Security of medical data transfer and storage in Internet. Cryptography, antiviral security and electronic signature problems, which must be solved in.

Slides:



Advertisements
Similar presentations
Numbers Treasure Hunt Following each question, click on the answer. If correct, the next page will load with a graphic first – these can be used to check.
Advertisements

Accredited Supplier Communications Plan FY09-10 Q1 to Q4 May 2009, v2.0 Home Access Marketing & Stakeholder Engagement Team.
Using Matrices in Real Life
AP STUDY SESSION 2.
1
Feichter_DPG-SYKL03_Bild-01. Feichter_DPG-SYKL03_Bild-02.
Select from the most commonly used minutes below.
1 Copyright © 2002 Pearson Education, Inc.. 2 Chapter 2 Getting Started.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Copyright © 2013 Elsevier Inc. All rights reserved.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
Manuscript Central Training Author Center Module 2.
RXQ Customer Enrollment Using a Registration Agent (RA) Process Flow Diagram (Move-In) Customer Supplier Customer authorizes Enrollment ( )
Instructions for Filling out the Reintegration Opportunity Report Savable PDF Training.
David Burdett May 11, 2004 Package Binding for WS CDL.
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
Local Customization Chapter 2. Local Customization 2-2 Objectives Customization Considerations Types of Data Elements Location for Locally Defined Data.
Process a Customer Chapter 2. Process a Customer 2-2 Objectives Understand what defines a Customer Learn how to check for an existing Customer Learn how.
Welcome PC-ACE Pro32 Training
1 Pretty Good Privacy (PGP) Security for Electronic .
1 Chapter 12 File Management Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
PUBLIC KEY CRYPTOSYSTEMS Symmetric Cryptosystems 6/05/2014 | pag. 2.
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
The 5S numbers game..
Photo Slideshow Instructions (delete before presenting or this page will show when slideshow loops) 1.Set PowerPoint to work in Outline. View/Normal click.
© Tally Solutions Pvt. Ltd. All Rights Reserved Shoper 9 License Management December 09.
INTERNET PROTOCOLS Class 9 CSCI 6433 David C. Roberts Entire contents copyright 2011, David C. Roberts, all rights reserved.
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
Student & Work Study Employment Facts & Time Card Training
Version 1.0 digitaloffice.intel.com Intel ® vPro Technology Intel ® Active Management Technology Setup and Configuration HP Laptop – Compaq 6910p Small.
Break Time Remaining 10:00.
This module: Telling the time
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
PP Test Review Sections 6-1 to 6-6
EIS Bridge Tool and Staging Tables September 1, 2009 Instructor: Way Poteat Slide: 1.
Physical Aspects [Reflection Modelling] Hauptseminar: Augmented Reality for Driving Assistance in Cars.
Operating Systems Operating Systems - Winter 2010 Chapter 3 – Input/Output Vrije Universiteit Amsterdam.
Exarte Bezoek aan de Mediacampus Bachelor in de grafische en digitale media April 2014.
15. Oktober Oktober Oktober 2012.
Sample Service Screenshots Enterprise Cloud Service 11.3.
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
 Copyright I/O International, 2013 Visit us at: A Feature Within from Item Class User Friendly Maintenance  Copyright.
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
Adding Up In Chunks.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Synthetic.
1 How Do I Order From.decimal? Rev 05/04/09 This instructional training document may be updated at anytime. Please visit and check the.
GEtServices Services Training For Suppliers Requests/Proposals.
: 3 00.
5 minutes.
1 hi at no doifpi me be go we of at be do go hi if me no of pi we Inorder Traversal Inorder traversal. n Visit the left subtree. n Visit the node. n Visit.
Mushroom Softech Pvt. Ltd.1 eCRM-Presentation Security Administration Home/Login page General Masters Customer Registration Customer Wise Search Fill up.
Speak Up for Safety Dr. Susan Strauss Harassment & Bullying Consultant November 9, 2012.
Essential Cell Biology
Clock will move after 1 minute
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 9 TCP/IP Protocol Suite and IP Addressing.
PSSA Preparation.
Essential Cell Biology
A lesson approach © 2011 The McGraw-Hill Companies, Inc. All rights reserved. a lesson approach Microsoft® PowerPoint 2010 © 2011 The McGraw-Hill Companies,
Select a time to count down from the clock above
Murach’s OS/390 and z/OS JCLChapter 16, Slide 1 © 2002, Mike Murach & Associates, Inc.
© Paradigm Publishing, Inc Excel 2013 Level 2 Unit 2Managing and Integrating Data and the Excel Environment Chapter 6Protecting and Sharing Workbooks.
1 DIGITAL INTERACTIVE MEDIA Wednesday, October 28, 2009.
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
Presentation transcript:

