Please wait a minute...
Computer & Telecommunication  2016, Vol. 1 Issue (6): 65-66    DOI:
Current Issue | Archive | Adv Search |
Research on the Tertiary Hospital Informatization Level Protection Plan
Yu Xiangqian
The Second Affiliated Hospital of Soochow University
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  Hospital computer network is the carrier of communication and office automation. The flow and stability is of great significance. In recent years, all kinds of safety accidents emerge endlessly, causing a potential loss that cannot be underestimated to the normal operation of hospital. Information security is not a pure technical question. It needs focus on the safety management while using security technology and products, and constantly improve various rules and regulations and operation procedures of safety management, improving safety management level.
Key wordslevel protection      information security      system risk     
Published: 13 November 2017
ZTFLH:  TP309  

Cite this article:

Yu Xiangqian. Research on the Tertiary Hospital Informatization Level Protection Plan. Computer & Telecommunication, 2016, 1(6): 65-66.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2016/V1/I6/65

[1] YANG Ye. Research on the Information Security and Management Major Personnel Training Based on“1+X”Certificate System[J]. 电脑与电信, 2021, 1(6): 6-8.
[2] KUANG Hui. Research on Information Security of Computer Network in 5G Communication Era[J]. 电脑与电信, 2020, 1(8): 33-.
[3] ZHANG Shi-jun. Research on the EarlyWarning and Control System of Information Security Incident Based onWebsite[J]. 电脑与电信, 2017, 1(12): 50-52.
[4] Zhao Xiaomeng, Zhou Junjie. Management System of Mobile Payment Based on Short-range Visible Light Communication[J]. 电脑与电信, 2017, 1(10): 10-13.
[5] Bai Yu. Analysis on Network Security and Information Encryption Technology[J]. 电脑与电信, 2016, 1(8): 53-54.
[6] Xu Haidong. Research and Suggestion on Data Privacy Protection in Cloud Computing[J]. 电脑与电信, 2016, 1(8): 112-113.
[7] Lai Jinzhi. Research on Information Security Protection System of Campus Network in Higher Vocational Colleges[J]. 电脑与电信, 2016, 1(7): 65-67.
[8] Chen Zhangrong. Research on the Computer Information Security Technology and Its Protection[J]. 电脑与电信, 2016, 1(7): 68-70.
[9] Zhong Gengfang. Study on the Enterprise Mobile Application Security Scheme[J]. 电脑与电信, 2015, 1(8): 64-66.
[10] Zhang Tao, Yin Mengjia, Chen Xiaowen. Design and Research on Information Security Course Experiment Teaching[J]. 电脑与电信, 2015, 1(5): 19-21.
[11] Li Yingjie. The Application of VPN Technology in Computer Network Information Security[J]. 电脑与电信, 2015, 1(5): 27-28.
[12] Zhang Zheng. Study on the Control of Modern Enterprise Information Security Ri[J]. 电脑与电信, 2015, 1(4): 74-76.
[13] Cai Zhifeng. Research on the Computer Network Information Security and Protection Strategy in Colleges and Universities[J]. 电脑与电信, 2015, 1(10): 23-25.
[14] Liu Yi. Research of P2P Technology Base on Public Information Security[J]. , 2011, 1(05): 0-0.
[15] Chen Huangwei . E-government Information Security Technology Briefly Reviewed[J]. , 2011, 1(05): 0-0.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd