ICICIS 2011: Intelligent Computing and Information Science pp 411-416 | Cite as
The Use of BS7799 Information Security Standard to Construct Mechanisms for the Management of Medical Organization Information Security
Abstract
According to surveys, 80 % of security related events threatening information in medical organizations is due to improper management. Most research on information security has focused on information and security technology, such as network security and access control; rarely addressing issues at the management issues. The main purpose of this study is to construct a BS7799 based mechanism for the management of information with regard to security as it applies to medical organizations. This study analyzes and identifies the most common events related to information security in medical organizations and categorizes these events as high-risk, transferable-risk, and controlled-risk to facilitate the management of such risk.
Keywords
BS7799 Medical organizations Information security Risk management Access controlPreview
Unable to display preview. Download preview PDF.
References
- 1.Arthur, E.H., Bosworth, S., Hoyt, D.B.: Computer Security Handbook. John Wiley & Sons, New York (1995)Google Scholar
- 2.Badenhorst, K.P., Elloff, J.H.P.: Framework of a Methodology for the Life Cycle of Computer Security in an Organization. Computer & Security 8(5), 433–442 (1989)CrossRefGoogle Scholar
- 3.Christophy, A., Dorofee, A.: Introduction to the OCTAVE Method. The CERT® Coordination Center, CERT/CC (2001)Google Scholar
- 4.Ellison, R.J., Linger, R.C., Longstaff, T., Mead, N.R.: Survivable Network System Analysis: A Case Study. IEEE Software 16(4), 70–77 (1999)CrossRefGoogle Scholar
- 5.Eloff, J.H.P., Eloff, M.M.: Information security architecture. Computer Fraud & Security 11, 10–16 (2005)CrossRefGoogle Scholar
- 6.Eloff, M.M., Von Sloms, S.H.: Information Security Management: A Hierarchical Framework for Various Approaches. Computers & Security 19(3), 243–256 (2000)CrossRefGoogle Scholar
- 7.Eloff, M.M., Von Sloms, S.H.: Information Security Management: An approach to Combine Process Certification and Product Evaluation. Computers & Security 19(8), 698–709 (2000)CrossRefGoogle Scholar
- 8.Ettinger, J.E.: Key Issues in Information Security. Information Security. Chapman & Hall, London (1993)Google Scholar
- 9.Finne, T.: Information Systems Risk Management: Key Concepts and Business Processes. Computers & Security 19(3), 234–247 (2000)CrossRefGoogle Scholar
- 10.Gehrke, M., Pfitzmann, A., Rannenberg, K.: Information Technology Security Evaluation Criteria (ITSEC)-A Contribution to Vulnerability? In: The IFIP 12th World Computer Congress Madrld on Information Processing, pp. 7–11 (1992)Google Scholar
- 11.Gollmann, D.: Computer Security. John Wiley & Sons Ltd., UK (1999)Google Scholar
- 12.Gupta, M., Chartuvedi, A.R., Metha, S., Valeri, L.: The Experimental Analysis of Information Security Management Issues for Online Financial Services. In: The 2001 International Conference on Information Systems, pp. 667–675 (2001)Google Scholar
- 13.Halliday, S., Badenhorst, K., Von Solms, R.: A business approach to effective information technology risk analysis and management. Information Management & Computer Security 4(1), 19–31 (1996)CrossRefGoogle Scholar
- 14.ISO/IEC 17799. Information technology-code of practice for information security management. BSI, London (2000)Google Scholar
- 15.Janczewski, L.J., Shi, F.X.: Development of Information Security Baselines for Healthcare Information Systems in New Zealand. Computer & Security 21(2), 172–192 (2002)CrossRefGoogle Scholar
- 16.Schultz, E.E., Proctor, R.W., Lien, M.C.: Usability and Security An Appraisal of Usability Issues in Information Security Methods. Computers & Security 20(7), 620–634 (2001)CrossRefGoogle Scholar
- 17.Sherwood, J.: SALSA: A method for developing the enterprise security architecture and Strategy. Computer & Security 2(3), 8–17 (1996)Google Scholar
- 18.Smith, E., Eloff, J.H.P.: Security in health-care information systems-current trends. International Journal of Medical Informatics 54, 39–54 (1999)CrossRefGoogle Scholar
- 19.Song, M.J.: Risk Management. Chinese Enterprise Develop Center, 33–456 (1993)Google Scholar
- 20.Trcek, D.: An Integral Framework for Information Systems Security Management. Computers & Security 22(4), 337–360 (2003)CrossRefGoogle Scholar
- 21.Von Solms, R.: Information Security Management: The Second Generation. Computer & Security 15(4), 281–288 (1996)CrossRefGoogle Scholar
- 22.Von Solms, R., Van Haar, H., Von Solms, S.H., Caelli, W.J.: A Framework for Information Security Evaluation. Information & Management 26, 143–153 (1994)CrossRefGoogle Scholar
- 23.Willet, A.H.: The Economic Theory of Risk and Insurance. Ph. D. Thesis in Columbia University (1901)Google Scholar