Security of medical data transfer and storage in Internet. Cryptography, antiviral security and electronic signature problems, which must be solved in nearest Future in practical context Piotr Kasztelowicz Piotr Kasztelowicz (Ludwig Rydygier Hospital, Torun) Marek Czubenko, Iwona Zięba Marek Czubenko, Iwona Zięba (Nicholas Copernicus University, Torun)

Telemedicine inter- and intradisciplinary applications May 23-25, Security - Important problem In medicine it seems more important to avoid transporting and spreading computing viruses, hacking including illegal information capturing from broken servers and destroying servers as well as other network components. The Law in many countries takes into considerations the legal problem associated with computer and network. Especially specific regulations concerning new technologies in context of Internet publications should be created - the law for authors – copyrights

Telemedicine inter- and intradisciplinary applications May 23-25, Local regulations In our opinion except general used legal principles a local regulation code should be created and requested for use. Authorities, who will use Internet for professional medical information transfer can in this situation, if any code exists, keep in their hands important instruments to secure this network Strong careful controls are not necessary, here it seems to be recommended more education activity to learn network users, how to avoid possible complications and what is allowed to do in their network activity

Telemedicine inter- and intradisciplinary applications May 23-25, Elements of code (1) Principles of usage PC-computers connected to network Principles of creating, storing and protecting account password to data, servers and services Principles which way and who will be informed about network accidents and damage or problems and how many time need to be to react on such signals. Existing of helpdesk for users is very desirable. Instruments for network and institutional authorities, operators including administrators of whole network and detailed network services (for instance discussing list moderators). Here any special services can posses their separate regulations

Telemedicine inter- and intradisciplinary applications May 23-25, Elements of code (2) Network security systems and regulation, how punish attempts of it abuse. What kinds of proofs should be collected before removing a user from network in such cases. Principles to avoid publishing and spreading inappropriate information (propagated sexual violation, racism, other illegal information, permanent, not accepted by institution serving network) to remove it form servers Principles of accessing and staying in rooms, where are placed computers and other network elements.

Telemedicine inter- and intradisciplinary applications May 23-25, Passwords avoid to set a password containing simple and known phrases or data, which are characteristic for him or his family (name of wife, date of birth of daughter, registration number of users car) password should be difficult to break it and it should contain minimum eight characters including at least: one letter, one digit and one special character

Telemedicine inter- and intradisciplinary applications May 23-25, Password protection The user should know, he must not give his account to network and password to other persons and to write down password the way, that it can not be simple captured. Network administrator has an important role to educate all, how crucial to network security significance in Internet plays appropriate password protection.

Telemedicine inter- and intradisciplinary applications May 23-25, confidentiality levels free free professional professional confidential confidential

Telemedicine inter- and intradisciplinary applications May 23-25, Free the information are completely free. There are no access limitation for access to it. There is permission to copy it to others or cite.

