Research Article
Leveled Design of Cryptography Algorithms Using Cybernetic Methods for Using in Telemedicine Applications
Table 1
The importance of information security needs in telemedicine technology in the field of information transmission.
| Data transfer | Very important | Important | No idea | Nonsignificant |
| Implement network protocols to ensure the transmission of information and check its integrity | 2/65% | 4/30% | 4/3 | 0 | Establish a communication protocol to share information between local health institutions | 50% | 37% | 13 | 0 | Encrypt important files and information | 2/62% | 6/35% | 0 | 2/2 | Investigation of encryption mechanism by technical team of security assessor | 5/56% | 3/28% | 15/2 | 0 | Use combinations of numbers and letters for encryption | 2/68 | 25 | 6/8 | 0 | Use uppercase and lowercase letters for encryption to access remote network networks | 50% | 24% | 17/4 | 8/7 | Methods for controlling the integrity of application information | 3/53% | 6/35% | 8/9 | 2/2 |
|
|