Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/9522
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAlhassan, J . K.-
dc.contributor.authorAbba, Emmanuel-
dc.contributor.authorOlaniyi, Olayemi Mikail-
dc.contributor.authorWaziri, O.V.-
dc.date.accessioned2021-07-15T01:09:53Z-
dc.date.available2021-07-15T01:09:53Z-
dc.date.issued2016-
dc.identifier.citationJ. K. Alhassan, E. Abba, O. M. Olaniyi, V. O. Waziri. (2016),” Threat Modelling of Electronic Health Systems and Mitigating Countermeasures”, International Conference on Information and Communication Technology Applications (2016), Federal University of Technology, Minna, pp 82-89en_US
dc.identifier.urihttp://ceur-ws.org/Vol-1830/Paper16.pdf-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/9522-
dc.descriptionThreat Modeling of Electronic Health Systems and Mitigating Countermeasuresen_US
dc.description.abstractElectronic health systems (EHS) serve as information management systems for health records of patients which are generated from interactions between patients and medical personnel. The security of electronic health system is vital due to the growing acceptance of their use. There is a need to assure users that the data generated and stored on the EHS are protected from adversaries. In the case where the data is already compromised, it is imperative to locate the source of the threat as quickly as possible and implement appropriate countermeasures against such vulnerabilities starting from the highest vulnerable point to lower vulnerabilities. In this study, a threat security model for the EHS was proposed from identified threats which were then discussed. Based on these threats, possible counter measures for authentication and authorization control were highlighted. The threat model was developed through a procedure that guarantees the integrity, availability and confidentiality of health records. The procedure involves using the STRIDE threat modelling tool to identify potential threats which were then ranked with respect to the amount of risk they pose to the system based on scores calculated using DREAD; a threat-risk rating model. The result is a collection of identified and rated threat in order of decreasing risk to an EHS. Careful consideration of the resulting threat rating model by information system security professional will lead to the development of secure systems and provide a guide to the order in which vulnerabilities should be patched in compromised existing systems.en_US
dc.language.isoenen_US
dc.publisherSICT FUTMINNAen_US
dc.subjectthreat modelingen_US
dc.subjectelectronic health systemen_US
dc.subjectcountermeasuresen_US
dc.subjectattacksen_US
dc.subjectauthenticationen_US
dc.subjectauthorizationen_US
dc.titleThreat Modeling of Electronic Health Systems and Mitigating Countermeasuresen_US
dc.typeArticleen_US
Appears in Collections:Computer Engineering

Files in This Item:
File Description SizeFormat 
proceedng11a.pdfThreat Modeling of Electronic Health Systems and Mitigating Countermeasures1.09 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.