The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2022
DOI: 10.47007/inohim.v10i1.396
|View full text |Cite
|
Sign up to set email alerts
|

SIMRS Network Security Simulation Using Snort IDS and IPS Methods

Abstract: Hospital information systems have an essential role in clinical and administrative services. This triggers an innovation that supports an integrated quality measurement data management system by integrating the Hospital Management Information System (SIMRS). SIMRS can be implemented locally or in the cloud, using the network to exchange data and information. Along with the current development of Information Technology, information security is very important, especially on a network connected to the internet. B… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…Measures that focus on addressing pending problems and potential risks and actively promote reform and innovation in the management and security of computer networks in the health sector. Likewise, apply techniques to protect network computers [11]. In addition, to ensure the security of sectional medical image (SMI) transmission, it is critical to strengthen the hospital network infrastructure by implementing a four-tiered endpoint network penetration scheme [12].…”
Section: Rq1: What Types Of Computer Security Are Implemented For The...mentioning
confidence: 99%
“…Measures that focus on addressing pending problems and potential risks and actively promote reform and innovation in the management and security of computer networks in the health sector. Likewise, apply techniques to protect network computers [11]. In addition, to ensure the security of sectional medical image (SMI) transmission, it is critical to strengthen the hospital network infrastructure by implementing a four-tiered endpoint network penetration scheme [12].…”
Section: Rq1: What Types Of Computer Security Are Implemented For The...mentioning
confidence: 99%