Downloads: 3 | Views: 110 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3
Case Studies | Information Security | Singapore | Volume 13 Issue 11, November 2024 | Popularity: 5.1 / 10
Fortifying Electronic Medical Record (EMR) Applications: Advanced Security Controls in Oracle Cloud Infrastructure (OCI)
Velmurugan Dhakshnamoorthy
Abstract: This case study presents a comprehensive security framework for Electronic Medical Record (EMR) applications deployed in Oracle Cloud Infrastructure (OCI) (Oracle, 2022). The framework utilizes a Hub & Spoke network design to centralize security management and streamline traffic flow (Oracle, 2022). It integrates advanced security controls, including firewalls and intrusion detection systems, to protect against malicious activities. The framework ensures secure data handling with North - South and East - West traffic inspection and segregation of internet and intranet traffic. Regular security audits and continuous monitoring maintain data integrity, confidentiality, and availability, offering healthcare organizations a secure, scalable, and efficient cloud infrastructure for EMR applications.
Keywords: Oracle Cloud Infrastructure, Electronic Medical Records, Network Security, Hub & Spoke Model, Healthcare Cloud Security
Edition: Volume 13 Issue 11, November 2024
Pages: 183 - 184
DOI: https://www.doi.org/10.21275/SR241101115635
Make Sure to Disable the Pop-Up Blocker of Web Browser
Click below to Watch Video Lecture of Above Article
Downloads: 246 | Views: 466 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3
Information Security, India, Volume 8 Issue 11, November 2019
Pages: 95 - 101Intrusion Detection with Machine Learning & Artificial Intelligence (ML&AI) Techniques to Reduce Cyberattacks (Network Traffic) (New Way to Improve Cybersecurity)
S K. Niamathulla
Downloads: 221 | Views: 642 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3
Information Security, India, Volume 6 Issue 6, June 2017
Pages: 2628 - 2630Improvement of Diffie-Hellman Key Exchange Algorithm
Gurshid
Downloads: 161 | Views: 322 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3
Information Security, India, Volume 7 Issue 7, July 2018
Pages: 905 - 907The Language of Information Security
Mahesh P G
Downloads: 148 | Views: 294 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3
Information Security, India, Volume 6 Issue 5, May 2017
Pages: 2678 - 2678Cyber Security - A Business Accelerator??
Riya V S, Dr. Aarthy C
Downloads: 144 | Views: 280 | Weekly Hits: ⮙3 | Monthly Hits: ⮙3
Information Security, Kenya, Volume 7 Issue 1, January 2018
Pages: 345 - 350Emerging Security Challenges due to Bring Your Own Device Adoption: A Survey of Universities in Kenya
Jairus E. Ounza, Samuel Liyala, Solomon Ogara