International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 3 | Views: 110 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3

Case Studies | Information Security | Singapore | Volume 13 Issue 11, November 2024 | Popularity: 5.1 / 10


     

Fortifying Electronic Medical Record (EMR) Applications: Advanced Security Controls in Oracle Cloud Infrastructure (OCI)

Velmurugan Dhakshnamoorthy


Abstract: This case study presents a comprehensive security framework for Electronic Medical Record (EMR) applications deployed in Oracle Cloud Infrastructure (OCI) (Oracle, 2022). The framework utilizes a Hub & Spoke network design to centralize security management and streamline traffic flow (Oracle, 2022). It integrates advanced security controls, including firewalls and intrusion detection systems, to protect against malicious activities. The framework ensures secure data handling with North - South and East - West traffic inspection and segregation of internet and intranet traffic. Regular security audits and continuous monitoring maintain data integrity, confidentiality, and availability, offering healthcare organizations a secure, scalable, and efficient cloud infrastructure for EMR applications.


Keywords: Oracle Cloud Infrastructure, Electronic Medical Records, Network Security, Hub & Spoke Model, Healthcare Cloud Security


Edition: Volume 13 Issue 11, November 2024


Pages: 183 - 184


DOI: https://www.doi.org/10.21275/SR241101115635



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Velmurugan Dhakshnamoorthy, "Fortifying Electronic Medical Record (EMR) Applications: Advanced Security Controls in Oracle Cloud Infrastructure (OCI)", International Journal of Science and Research (IJSR), Volume 13 Issue 11, November 2024, pp. 183-184, URL: https://www.ijsr.net/getabstract.php?paperid=SR241101115635, DOI: https://www.doi.org/10.21275/SR241101115635



Click below to Watch Video Lecture of Above Article

ePresentation

Share this Video Lecture

Downloads: 246 | Views: 466 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3

Information Security, India, Volume 8 Issue 11, November 2019

Pages: 95 - 101

Intrusion Detection with Machine Learning & Artificial Intelligence (ML&AI) Techniques to Reduce Cyberattacks (Network Traffic) (New Way to Improve Cybersecurity)

S K. Niamathulla


Downloads: 221 | Views: 642 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3

Information Security, India, Volume 6 Issue 6, June 2017

Pages: 2628 - 2630

Improvement of Diffie-Hellman Key Exchange Algorithm

Gurshid


Downloads: 161 | Views: 322 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3

Information Security, India, Volume 7 Issue 7, July 2018

Pages: 905 - 907

The Language of Information Security

Mahesh P G


Downloads: 148 | Views: 294 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3

Information Security, India, Volume 6 Issue 5, May 2017

Pages: 2678 - 2678

Cyber Security - A Business Accelerator??

Riya V S, Dr. Aarthy C


Downloads: 144 | Views: 280 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3

Information Security, Kenya, Volume 7 Issue 1, January 2018

Pages: 345 - 350

Emerging Security Challenges due to Bring Your Own Device Adoption: A Survey of Universities in Kenya

Jairus E. Ounza, Samuel Liyala, Solomon Ogara


Top