Unit III - THT
Unit III - THT
TELEMEDICAL STANDARDS
► Integrity
►Integrity is a fundamental requirement of a trustworthy identity
infrastructure
►Identity systems exchange credentials as well as messages and
transactions regarding attributes, provisioning information, and other
data
► Confidentiality
►Confidentiality refers to an organization’s efforts to keep their data
private or secret
►It involves ensuring that only those who are authorized have access to
specific assets
► Availability
►means that networks, systems, and applications are up and running.
►It ensures that authorized users have timely, reliable access to resources
when they are needed.
► Non-repudiation
►means a user cannot deny (repudiate) having performed a transaction.
►authenticates the identity of a user who performs a transaction, and
ensures the integrity of that transaction
► Authentication
►Authentication is the process of verifying the identity of a person or
device.
►A common example is entering a username and password when you log in
to a website.
Firewall
► Access control - is a security term used to refer to a set
of policies for restricting access to information, tools, and
physical locations.
► Effective means of protection of a local system or
network of systems from network-based security threats
while affording access to the outside world via WAN`s or
the Internet
► Types of Firewalls
►Three common types of Firewalls:
►Packet-filtering routers
►Application-level gateways
►Circuit-level gateways
►(Bastion host)
Packet-filtering routers
► Stand-alone system
► Specialized function performed by an Application-level Gateway
► Sets up two TCP connections
► The gateway typically relays TCP segments from one connection
to the other without examining the contents
Bastion Host
► A system identified by the firewall administrator as a
critical strong point in the network´s security
► The bastion host serves as a platform for an application-
level or circuit-level gateway
Cryptography
Cryptography
► Cryptography is the art of protecting information by
encryption/decryption
► Encryption provides security for information while in transit or
in storage
►By converting plain text into unreadable format called cipher
text
►Scrambles content of message using mathematical schemes
and algorithms
► Decryption is the process of converting cipher text back into
plain text
►This is done in conjunction with the use of secret keys
►Only those who possess keys can decrypt the message
Encryption
► Encryption is a process that encodes a message or file so
that it can be only be read by certain people.
► Encryption uses an algorithm to scramble, or encrypt,
data and then uses a key for the receiving party to
unscramble, or decrypt, the information
► Encryption of electronic medical information is to protect
a patient’s privacy
► Hospitals do not archive medical records in public
library
► Access is provided to only medical staff who are
authorized
► In digital world, encryption thwarts unauthorized viewing
Encryption
Types of Encryption
► There are two types of encryption algorithm.
►i)Private Key Encryption
►ii)Public Key Encryption
► With secret key encryption the sender and the receiver
both use the same key to lock and unlock the message.
► The key is known only to these parties
Private Key Encryption
Public key encryption
► In contrast, with public key encryption each user has two unique
keys, a public key and a private one.
► You distribute your public key to correspondents and they use
this key to encrypt messages they send to you.
► Messages encrypted with your public key can only be decrypted
with your private key so that as long as this key remains secret no
one else can read your incoming messages.
► You can similarly encrypt outgoing messages with your
correspondent’s public key so that they can decode them with their
own private key.
► Your private key can also be used to encrypt any message you
send as a digital signature.
► The recipient can decrypt the signature with your public key to
verify your identity and the authenticity of the message.
Public Key Encryption
Phases of Encryption
► Begins with converting the text to a pre-hash code. This code is
generated using a mathematical formula.
► This pre-hash code is encrypted by the software using the sender's
private key.
► The private key would be generated using the algorithm used by the
software.
► The encrypted pre-hash code and the message are encrypted again using
the sender's private key.
► The next step is for the sender of the message to retrieve the public key
of the person this information is intended for.
► The sender encrypts the secret key with the recipient's public key, so
only the recipient can decrypt it with his/her private key, thus concluding
the encryption process.
Phases of Decryption
► The recipient uses his/her private key to decrypt the
secret key.
► The recipient uses their private key along with the
secret key to decipher the encrypted pre-hash code and
the encrypted message.
► The recipient then retrieves the sender's public key. This
public key is used to decrypt the pre-hash code and to
verify the sender's identity.
► The recipient generates a post-hash code from the
message. If the post-hash code equals the pre-hash code,
then this verifies that the message has not been changed
enroute.
Protocols
► The data is configured by each protocol into packets with
each packet carrying a ‘header’ which identifies its
contents
► The protocol used is generally determined to ensure
reliable communications for good quality
► TCP/IP
►Transmission Control Protocol/Internet Protocol, is a
suite of communication protocols used to interconnect
network devices on the internet.
► ISO – OSI
► International organization of Standardization – Open System
Interconnection
TCP/IP
► Specifies how data is exchanged over the internet by
providing end-to-end communications
► Identify how it should be broken into packets,
addressed, transmitted, routed and received at the
destination.
► It is designed to make networks reliable, with the ability
to recover automatically from the failure of any device on
the network.
► Data is sent across the internet as packets. Packet is a
unit of binary bits sent from the source to the destination.
► Only portion of packet contains the actual information
► Remaining bits considered as overheads that facilitate the
transmission process.
► Overheads consist of
►source and destination addresses.
►In addition check sum is used for checking data
integrity at the receiving station.
