Security incident response: rethinking risk management

被引:0
|
作者
Alberts, C [1 ]
Dorofee, A [1 ]
机构
[1] Carnegie Mellon Univ, Inst Software Engn, Pittsburgh, PA 15213 USA
关键词
risk; risk management; risk assessment; HIPAA; security; incident response;
D O I
10.1016/j.ics.2004.03.135
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The Health Insurance Portability and Accountability Act (HIPAA) of 1996 establishes a standard of care for healthcare data security, outlining a set of technical, physical, and administrative security practices intended to protect electronic patient data. The regulation requires organizations to conduct information-security risk assessments to ensure that their security programs effectively mitigate their risks. Because the regulation does not mandate a specific technique, many variants of risk assessments have been employed to satisfy the requirement. This paper examines limitations in process-based risk assessments used by many healthcare organizations to comply with the HIPAA risk assessment requirement. It specifically focuses on the following three limitations: (1) lack of detailed operational context, (2) limited analysis of combinatorial effects of risk conditions, and (3) the tendency for local optimization of risk mitigation efforts. (C) 2004 CARS and Elsevier B.V. All rights reserved.
引用
收藏
页码:141 / 146
页数:6
相关论文
共 50 条
  • [41] RETHINKING SECURITY
    Bajagic, Mladen
    Kesetovic, Zelimir
    POLICING IN CENTRAL AND EASTERN EUROPE: DILEMMAS OF CONTEMPORARY CRIMINAL JUSTICE, 2004, : 711 - 723
  • [42] Integrated Security System Management and Incident Management from the Perspective of Organizational Structure
    Kralik, Lukas
    Senkerik, Roman
    Jasek, Roman
    2015 INTERNATIONAL CONFERENCE ON LOGISTICS, INFORMATICS AND SERVICE SCIENCES (LISS), 2015,
  • [43] Rethinking Risk and Security of Human Rights Defenders in the Digital Age
    Hankey, Stephanie
    Clunaigh, Daniel O.
    JOURNAL OF HUMAN RIGHTS PRACTICE, 2013, 5 (03) : 535 - 547
  • [44] Examining the suitability of industrial safety management approaches for information security incident management
    Line, Maria Bartnes
    Albrechtsen, Eirik
    INFORMATION AND COMPUTER SECURITY, 2016, 24 (01) : 20 - 37
  • [45] Security risk analysis and management
    Anton, Nicolae
    Nedelcu, Anisor
    22ND INTERNATIONAL CONFERENCE ON INNOVATIVE MANUFACTURING ENGINEERING AND ENERGY - IMANE&E 2018, 2018, 178
  • [46] The Information Security Risk Management
    Semin, Valeriy G.
    Shmakova, Elena G.
    Los, Lexei B.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE QUALITY MANAGEMENT,TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&QM&IS), 2017, : 106 - 109
  • [47] Risk Management for Security Professionals
    Brahim Herbane
    Risk Management, 2002, 4 (4) : 69 - 70
  • [48] Information security and risk management
    Bodin, Lawrence D.
    Gordon, Lawrence A.
    Loeb, Martin P.
    COMMUNICATIONS OF THE ACM, 2008, 51 (04) : 64 - 68
  • [49] On water risk management and security
    Einav, Amnon
    WATER SUPPLY IN EMERGENCY SITUATIONS, 2007, : 9 - 15
  • [50] Risk, security, and disaster management
    Comfort, LK
    ANNUAL REVIEW OF POLITICAL SCIENCE, 2005, 8 : 335 - 356