Information Security Health Check
نویسنده
چکیده
Organization’s dependency on information systems and the related resources has led to an increased vulnerability to computer crime and abuse. It is therefore of the utmost importance that senior management are aware of the importance of information security because they are ultimately accountable for the organization’s success. Unfortunately, no effective, easy to use tool is available to diagnose an organization’s current information security situation. This paper will therefore aim to propose the “Information Security Health Check” as an effective, easy to use tool to get senior management’s commitment and to determine the current status of information security, considering the importance of their specific security concerns.
منابع مشابه
Information Security Requirements for Implementing Electronic Health Records in Iran
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
متن کاملInformation Security Requirements for Implementing Electronic Health Records in Iran
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
متن کاملResearch Toward the Practical Application of a Risk Evaluation Framework: Security Analysis of the Clinical Area within the German Electronic Health Information System
The following study provides a risk analysis of the forthcoming nationwide healthcare information system in Germany. Based on the information security audit methodology of the Federal Office for Information Security (BSI), we evaluated the introduction of the new system in hospitals with respect to security. Conceptually, the study focuses explicitly on an organizational level; specifically the...
متن کاملAbstract Interpretation to Check Secure Information Flow in Programs with Input-Output Security Annotations
Interpretation to Check Secure Information Flow in Programs with Input-Output Security Annotations N. De Francesco L. Martini Dipartimento di Ingegneria dell’Informazione, Università di Pisa, Formal Aspects of Security and Trust, Newcastle upon Tyne, 18-19 July 2005 N. De Francesco, L. Martini AI to Check SIF in programs with I/O Security Annotations Preliminaries The Two Semantics Examples Sum...
متن کاملIdentifying Information Security Risk Components in Military Hospitals in Iran
Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...
متن کامل