Telemedicine inter- and intradisciplinary applications May 23-25, Professional this is form of limited access to information, which give permission to get it. if conditions of subscription has been met. The user will be asked to read the code, fill in a form to get access, sometimes to pay a fee. This same level can have the information on net, which seemingly are totally free, but copyright or permission to resent it has been not allowed. Here should be distinguished intentional permission as very important not to t violate the network etiquette and privacy. Intentional permission is like the principle of opened door with inscription, who can go in

Telemedicine inter- and intradisciplinary applications May 23-25, Confidential the information are especially protected and can be read by permitted individuals only. It has respect to a large extent of telemedicine, where information about a patient has being transferred through net.

Telemedicine inter- and intradisciplinary applications May 23-25, Access control systems – the most important tools of server administrator Control access is most often used and typical to assure a higher degree of security of server This tool can specify the host, which can be permitted to connect to any given port of our server and to accept particular services and reject access from the places, which we can consider to be suspicious of hacking our server Our team has good experience with this method and introducing it to all service can effective protect a medical server from destroying

Telemedicine inter- and intradisciplinary applications May 23-25, Example 1 - server Dorota An example of unpermitted access to server Dorota to ftp, connection has been refused Sep 3 00:30:38 dorota ftpd[15251]: refused connect from alfa.robot.plikoskop.pl Sep 5 15:09:06 dorota ftpd[1160]: refused connect from a upc-a.chello.nl Sep 6 00:29:47 dorota ftpd[3177]: refused connect from ip evhr.net Sep 8 05:17:02 dorota ftpd[14710]: refused connect from salesjobs.com Sep 8 21:17:33 dorota ftpd[18394]: refused connect from rsh.man.poznan.pl

Telemedicine inter- and intradisciplinary applications May 23-25, Example 2 - server Nike An example of unpermitted access to server Nike to ftp, connection has been refused Sep 4 22:46:57 nike ftpd[20570]: refused connect from Sep 5 15:02:47 nike ftpd[24384]: refused connect from a upc-a.chello.nl Sep 6 00:16:11 nike ftpd[26663]: refused connect from ip evhr.net Sep 7 21:05:14 nike ftpd[6811]: refused connect from Sep 8 04:47:45 nike ftpd[8817]: refused connect from Sep 8 19:57:41 nike ftpd[12701]: refused connect from rsh.man.poznan.pl

Telemedicine inter- and intradisciplinary applications May 23-25, Example of DNS data violation Here was foiled attempt to retrieve by intruder records from domain names server from Sun. DNS is an important service for all networks, therefore information including such data should be primarily secured :35: tcpserver: status: 0/ :28: tcpserver: status: 1/ :28: tcpserver: pid 7240 from :28: tcpserver: deny : :53 : ::1897

