{"title":"医院环境下信息系统安全评估","authors":"Suratose Tritilanunt, Surapol Ruaysungnoen","doi":"10.1145/3033288.3033296","DOIUrl":null,"url":null,"abstract":"The purpose of this paper is to propose the risk assessment for an IT security system used in a hospital. The process is developed based on the study of standard and best practices of security risk assessment used in information system. The security assessment includes key processes such as Risk Assessment and Vulnerability Verification along with other factors for supporting the development. Results from the experiment at sample hospitals, our tool was able to assess and rate the security risk which reflects the environment of the hospital's information system. This tool was able to simulate some examples of exploitation in order to test system flaws and generate a report to be used as a reference.","PeriodicalId":253625,"journal":{"name":"International Conference on Network, Communication and Computing","volume":"22 1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Security Assessment of Information System in Hospital Environment\",\"authors\":\"Suratose Tritilanunt, Surapol Ruaysungnoen\",\"doi\":\"10.1145/3033288.3033296\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The purpose of this paper is to propose the risk assessment for an IT security system used in a hospital. The process is developed based on the study of standard and best practices of security risk assessment used in information system. The security assessment includes key processes such as Risk Assessment and Vulnerability Verification along with other factors for supporting the development. Results from the experiment at sample hospitals, our tool was able to assess and rate the security risk which reflects the environment of the hospital's information system. This tool was able to simulate some examples of exploitation in order to test system flaws and generate a report to be used as a reference.\",\"PeriodicalId\":253625,\"journal\":{\"name\":\"International Conference on Network, Communication and Computing\",\"volume\":\"22 1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-12-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Network, Communication and Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3033288.3033296\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Network, Communication and Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3033288.3033296","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Assessment of Information System in Hospital Environment
The purpose of this paper is to propose the risk assessment for an IT security system used in a hospital. The process is developed based on the study of standard and best practices of security risk assessment used in information system. The security assessment includes key processes such as Risk Assessment and Vulnerability Verification along with other factors for supporting the development. Results from the experiment at sample hospitals, our tool was able to assess and rate the security risk which reflects the environment of the hospital's information system. This tool was able to simulate some examples of exploitation in order to test system flaws and generate a report to be used as a reference.