Methodology for determining actual threats to information security in medical information system
In this article based on the processing of statistical data from various electronic resources the most frequent types of threats to information security (UBI) for medical information systems (MIS) are identified and their classification is carried out. The issues of determining the actual UBI w...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Omsk State Technical University, Federal State Autonoumos Educational Institution of Higher Education
2021-11-01
|
Series: | Омский научный вестник |
Subjects: | |
Online Access: | https://www.omgtu.ru/general_information/media_omgtu/journal_of_omsk_research_journal/files/arhiv/2021/%E2%84%96%205%20(179)%20(%D0%9E%D0%9D%D0%92)/74-79%20%D0%9C%D0%B0%D0%B9%D1%81%D1%82%D1%80%D0%B5%D0%BD%D0%BA%D0%BE%20%D0%92.%20%D0%90.,%20%D0%91%D0%B5%D0%B7%D1%80%D0%BE%D0%B4%D0%BD%D1%8B%D1%85%20%D0%9E.%20%D0%90.,%20%D0%94%D0%BE%D1%80%D0%BE%D1%85%D0%B8%D0%BD%20%D0%A0.%20%D0%90..pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | In this article based on the processing of statistical data
from various electronic resources the most frequent
types of threats to information security (UBI) for medical
information systems (MIS) are identified and their
classification is carried out.
The issues of determining the actual UBI when creating
MIS that process personal data using a specific technology
of expert assessment are considered. The proposed
methodology for determining actual threats to information
security for MIS, in comparison with those used, eliminates
subjective assessments that are a characteristic feature
of traditional expert assessments. Its use also makes it
possible to assess the relevance of information security
threats for MIS that do not have qualified specialists in
the field of information security in the staff of a medical
institution, which is relevant for a large number of medical
institutions.
The authors investigate the practical possibilities of using
the theory of fuzzy sets and fuzzy logic in determining the
actual UBI for MIS for various purposes. |
---|---|
ISSN: | 1813-8225 2541-7541 |