Telemedicine inter- and intradisciplinary applications May 23-25, PGP - public key -----BEGIN PGP PUBLIC KEY BLOCK----- Version: GnuPG v1.0.4 (SunOS) Comment: For info see mQGiBDpU6zYRBADG3EmYOWIfZQeg8pcsJjDkvRK5RFDIEK3wGOMPGidIJ318n4ee xQF4BJZAo/nIkiaKi3mUDD9qJBuwXB7Dm0+WBD/RovGcHNDsNJZGLA5XE3AQUjMa NmDluSf/vq3lSOsGGmWm1ZiX/+qb4wrZNv+1nnbESAM2MvZklThgsAOfpwCgy6Gj BYlG0qwregGWIq2mLdqXoRcEAKqBlPgRyfbbcmKLl9qQrcraeAsTFAQf9JYkVnzs co4/GoWW3g3QGfhfbHqgmhRvhceU01iVYwUbPwo8ijshcgGth2TbMc6Eu0XInfS6 o3Eh7MdAGqJOXMj6jlgVr3lxaLogRxy2C/3hiYQ3hTIQVtBDN3bkNohuH6fUgTHQ y1Q4A/422X/5fk2tsU4tSuzmzERSsX/3LQJQ1rNp0oD4t8TDD+63c4bf+TSwO9FT 91uuqeCTk/4a5TsLtZa5AvrPxevvScZf4+NvFMB5Y0j5WIPcUh8tuz+WOIUvXgtO 3KhduLLWKFBrVUZ0SWsW5YYbrw9NZbZ8SEpN1VzDvCh6sGQS6rQwUGlvdHIgS2Fz enRlbG93aWN6IChwZWthc3opIDxwZWthc3pAYW0udG9ydW4ucGw+iFcEExECABcF AjpU6zYFCwcKAwQDFQMCAxYCAQIXgAAKCRBdOHPy8+7YrxTJAKClzp37Qw7Fdnyg VjXL+B+FQCquIwCdEy9KkL/n2rUA1Yyg0FWD43jFSFe0PFBpb3RyIEthc3p0ZWxv d2ljeiAocGVrYXN6KSA8UGlvdHIuS2FzenRlbG93aWN6QGFtLnRvcnVuLnBsPohX BBMRAgAXBQI6XMl6BQsHCgMEAxUDAgMWAgECF4AACgkQXThz8vPu2K9r0gCghgk3 PDpkf314abypPNOerM9YubIAoMRmvKcDYQE1MKNl62IbCOb66vO+uQENBDpU69MQ BADaARDwJib9ls/ghnwYAEVXxVZ1Y8Of5F+w96yAJElXXbDjA00oS3iq7j1Z5su0 O1qvCLfZs8EBCWqXNG/Co0Zvr3xss68mvLofsA4FVJEjxrZEc9Qqqm/RUMy3sqig whTLxGDymntb5Hze8gazI4rxp+hWVKkoTtNds/uV1i+efwADBwQAk29GZ8aaqA8F 7FKtcIjBq+WrHc+XZDsJRFz0lAwP3tHcD5Zvzl/UdZjq5U3n9T9zYLfR3iZdGY5u sjaMeRgglxIbTOZPkgVAUXM9OD5pTdV1RsUrQoTv3LN9bPFGpN3D8QWTN6gvzDxN miA4QFc8FQQHp9xr1vVmnoBrX7HUIDyIRgQYEQIABgUCOlTr0wAKCRBdOHPy8+7Y r1cgAJ9E1oJHSptidiU8Bw5s5oKMRJanHACgyMMkGU89aspVrpWLhq0IvOVwXck= =gvP/ -----END PGP PUBLIC KEY BLOCK-----

Telemedicine inter- and intradisciplinary applications May 23-25, Letter with electronic signature Date: Sat, 8 Sep :36: (MET DST) To: Subject: test podpisanej przesylki -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ta przesylka jest zaopatrzona w elektroniczny podpis -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.4 (SunOS) Comment: For info see iD8DBQE7mo9lXThz8vPu2K8RAoBtAJ0QZAbLdVrzlUN7hcwRFbDg4OlTGwCfcwzk Olrv7EshRYaR4Hr2p0/KfN8= =rJK END PGP SIGNATURE-----

Telemedicine inter- and intradisciplinary applications May 23-25, Verification of signature Date: Sat, 8 Sep :36: (MET DST) From: Piotr Kasztelowicz To: Subject: test podpisanej przesylki ta przesylka jest zaopatrzona w elektroniczny podpis Output from gpg gpg: Signature made Sat Sep 08 23:36: MET DST using DSA key ID F3EED8AF gpg: Good signature from "Piotr Kasztelowicz (pekasz) " gpg: aka "Piotr Kasztelowicz (pekasz) "

Telemedicine inter- and intradisciplinary applications May 23-25, Signing MS-Word document

Telemedicine inter- and intradisciplinary applications May 23-25, Signing

Telemedicine inter- and intradisciplinary applications May 23-25, Verification signed file (document)

Telemedicine inter- and intradisciplinary applications May 23-25, PGP 7.0.3

Telemedicine inter- and intradisciplinary applications May 23-25, Keys properties

Telemedicine inter- and intradisciplinary applications May 23-25, Sending encrypted mail

Telemedicine inter- and intradisciplinary applications May 23-25, Encrypting

Telemedicine inter- and intradisciplinary applications May 23-25, Encrypted mail

Telemedicine inter- and intradisciplinary applications May 23-25, Decrypting

Telemedicine inter- and intradisciplinary applications May 23-25, Signature verifing

