Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/2439
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAlhassan, J. K.-
dc.contributor.authorAbba, Emmanuel-
dc.contributor.authorOlaniyi, O. M.-
dc.contributor.authorWaziri, Victor O.-
dc.date.accessioned2021-06-09T19:34:44Z-
dc.date.available2021-06-09T19:34:44Z-
dc.date.issued2016-11-
dc.identifier.issn2545-5192-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/2439-
dc.description.abstractElectronic health systems (EHS) serve as information management systems for health records of patients which are various data generated from interactions between patients and medical personnel. The security of electronic health system is vital due to the growing acceptance of their use. There is a need to assure users that the data generated and stored on the EHS are protected from adversaries. In the case where the data is already compromised, it is imperative to locate the source of the threat as quickly as possible and implement appropriate countermeasures against such vulnerabilities starting from the highest vulnerable point to lower vulnerabilities. In this study, a threat security model for the EHS was proposed from identified threats which were then discussed. Based on these threats, possible counter measures for authentication and authorization control were highlighted. The threat model was developed through a procedure that guarantees the integrity, availability and confidentiality of health records. The procedure involves using the STRIDE threat modelling tool to identify potential threats which were then ranked with respect to the amount of risk they pose to the system based on scores calculated using DREAD; a threat-risk rating model. The result is a collection of identified and rated threat in order of decreasing risk to an EHS. Careful consideration of the resulting threat rating model by information system security professional will lead to the development of secure systems and provide a guide to the order in which vulnerabilities should be patched in compromised existing systems.en_US
dc.language.isoenen_US
dc.publisherInternational Conference on Information and Communication Technology and its Applications,en_US
dc.subject-threat modeling; electronic health system; countermeasures; attacks; authentication; authorizationen_US
dc.titleThreat Modeling of Electronic Health Systems and Mitigating Countermeasuresen_US
dc.typeArticleen_US
Appears in Collections:Computer Science

Files in This Item:
File Description SizeFormat 
Threat Modeling of Electronic Health Systems and Mitigating Countermeasures.pdf567.09 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.