Patient Care Intervention Center

Social

  • Home
  • Media
  • Blog
  • Securing Computer Systems: 3 Ways to Authenticate your Systems

Securing Computer Systems: 3 Ways to Authenticate your Systems

Print Email
(0 votes)

Computer security is the act of protecting computer systems from theft or damage to hardware, software or information, and disruption or misdirection of their services. Many systems are under constant threat of hacking, ranging from individual mobile phones to large establishments. In this post, we will focus on one of the methods used to protect sensitive data – Authentication.

Puneeth Umesh Bharadwaj

Authentication is the process of confirming the accuracy of the data (such as a password) claimed to be true by an individual. The individual can be a human or a machine.

Why do we need authentication? Authentication allows us to control access as well as identify an individual accessing a computer systems. This is akin to asking for a photo ID when checking into a hotel.

There are three mechanisms by which a user or machine can be authenticated:

Knowledge Factor

Something the user knows. For example, a username and password to access their emails.

Ownership Factor

Something the user has. For example, an ID card that acts as a key card used for entry into buildings.

Inherence Factor

Something the user is or does. For example, providing a fingerprint, a retinal scan or a facial recognition to gain access to a secure facility.

There are three ways of authenticating a user when using a computer system – Single Factor Authentication, Two Factor Authentication(2FA) and Multi-Factor Authentication(MFA).

Single Factor is using any one of the three mechanisms to authenticate a user, for example, entering a username and password (Knowledge Factor). While this is one of the most commonly used method for authentication, it is slowly being phased out from being used in computer applications and systems.

2FA is using any two of the mechanisms to authenticate a user. The most common scenario for 2FA is requesting the user to enter a username and password (Knowledge Factor) followed by entering a code that is provided to the user through an App on their phone (Example: Google Authenticator) or a SMS text message or a phone call (Ownership Factor).

MFA is using all three factors to authenticate a user. For example, to access a system, the user will have to first provide their username and password, then enter a code that has been sent to their phone followed by verification of their fingerprint to complete the procedure.

At PCIC, we use MFA because protecting data is one of our top priorities. This includes patient medical history data, employee information, and all of the data we create in-house and with partners. We implement this by developing and integrating the technology into our own EMR system – StreetEMR, as well as requiring all our technology partners and vendors to support the feature.

The digital community is working hard every day to discover and invent novel methods to improve security for access to systems. At PCIC we stay up to date on these methods, to protect our patient and stakeholder data.

Last modified on Friday, 28 July 2017 21:15

Recent Posts

Our Mission

Improve healthcare quality and costs for the vulnerable in our community through data integration and care coordination.

We Envision

Coordinated health safety-net where all stakeholders share data to make better decisions.

Copyright © Healthcare for Special Populations. All rights reserved.
Team Site