Telemedicine inter- and intradisciplinary applications May 23-25, Decrypted message

Telemedicine inter- and intradisciplinary applications May 23-25, GnuPG/PGP Software compatibility -----BEGIN PGP MESSAGE BEGIN PGP MESSAGE----- Version: GnuPG v1.0.6 (SunOS) Version: GnuPG v1.0.6 (SunOS) Comment: For info see Comment: For info see hQEOA21Q97XJMIdpEAQAqhwOOnhVgbal5ZWjWEvYh0oG 5Lp/dTtb8pEs324fodFp hQEOA21Q97XJMIdpEAQAqhwOOnhVgbal5ZWjWEvYh0oG 5Lp/dTtb8pEs324fodFp b4GNpe3LXVJRmLmoX6u/Ar/bAWEZtCTHDqNWVoiZjTNL pChKdrdPcnQthgF/g+2V b4GNpe3LXVJRmLmoX6u/Ar/bAWEZtCTHDqNWVoiZjTNL pChKdrdPcnQthgF/g+2V g42vZbX9BYhJV+2/akKqP+xFsF7FSmUWwXZ6tlMdMtMy 5h14z4cPsvY+W5vLG2UD g42vZbX9BYhJV+2/akKqP+xFsF7FSmUWwXZ6tlMdMtMy 5h14z4cPsvY+W5vLG2UD +gJtZPF6Yy//HyAsUo+imWkD8VdCVnEcVbLGLAo7TAm+ fVFsOhAF+XomuOHzMzMX +gJtZPF6Yy//HyAsUo+imWkD8VdCVnEcVbLGLAo7TAm+ fVFsOhAF+XomuOHzMzMX PqsByAUDYxYXP+v1UYXH4gRzuZSKOKGjJVxieZEo6rOT QCCjHtLJVWCzBRKha7/o PqsByAUDYxYXP+v1UYXH4gRzuZSKOKGjJVxieZEo6rOT QCCjHtLJVWCzBRKha7/o J4yceVMPMj/oxZCOtBIARMpf1erRZiiRRSHWXtUWIyRK ycAGNAWxVW1oN55sdLag J4yceVMPMj/oxZCOtBIARMpf1erRZiiRRSHWXtUWIyRK ycAGNAWxVW1oN55sdLag UBpWX6fjyd6at0aisaeQioZRy0DGFwfJgz2ncrwS0KYh m/ofJsO8fj7P64skSbeB UBpWX6fjyd6at0aisaeQioZRy0DGFwfJgz2ncrwS0KYh m/ofJsO8fj7P64skSbeB D65eN7gpyLygP2ouV8XrcBwtzb2XEAIzGt0lmgn1HAOY 50Yq9eohYXFqd1els2l3 D65eN7gpyLygP2ouV8XrcBwtzb2XEAIzGt0lmgn1HAOY 50Yq9eohYXFqd1els2l3 izPglAEXr50Lk1il2te4/CQa8MusniE+WxQ2rkJcVtj0 GT2zOe3QInI2v99HTI4o izPglAEXr50Lk1il2te4/CQa8MusniE+WxQ2rkJcVtj0 GT2zOe3QInI2v99HTI4o ZUwfEOjoBrQXObgUgXYkEceKKovn+AcqQ0sOu01L8+d8 sHh7/CtvX5Ld ZUwfEOjoBrQXObgUgXYkEceKKovn+AcqQ0sOu01L8+d8 sHh7/CtvX5Ld =Doyx =Doyx -----END PGP MESSAGE END PGP MESSAGE----- *** PGP Signature Status: good *** Signer: Piotr Kasztelowicz (pekasz) *** Signed: :24:14 *** Verified: :11:07 *** BEGIN PGP DECRYPTED/VERIFIED MESSAGE *** test --- Piotr Kasztelowicz [ *** END PGP DECRYPTED/VERIFIED MESSAGE ***