►Also certain communication protocols to guarantee
delivery
►Quality of Service (QoS) scheme used to prioritize
data traffic
TCP Packet Format
The TCP packet format fields
► Source Port and Destination Port fields (16 bits each) identify the end
points of the connection.
► Sequence Number field (32 bits) specifies the number assigned to the
first byte of data in the current message.
► Acknowledgement Number field (32 bits) contains the value of the
next sequence number that the sender of the segment is expecting to
receive, if the ACK control bit is set.
► Data Offset (Header Length) field (variable length) tells how many 32-
bit words are contained in the TCP header.
► Reserved field (6 bits) must be zero. This is for future use.
► Flags field (6 bits) contains the various flags:
URG—Indicates that some urgent data has been placed.
ACK—Indicates that acknowledgement number is valid.
PSH—Indicates that data should be passed to the application as soon as
possible.
RST—Resets the connection.
SYN—Synchronizes sequence numbers to initiate a connection.
FIN—Means that the sender of the flag has finished sending data.
► Window field (16 bits) specifies the size of the sender's receive window
(that is, buffer space available for incoming data).
► Checksum field (16 bits) indicates whether the header was damaged in
transit.
► Urgent pointer field (16 bits) points to the first urgent data byte in the
packet.
► Options field (variable length) specifies various TCP options.
► Data field (variable length) contains upper-layer information.
Telemedicine system indicating role of TCP/IP
► TCP/IP has become a de facto standard
► Electrodes/sensors placed in human body captures physiological signals.
► Signal is then fed to instrumentation amplifier with high and low pass
filter.
► Filtering is to obtain a noise free signal
► Amplified signal is fed to ADC circuit for analog to digital conversion
► Data is then transferred to remote terminal via network using TCP/IP
protocol
► Networking is based on basic client – server model. A connection is
established between local and remote terminal
► To communicate over TCP – a client program and server program are
developed.
Flow Chart
Ports
► A number assigned to user session and server application in an IP network
► It resides in the header area of the packet being transmitted
► It defines a service (web, email, voice call, video call, etc) and not used for
computer hardware control.
►Port 20 used for FTP-data
►Port 156 used for SQL servers
►Port 80 for HTTP users- web browsing
► These numbers are assigned by Internet Assigned Numbers Authority
(IANA)
► Ports are assigned for specific tasks, some are kept reserves while many
may be unassigned (for application programs)
► Ranges up to 65535
IP addresses
► Addresses are used to locate the computers.
► It is an identifier for a computer or device on TCP/IP network.
► Acts similarly like house address, used to determine where the
network data packets should go.
► Format: 32-Bit numeric address. Written as four sets of numbers
separated by periods. Each number can be from 0 to 255. Eg:
1.180.30.220
► Assigned randomly as long as each one is unique in an isolated
network.
► Private network requires registered IP addresses called Internet
Addresses, to avoid duplicacy
► Can be dynamic or static
ISO - Open System Interconnection
► International Standard Organization(ISO) is responsible
for setting up standards for protocol
► OSI – Open System Interconnection acts as an
international standard for network
► Without standard model like OSI, there won't be any
common point of reference.
OSI Model
► Basis for computer communication is 7-layer ISO reference model
► Each layer performs independently from other layers, but in coordination with
overall goal of communication.
► In this model,
► Communication between network nodes begin in the transmitting node at a
particular protocol level
► Control is successively passed down through set of functional layers that meet
at defined interfaces.
► Process continues until the information reaches the transmission medium from
where it travels to each node along the network.
► Information then reaches the desired destination node from where it begins to
move its way up through the layers until it arrives at the layer similar to that from
which it originated.
► Information appears to simply pass from a layer to corresponding layer – forming a
virtual link between the layers
Layer 7 – Application Layer
► It is the highest layer in the OSI model
► Relates directly to the application process
► Specifically involved with information transfer
► Primarily supports the end user processes
► Message originates at this layer from transmitting machine
and finally received again by the same layer at the
destination
► Data Packets at this layer is called messages
► This layer is also responsible to identify communication
partners, service and constraints and ensure privacy and
security of the data
Layer – 6 Presentation (Syntax) Layer
► Responsible for functions necessary for the negotiations of the
representation of information.
► Concerned only with the syntax and not the memory of the information
(Semantics)
► Different computers may use different coding schemes for data
transmission – eg:
►Some may send most significant bit first and least significant bit last
and some other way around
►Sequence may be different at byte level also.
► This layer carry a code translation i.e back and forth translation between
application and network formats – This way regardless of encryption and
formatting network recognizes the data and presents it in the destination
format.
Layer 5 – Session Layer
► Establishes, Maintains and Releases session connections
► Provides functions necessary for the synchronization of
the dialogue between two systems
► Opens the session between two computers and performs
below functions:
►Connection establishment
►Data Transfer
►Connection release
► Entire activity of data exchange management between
applications is carried out at this layer
Layer 4: Transport Layer
► Messages received from upper layer is broken into units of
information known as packets
► Packets travel in the transmission medium and reach
destination
► Each packets contain its identification information like
source address, destination address, sequence number of
packet and protocol information in addition to actual data
► This layer is responsible for reliable delivery of packets to
the destination by making use of error checking
techniques
Layer 3: Network Layer