Terminal Services Notes

  • http://www.quepublishing.com/content/images/0789728494/webresources/A011102.html
  • http://www.sessioncomputing.com/applications.htm
  • http://office.microsoft.com/en-us/ork2000/HA011379551033.aspx

    Disaster and Recovery Planning Resources



    NIST Contingency Planning Templates

    Google Search for \'Business Continuity Templates \'

    http://csrc.nist.gov/publications/nistpubs - Computer Security Resource Center - National Institute of Standards and Technology

    http://csrc.nist.gov/publications/nistpubs/800-34/sp800-34.pdf - National Institute of Standards and Technology - Contingency Planning Guide for Information Technology Systems: PDF - Extremely In-Depth Guide Protecting IT Infrastructure

    http://www.drj.com/new2dr/samples.htm - Sample Plans, Outlines and other Plan writing resources

    http://ctc.aspira.org/planning.html#dr

    http://gita.state.az.us/policies_standards/html/p800_s865_bcdr.htm - State of Arizona - Guidelines for creating

    http://www.utoronto.ca/security/drp.htm University of Toronto Computer and Network Servces - Disaster recovery Planning

    Hospital-Health Care or PACS specific contingency planning:

    The Year 2000 Threat: Preparing Radiology for Nine Realms of Risk - http://radiology.rsnajnls.org/cgi/content/full/210/1/17
    Note: The nine "realms of risk" is intersting
    Computer Crash — Lessons from a System Failure - http://content.nejm.org/cgi/content/full/348/10/881

    Correspondence to the JAMA editors about the above event Note the comments from doctors blaming the "lack of credentials" of IT profesionals. What about the lack of involvement and or engagement of the physicians?

    Security References

    http://www.sans.org/rr/papers/index.php?id=891 - "HIPAA-compliant configuration guidelines for Information Security in a Medical Center environment" by Robert Grenert, GSEC March 12, 2003

    http://www.sans.org/rr/papers - System Administration and Network Security (SANS) Reading Room

    http://www.csrc.nist.gov/publications/nistpubs/ - Computer Security Resource Center (CSRC) of The National Institute for Standards and Technology (NIST)

    http://msdn.microsoft.com/msdnmag/issues/02/09/SecurityTips/default.aspx - Security Tips: Defend Your Code with Top Ten Security Tips Every Developer Must Know -- MSDN Magazine, September 2002:

    http://msdn.microsoft.com/msdnmag/issues/01/11/security/default.aspx - Security Briefs: ASP .NET Security Issues -- MSDN Magazine, November 2001:

    http://www.develop.com/kbrown/book/html/whatis_polp.html - A .NET Developer's Guide to Windows Security: Item 4: What is the principle of least privilege?:

    http://www.develop.com/kbrown/book/html/whatis_anonprivilegeduser.html A .NET Developer's Guide to Windows Security: Item 8: What is a non privileged user?:

    http://www.develop.com/kbrown/book/html/howto_runasnonadmin.html - A .NET Developer's Guide to Windows Security: Item 9: How to develop code as a non-admin:

    http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dv_vstechart/html/tchDevelopingSoftwareInVisualStudioNETWithNon-AdministrativePrivileges.asp - Developing Software in Visual Studio .NET with Non-Administrative Privileges by Lars Bergstrom, Visual Studio Core Team, Microsoft Corporation, December 2003

    http://weblogs.asp.net/gad/archive/2004/01/24/62539.aspx The Importance of the Principle of Least Privilege - An excellent opening paragraph on this article summarizes the reasons for NOT developing code with an administrative account
    "..The most important reason for limiting the security privileges your code requires to run is to reduce the damage that can occur should your code be exploited by a malicious user. If your code only runs with basic user privileges, it’s difficult for malicious users to do much damage with it. If you require users to run your code using administrator privileges, then any security weakness in your code could potentially hand control of that machine (and potentially other connected machines) to malicious code that exploits that weakness."

    http://www.cap-lore.com/CapTheory/ProtInf/ "The Protection of Information in Computer Systems" by JEROME H. SALTZER, SENIOR MEMBER, IEEE, AND MICHAEL D. SCHROEDER, MEMBER, IEEE. from Proceedings of the IEEE. Vol. 63, No. 9 (September 1975), pp. 1278-1308 Manuscript received October 11, 1974; revised April 17. 1975. Copyright © 1975 by J. H. Saltzer. The authors are with Project MAC and the Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology Cambridge, Mass. 02139.

    http://www.whitehouse.gov/pcipb/ - “A National Strategy to Secure Cyberspace” published by President George W. Bush’s “Critical Infrastructure Protection Board” September 2002

    HIPAA Specific references:

  • "HIPAA and Its Legal Implications for Health Care Information Technology Solution Providers", by The Rotbert Law Group LLC and the Information Technology Association of America The paper provides an overview of HIPAA's legal implications for health care IT solution providers such as software vendors, application services providers, outsourcers and system integrators. It focuses on information technology law including HIPAA privacy and security. http://www.itaa.org/isec/docs/hippawhitepaper.pdf

  • "Preparing for HIPAA: Privacy and Security Issues to be Considered", by Sherry Fischer This white paper attempts to answer the question, "Given that faculty are involved in education, research and clinical practice at a variety of affiliated medical and research institutions, and data containing personal health information (PHI) resides in a distributed fashion in a variety of platforms, what are some of the ways that a large medical school can begin to implement HIPAA's controls and overcome the many potential barriers to compliance?" http://www.sans.org/rr/papers/index.php?id=899