Security incident response: rethinking risk management

被引:0
|
作者
Alberts, C [1 ]
Dorofee, A [1 ]
机构
[1] Carnegie Mellon Univ, Inst Software Engn, Pittsburgh, PA 15213 USA
关键词
risk; risk management; risk assessment; HIPAA; security; incident response;
D O I
10.1016/j.ics.2004.03.135
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The Health Insurance Portability and Accountability Act (HIPAA) of 1996 establishes a standard of care for healthcare data security, outlining a set of technical, physical, and administrative security practices intended to protect electronic patient data. The regulation requires organizations to conduct information-security risk assessments to ensure that their security programs effectively mitigate their risks. Because the regulation does not mandate a specific technique, many variants of risk assessments have been employed to satisfy the requirement. This paper examines limitations in process-based risk assessments used by many healthcare organizations to comply with the HIPAA risk assessment requirement. It specifically focuses on the following three limitations: (1) lack of detailed operational context, (2) limited analysis of combinatorial effects of risk conditions, and (3) the tendency for local optimization of risk mitigation efforts. (C) 2004 CARS and Elsevier B.V. All rights reserved.
引用
收藏
页码:141 / 146
页数:6
相关论文
共 50 条
  • [31] A Maturity Model for IT-Related Security Incident Management
    Wahlgren, Gunnar
    Kowalski, Stewart
    BUSINESS INFORMATION SYSTEMS, PT I, 2019, 353 : 203 - 217
  • [32] Computer Security Incident Response Team Development and Evolution
    Ruefl, Robin
    Dorofee, Audrey
    Mundie, David
    Householder, Allen D.
    Murray, Michael
    Perl, Samuel J.
    IEEE SECURITY & PRIVACY, 2014, 12 (05) : 16 - 26
  • [33] Prerequisites for building a computer security incident response capability
    Mooi, Roderick
    Botha, Reinhardt A.
    2015 INFORMATION SECURITY FOR SOUTH AFRICA - PROCEEDINGS OF THE ISSA 2015 CONFERENCE, 2015,
  • [34] DSS for computer security incident response applying CBR and collaborative response
    Kim, Huy Kang
    Im, Kwang Hyuk
    Park, Sang Chan
    EXPERT SYSTEMS WITH APPLICATIONS, 2010, 37 (01) : 852 - 870
  • [35] Rethinking Risk Management: The Combination of Financial and Industrial Risk
    Jurgen Zech
    The Geneva Papers on Risk and Insurance - Issues and Practice, 2001, 26 : 71 - 82
  • [36] Rethinking risk management: The combination of financial and industrial risk
    Zech, J
    GENEVA PAPERS ON RISK AND INSURANCE-ISSUES AND PRACTICE, 2001, 26 (01): : 71 - 82
  • [37] ICT security management and risk management
    Schreurs, Jeanne
    Moreau, Rachel
    15TH EUROPEAN CONCURRENT ENGINEERING CONFERENCE/5TH FUTURE BUSINESS TECHNOLOGY CONFERENCE, 2008, : 63 - 68
  • [38] Should corporate management include a Computer Forensics and Incident Response capability into realigned Information Security Principles?
    Wright, Paul
    INTERNATIONAL REVIEW OF INFORMATION ETHICS, 2009, 10 : 15 - 22
  • [39] The efficiency of ICT suppliers' product security incident response teams in reducing the risk of exploitation of vulnerabilities in the wild
    Singidunum University, Serbia
    Comput Secur, 2025, 152
  • [40] PROFESSIONAL LIABILITY RISK MANAGEMENT AND INCIDENT MANAGEMENT IN OBSTETRICS
    KRAUS, N
    JOURNAL OF NURSE-MIDWIFERY, 1985, 30 (05): : 295 - 296