CARESCAPE Monitor B450
22
2062973-003
3.5 Product security
The patient monitoring software incorporates an assortment of security features designed to
allow a flexible approach to safe and secure implementation, focusing on the principles of
confidentiality, integrity, and availability. These features assist you in using the system in a
manner that protects patient privacy and security in your setting, and also addresses
expectations for the environment where the system will be used.
3.5.1 Security features
Access control
Access control is the overall mechanism used to determine and enforce the following:
•
Who has access
•
How individuals gain access
•
When access is permitted
•
What information may be accessed
Other than clinical and Webmin applications, access to other subsystems (for example BIOS) is
restricted. The clinical and Webmin application interfaces have a role-based access control (for
example, biomed and clinical). A user may log into these interfaces (for example, Webmin) to
perform operations that are limited to the generic user. See the user and technical manuals for
detailed information on available features.
Authentication
Authentication is the process of proving individual identity, and is a key element in an access
control system. In the clinical and Webmin applications, there are certain features that require
user authentication. To access these features, the user must log into the clinical and Webmin
applications with a valid username and password.
Authorization
Authorization is the process of granting and revoking access to information, and is another key
element in an access control system. Although primarily an administrative process that is
driven by an organization’s policies and procedures, the patient monitor contains features that
will help implement and enforce an organization’s method.
Both clinical and Webmin applications have an authorization mechanism to provide
information to the user.
Audit
The ability to record and examine system activity is crucial to a successful information security
program, as well as a regulatory requirement in most environments. The patient monitor stores
system and Webmin access logs.
Malicious software protection
Vigilant defense on many levels is required to keep systems free from compromise by
malicious software. Effective protection requires cooperation and partnership between GE and
our customers.
Based on the Linux Operating System, the patient monitor has a built-in firewall to allow
external communication to occur on a limited number of ports on the IX Network.
The following product features contribute to defense against malicious software:
•
System integrity checking
Содержание CARESCAPE Monitor B450
Страница 12: ...CARESCAPE Monitor B450 4 2062973 003 For your notes ...
Страница 16: ...CARESCAPE Monitor B450 8 2062973 003 For your notes ...
Страница 46: ...CARESCAPE Monitor B450 38 2062973 003 For your notes ...
Страница 56: ...CARESCAPE Monitor B450 48 2062973 003 For your notes ...
Страница 62: ...CARESCAPE Monitor B450 54 2062973 003 For your notes ...
Страница 108: ...CARESCAPE Monitor B450 100 2062973 003 For your notes ...
Страница 124: ...CARESCAPE Monitor B450 116 2062973 003 For your notes ...
Страница 127: ...Theory of operation 119 2062973 003 9 2 DC DC Board Figure 4 CARESCAPE Monitor B450 DC DC Board Block Diagram ...
Страница 136: ...CARESCAPE Monitor B450 128 2062973 003 For your notes ...
Страница 175: ...Troubleshooting 167 2062973 003 ...
Страница 180: ...CARESCAPE Monitor B450 172 2062973 003 For your notes ...
Страница 218: ...CARESCAPE Monitor B450 210 2062973 003 For your notes ...
Страница 224: ...CARESCAPE Monitor B450 A 4 4 2062973 003 Notes Used service parts Signature Date ...
Страница 227: ...Maintenance check form B 3 4 2062973 003 Notes Used service parts Signature Date ...
Страница 228: ...CARESCAPE Monitor B450 B 4 4 2062973 003 For your notes ...
Страница 235: ......