15.12.2012 Views

Digital Imaging and Communications in Medicine (DICOM)

Digital Imaging and Communications in Medicine (DICOM)

Digital Imaging and Communications in Medicine (DICOM)

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

250<br />

Chapter 11 <strong>DICOM</strong> Security<br />

All external connections to your network should go via a VPN or a similar<br />

data-encrypt<strong>in</strong>g channel. Your computers should be located beh<strong>in</strong>d a firewall.<br />

In case you are not familiar with the difference between a VPN <strong>and</strong> a firewall, it<br />

is shown <strong>in</strong> a nutshell on Fig. 78. A firewall only protects each computer from<br />

prohibited external access (hack<strong>in</strong>g), while a VPN protects the entire communication<br />

between two computers (network). If you rely on a firewall only<br />

(which is often the case), data sent from your computer to another over a public<br />

network is still unsecured, <strong>and</strong> can be potentially <strong>in</strong>tercepted <strong>and</strong> compromised.<br />

VPN will encrypt the data when it is be<strong>in</strong>g transmitted, thus protect<strong>in</strong>g<br />

it from any unauthorized access.<br />

Just log onto my server<br />

A popular way of shar<strong>in</strong>g imag<strong>in</strong>g data, especially for small teleradiology<br />

projects, is allow<strong>in</strong>g your bus<strong>in</strong>ess partner or offsite radiologist log onto<br />

your imag<strong>in</strong>g server remotely to view images. Do not do this. It is <strong>in</strong>deed<br />

the easiest way to view your images remotely. It is also the easiest way to<br />

compromise your security <strong>and</strong> to kill your entire bus<strong>in</strong>ess with a couple<br />

of misplaced mouse clicks. Please <strong>in</strong>vest <strong>in</strong> a well-structured teleradiology<br />

system from the start.<br />

Did I forget to mention power backups, access logs, <strong>and</strong> antivirus software?<br />

Computers, automatically lock<strong>in</strong>g screens after some 15-m<strong>in</strong> timeout? We do<br />

not want to go <strong>in</strong>to the depths of network security <strong>in</strong> this medical imag<strong>in</strong>g<br />

book, so here comes the most important advice: There is no way a contemporary<br />

medical imag<strong>in</strong>g enterprise of any size can function without a cautious, welltra<strong>in</strong>ed<br />

network/system adm<strong>in</strong>istrator. The sooner you hire one, the better.<br />

Fig. 78 VPNs <strong>and</strong> firewalls. While firewalls protect computers, VPNs protect entire<br />

networks

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!