Table of contents exchange of letters with the minister executive summary



Download 5.91 Mb.
View original pdf
Page287/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   283   284   285   286   287   288   289   290   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019

COI Report – Part VII
Page 363 of 425

learn how patient safety concerns were dealt with and disruption to provision of medical services minimised.
44.4 Measures should be considered to secure data-at-rest
1053. In the Cyber Attack, the attacker was able to view the full details of the medical records stored in the SCM database, once he had gained access. This was so as there were no measures in place to secure the data-at-rest in the database.
1054. Data-at-rest refers to information stored in databases in filesharing servers, in backup tapes etc, and generally includes any data that is not being transmitted through a network (which is known as data-in-motion).
1055. The amount of data that is being generated daily continues to increase exponentially. Given the rapid pace of development of cyber attacks, data-centric security measures must be deployed. These measures include safeguarding the data itself as it resides in repositories such as databases.
1056. In general, mechanisms to protect data involve coding data in such away that access to the data is restricted. This process can generally be referred to as
“masking”
96
and can occur at the central record repository. Techniques used to mask information in a patient’s medical record include data encryption and tokenisation. a) Encrypting data-at-rest prevents unauthorised access by anyone who defeats normal system access controls. It alters the content of the data and stores it in encrypted form. This makes health data unreadable unless an individual has the necessary key or code to decrypt it. This would ensure that unauthorised individuals are notable to seethe data in its original form. Dr Lim has recommended encrypting all data-at-rest, where possible, to protect against both Data masking is the process of hiding original data with random characters or data.



COI Report – Part VII
Page 364 of 425

Download 5.91 Mb.

Share with your friends:
1   ...   283   284   285   286   287   288   289   290   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page