Telemedicine inter- and intradisciplinary applications May 23-25, Keyserver of Polish Cardiac Society Protocol - http Protocol - http Server - sun.lodz.ptkardio.pl Server - sun.lodz.ptkardio.pl Port Port

Telemedicine inter- and intradisciplinary applications May 23-25, Retrieving key from keyserver

Telemedicine inter- and intradisciplinary applications May 23-25, Antiviral protection Computing viruses in last years periodically attack computing systems and software They are significant source of problems, losses of profits in commercial system and damages in attacked computers Paradoxically, other than in case of hacking, viruses very seldom destroy internet servers but are only transferred through to Windows workstations, where the devastation is done It is necessary to use on our computer connected to Internet at least two antiviral software –one from this two with function of activity monitoring

Telemedicine inter- and intradisciplinary applications May 23-25, Principles how avoid infection (1) it should be avoided to open attachments, and installing it on disks when obtained from unknown persons or from persons, who are us known, but from content of mail body (information) dont follow, that this person will send us such file. The peoples, who send binaries as attachments should inform about it in message body and inform, from which sources originates a file and which with antiviral software has been checked it should be used to send normal message body only simple text mode, do not use RTF or www form. This can secure of pinning the virus itself to messages. Simple text mode messages are not able to transfer viruses.

Telemedicine inter- and intradisciplinary applications May 23-25, Principles how avoid infection (2) There should be avoided to use software on workstation to connect with mailservers, which has known bad opinion as viruses transferplaces. We highly recommend Pegasus- Mail or Eudora (including useful Eudora-Light) as free, proven and safe.

Telemedicine inter- and intradisciplinary applications May 23-25, Antiviral scanners installed on server A new way to protect our computer against infection is to install antiviral scanner on mail server. The idea is to remove virus before it reaches the target place – work station The scanners installed on mail servers protect many users not only to get containing such a virus but to send a virus to other peoples from our computer as well In our servers we will gradually install this high effective protection tool

Telemedicine inter- and intradisciplinary applications May 23-25, Working of scaner Date: 16 Sep :05: From: To: Subject: VIRUS IN YOUR MAIL TO V I R U S A L E R T Our viruschecker found a VIRUS in your to We stopped delivery of this ! Now it is on you to check your system for viruses For further information about this viruschecker see: AMaViS - A Mail Virus Scanner, licenced GPL

Telemedicine inter- and intradisciplinary applications May 23-25, example of efficiency to stop popular Romeo & Juliet virus Now it is on you to check your system for viruses Originally bin/qmail-local -- alias /var/qmail/alias Piotr.Kasztelowicz - Piotr.Kasztelowicz lodz.ptkardio.pl The mail has been stored as /var/virusmails/alias/virus xxxxxxxxxxxxxxxxxxSun Sep 16 18:05:38 MET DST 2001xxxxxxxxxxxxxxxxxxxxxxx qmail-local (0.2.1) called -- alias /var/qmail/alias Piotr.Kasztelowicz - Piotr.Kasztelowicz lodz.ptkardio.pl FROM: TO: maxlevel: 0 Contents of /var/tmp/qmail-local24862/unpacked.: total 86 drwx alias nofiles 512 Sep 16 18:05. drwx alias nofiles 512 Sep 16 18:05.. -rw alias nofiles 242 Sep 16 18: sun drwx alias nofiles 512 Sep 16 18:05 SFX -rw alias nofiles 6360 Sep 16 18:05 xjuliet.chm -rw alias nofiles Sep 16 18:05 xromeo.exe

Telemedicine inter- and intradisciplinary applications May 23-25, Safe network behaviour Establishing common security standards for medical network community based on simple but proven rules and software Educating medical professional s the safe network behaviour Installing antiviral scanners on mail servers and using antiviral software on work stations Creating legal codes to guard network and systems against abusive activity Still monitoring and interchanging information about potential security problems and methods to solve it.