Uday O. Ali Pabrai, CISSP, CHSS - PowerPoint PPT Presentation

About This Presentation
Title:

Uday O. Ali Pabrai, CISSP, CHSS

Description:

Disable file sharing between wireless clients. Evaluate use of static IP addressing and disabling of ... At least 128-bits or as large as possible. Best ... – PowerPoint PPT presentation

Number of Views:17
Avg rating:3.0/5.0
Slides: 9
Provided by: ehc6
Category:
Tags: chss | cissp | ali | filesharing | pabrai | uday

less

Transcript and Presenter's Notes

Title: Uday O. Ali Pabrai, CISSP, CHSS


1
Health care HIPAA Security Remediation
  • Uday O. Ali Pabrai, CISSP, CHSS
  • Chief executive, HIPAA Academy

2
Security Challenges
  • Password management
  • Malicious software
  • Wireless proliferation
  • Contingency planning
  • Auditing

3
Remediate
  • Launch Activities
  • Deploy Firewall Solutions, IDS/IPS
  • Secure Facilities Server Systems
  • Deploy Device Media Control Solutions
  • Implement Identity Management Solutions
  • Deploy Access Control Solutions
  • Implement Auto-logoff Capabilities
  • Deploy Integrity Control and Encryption
  • Develop Test Contingency Plans
  • Activate Auditing Capabilities

4
Wireless Security Getting Started
  • Conduct risk analysis
  • Develop security policies
  • Establish best practices
  • Design
  • Access points
  • Mobile devices
  • Remediation Design infrastructure
  • Firewall
  • IDS
  • Wired network

5
Best Practices Design
  • Force communication through firewall system
  • Between the wired and wireless infrastructure
  • Deploy IDS solution
  • Disable file sharing between wireless clients
  • Evaluate use of static IP addressing and
    disabling of DHCPs for mobile devices
  • At least 128-bits or as large as possible

6
Best Practices Access Points
  • Minimize number of access points
  • Implement strong physical access controls
  • Install access points away from exterior walls
  • Change the default SSID
  • Evaluate disabling the broadcast SSID feature so
    that the client SSID must match that of the AP
  • Disable all unnecessary protocols
  • Ensure strong authentication for all APs
  • Review logging capabilities of APs
  • Review log files regularly

7
Summary Defense-in-Depth
8
Thank You!
  • Uday Ali Pabrai
  • Pabrai_at_HIPAAacademy.Net
Write a Comment
User Comments (0)
About PowerShow.com