberlain College of Nursing Nursing Informatics NR 512 Dr. Rebecca Glenn October 1, 2016 HealthIT Topic of Week Nursing informatics has an impact on every advanced practice profession in nursing. The impact that it plays on the nurse executives holds so much importance. According to Simpson (2013), nurse executives sit at the executive table during technology evaluations and routinely find themselves ill prepared to debate with their physician counterparts.…

    • 1241 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    HIPAA Code Of Privacy

    • 1119 Words
    • 5 Pages

    Computer with patient information on them should also be put in a place where patients and visitors could not view them. This meant the doctors’ offices needed to place their computers in a secured location away from other patients and or visitors. If a computer was going to be used in a public place where other might be able to see. Then a 3M privacy screen should be used in order to keep other patients and or visitors from seeing what might be on the screen at any giving…

    • 1119 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    HIPAA Essay

    • 596 Words
    • 3 Pages

    This implemented method are meant to ensure the privacy and security of the patient health data. The electronic transmissions of administrative and financial information will reduce the number of forms and methods used in the past in the claims processing, as well as any fraudulent and nonproductive effort that goes into processing…

    • 596 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Technology is an important factor in today’s society especially in our healthcare system. The advancement in technology is on the rise and it is always changing and updating. The healthcare system is making their way to convert all their medical records electronically; although this can be a good transition, it can also pose a problem. Electronic health records have not been perfected and there are still risks for breaches and potentially a big possibility of disclosing patient’s important medical and personal records. On September 8, 2011, Nemours, a Children’s Health System reported missing three unencrypted computer backup tapes that were locked and stored in a cabinet in the Nemours Health System facility in Delaware.…

    • 796 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    This includes shredding all paperwork that contains unnecessary confidential health information, checking the fax number before sending confidential information by fax, using closed door and privacy curtains when discussing health information with a client, and keeping medical records attended to at all times. Confidential health information that you see or hear yourself must be kept to yourself and look only at that medical information you need to do your particular job. If employees come to the healthcare facility for care, their information needs to be as protected as anyone else’s medical records. Security safeguards need to be in place at all times. Some ways to do this include the following: *…

    • 1016 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    According to Darzi (2014), the introduction of records sharing schemes is already transforming the medical landscape by reducing errors and improving care. Electronic health records are crucial because ACO’s mange the health of the patient, thus requiring patient care records on every patient in the system. Health information technology provides clinicians with accurate and complete information about a patient’s health and reduces the amount of paperwork for patient and physicians. Additionally, electronic records are an essential part of data recording for the physicians to see the past history of each patient. This would allow the health care staff to take data from all the sources and use it specifically to track and manage the patients.…

    • 976 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    1. The message I would have received as a hospital administrator from this video would have been: The importance of keeping my organization's information secure from anyone else not permitted to have my knowledge, and more specifically the knowledge of my patient's care as well as their demographic information. It is my responsibility as a hospital administrator to keep my data secure, and whether that means hiring a IT security company or maintaining a high security software is my responsibility in order to stay within HIPPA guidelines. 2.…

    • 477 Words
    • 2 Pages
    Improved Essays
  • Brilliant Essays

    Every person has a right to have the capacity to make their own decisions and have a control over who has access to the private details because this permits individuals to participate as fully as possible in society and protects them from unwanted interferences with their choices (Allen 2009). While confidentiality is vital at the same time it is not unconditional. In some situations, where there is reasonable suspicion of child or elder abuse orwhere there is reasonable suspicion that patient may present danger to others or danger to oneself unless protective measures are taken, the law permits breaches of confidentiality. International Council of Nurses (2006) in Code of Ethics for Nurses states that “the nurse holds in confidence personal information and uses judgement in sharing this information”…

    • 1344 Words
    • 6 Pages
    Brilliant Essays