Security incident response: rethinking risk management

被引:0
|
作者
Alberts, C [1 ]
Dorofee, A [1 ]
机构
[1] Carnegie Mellon Univ, Inst Software Engn, Pittsburgh, PA 15213 USA
关键词
risk; risk management; risk assessment; HIPAA; security; incident response;
D O I
10.1016/j.ics.2004.03.135
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The Health Insurance Portability and Accountability Act (HIPAA) of 1996 establishes a standard of care for healthcare data security, outlining a set of technical, physical, and administrative security practices intended to protect electronic patient data. The regulation requires organizations to conduct information-security risk assessments to ensure that their security programs effectively mitigate their risks. Because the regulation does not mandate a specific technique, many variants of risk assessments have been employed to satisfy the requirement. This paper examines limitations in process-based risk assessments used by many healthcare organizations to comply with the HIPAA risk assessment requirement. It specifically focuses on the following three limitations: (1) lack of detailed operational context, (2) limited analysis of combinatorial effects of risk conditions, and (3) the tendency for local optimization of risk mitigation efforts. (C) 2004 CARS and Elsevier B.V. All rights reserved.
引用
收藏
页码:141 / 146
页数:6
相关论文
共 50 条
  • [1] Rethinking Security Incident Response: The Integration of Agile Principles
    Grispos, George
    Glisson, William Bradley
    Storer, Tim
    AMCIS 2014 PROCEEDINGS, 2014,
  • [2] A MANAGEMENT MODEL FOR BUILDING A COMPUTER SECURITY INCIDENT RESPONSE CAPABILITY
    Mooi, Roderick D.
    Botha, Reinhardt A.
    SAIEE AFRICA RESEARCH JOURNAL, 2016, 107 (02): : 78 - 91
  • [3] Information security incident response
    BSkyB
    Netw. Secur., 2007, 12 (10-13):
  • [4] Security analytics: Risk analysis for an organisation's incident management processes
    Mont, M.C. (marco.casassa-mont@hp.com), 1600, Hewlett Packard Laboratories
  • [5] From incident response to incident response management
    Johnsen, SO
    Rostad, L
    Haugset, B
    Dahl, MB
    PROBABILISTIC SAFETY ASSESSMENT AND MANAGEMENT, VOL 1- 6, 2004, : 122 - 127
  • [6] Rethinking Risk Management
    Stulz, Rene M.
    JOURNAL OF APPLIED CORPORATE FINANCE, 2022, 34 (01) : 32 - 46
  • [7] Rethinking Sport Event Security: From Risk Management to a Community Driven Approach
    Menaker, Brian E.
    Sheptak, Dale
    Kurland, Justin
    Tekin, Derya
    JOURNAL OF GLOBAL SPORT MANAGEMENT, 2024, 9 (02) : 346 - 368
  • [8] Security Operations Centers for Information Security Incident Management
    Miloslayskaya, Natalia
    2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2016), 2016, : 131 - 138
  • [9] How integration of cyber security management and incident response enables organizational learning
    Ahmad, Atif
    Desouza, Kevin C.
    Maynard, Sean B.
    Naseer, Humza
    Baskerville, Richard L.
    JOURNAL OF THE ASSOCIATION FOR INFORMATION SCIENCE AND TECHNOLOGY, 2020, 71 (08) : 939 - 953
  • [10] Workflow based security incident management
    Belsis, MA
    Simitsis, A
    Gritzalis, S
    ADVANCES IN INFORMATICS, PROCEEDINGS, 2005, 3746 : 684 - 694