Читать книгу The Internet of Medical Things (IoMT) - Группа авторов - Страница 60
2.4.3 Storage
ОглавлениеData retention policies can be applied based on the lack of applicable criteria diversity.
Storage Encryption: is the use of encryption for data both in transit and on storage media. Data is encrypted while it passes to storage devices, such as individual hard disks, tape drives, or the libraries and arrays that contain them.
K-communication encryption: Leakage and data from the system or eavesdropping risk. A sensitive and data communication must be provided in encryption items.
Problems Integrity: Data integrity is handled by critical issues and has a hash algorithm such as MD5 and SHA. This also applies to the security level of the data essential element.
Policy Access Control: It’s aims to ensure that, by having the appropriate access controls in place, the right information is accessible by the right people at the right time and that access to information, in all forms, is appropriately managed and periodically audited.
Backup and Recovery Plan: A backup plan is required for disaster recovery storage purposes. Data must be connected to base backup scheme. There are separate standards for authenticating user data as required by data quality standards for classification data.