Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/2439
Title: Threat Modeling of Electronic Health Systems and Mitigating Countermeasures
Authors: Alhassan, J. K.
Abba, Emmanuel
Olaniyi, O. M.
Waziri, Victor O.
Keywords: -threat modeling; electronic health system; countermeasures; attacks; authentication; authorization
Issue Date: Nov-2016
Publisher: International Conference on Information and Communication Technology and its Applications,
Abstract: Electronic health systems (EHS) serve as information management systems for health records of patients which are various data generated from interactions between patients and medical personnel. The security of electronic health system is vital due to the growing acceptance of their use. There is a need to assure users that the data generated and stored on the EHS are protected from adversaries. In the case where the data is already compromised, it is imperative to locate the source of the threat as quickly as possible and implement appropriate countermeasures against such vulnerabilities starting from the highest vulnerable point to lower vulnerabilities. In this study, a threat security model for the EHS was proposed from identified threats which were then discussed. Based on these threats, possible counter measures for authentication and authorization control were highlighted. The threat model was developed through a procedure that guarantees the integrity, availability and confidentiality of health records. The procedure involves using the STRIDE threat modelling tool to identify potential threats which were then ranked with respect to the amount of risk they pose to the system based on scores calculated using DREAD; a threat-risk rating model. The result is a collection of identified and rated threat in order of decreasing risk to an EHS. Careful consideration of the resulting threat rating model by information system security professional will lead to the development of secure systems and provide a guide to the order in which vulnerabilities should be patched in compromised existing systems.
URI: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/2439
ISSN: 2545-5192
Appears in Collections:Computer Science

Files in This Item:
File Description SizeFormat 
Threat Modeling of Electronic Health Systems and Mitigating Countermeasures.pdf567.09 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.