Threat-Driven Approach for Security Analysis: A Case Study with a Telemedicine System

Author(s):  
Raj kamal Kaur ◽  
Lalit Kumar Singh ◽  
Babita Pandey ◽  
Aditya Khamparia
Author(s):  
Alvi Syahrina ◽  
Sherly Fratista ◽  
Arsike Cipta Pelangi ◽  
Rahmat Fauzi

2020 ◽  
Vol 20 (1) ◽  
Author(s):  
Dea Indria ◽  
Mohannad Alajlani ◽  
Hamish S F Fraser

Abstract Background This case study in Makassar City, Indonesia aims to investigate the clinicians’ perceptions, including both satisfaction and barriers in using telemedicine in a large, established program which supported 3974 consultations in 2017. Methods A mixed methodology was used in this research utilizing a questionnaire with 12 questions, and semi-structured interviews. A purposeful sample of clinicians using the telemedicine system at the 39 primary care clinics in Makassar City were surveyed. A total of 100 clinicians participated in this study. All of them completed the questionnaires (76.9% response rate) and 15 of them were interviewed. Results The result showed that 78% of the clinicians were satisfied with the telemedicine system. In free text responses 69% said that telemedicine allowed quicker diagnosis and treatment, 47% said poor internet connectivity was a significant obstacle in using the system, and 40% suggested improvement to the infrastructure including internet connection and electricity. Conclusion Overall, the clinicians were satisfied with the system, with the main benefit of rendering the diagnosis faster and easier for patients. However, poor internet connectivity was indicated as the main barrier. Most of the clinicians suggested improving the infrastructure especially the internet network.


Information ◽  
2020 ◽  
Vol 11 (5) ◽  
pp. 273 ◽  
Author(s):  
Mohammad Hamad ◽  
Vassilis Prevelakis

In recent years, significant developments were introduced within the vehicular domain, evolving the vehicles to become a network of many embedded systems which depend on a set of sensors to interact with each other and with the surrounding environment. While these improvements have increased the safety and incontestability of the automotive system, they have opened the door for new potential security threats which need to be defined, assessed, and mitigated. The SAE J3061 standard has defined threat modeling as a critical step toward the secure development process for vehicle systems, but it did not determine which method could be used to achieve this process. Therefore, many threat modeling approaches were adopted. However, using one individual approach will not identify all the threats which could target the system, and may lead to insufficient mitigation mechanisms. Thus, having complete security requires the usage of a comprehensive threat model which identifies all the potential threats and vulnerabilities. In this work, we tried to revise the existing threat modeling efforts in the vehicular domain. Also, we proposed using a hybrid method called the Software, Asset, Vulnerability, Threat, and Attacker (SAVTA)-centric method to support security analysis for vehicular systems. SAVTA combines different existing threat modeling approaches to create a comprehensive and hybridized threat model. The model is used as an aid to construct general attack trees which illustrate attack vectors that threaten a particular vehicle asset and classify these attacks under different sub-trees.


Author(s):  
Florian Kammüller ◽  
Christian W. Probst ◽  
Franco Raimondi

In this chapter, the authors give a short overview of the state of the art of formal verification techniques to the engineering of safe and secure systems. The main focus is on the support of security of real-world systems with mechanized verification techniques, in particular model checking. Based on prior experience with safety analysis—in particular the TWIN elevator (ThyssenKrupp) case study—the current case study ventures into the rising field of social engineering attacks on security. This main focus and original contribution of this chapter considers the security analysis of an insider attack illustrating the benefits of model checking with belief logics and actor system modeling.


2020 ◽  
pp. 1-5
Author(s):  
Mila O'Sullivan

Recent debates within Women, Peace and Security (WPS) scholarship (e.g., Bergeron, Cohn, and Duncanson 2017; Elias 2015; True 2015) have underlined the need to position the WPS agenda in the context of broader feminist security analysis as defined by early feminist international relations scholars (e.g., Tickner 1992). More precisely, this requires integrating feminist security studies (FSS) and feminist political economy (FPE). At the center of these largely theoretical reflections is a concern that gender-responsive peace-building efforts have too often been undermined by postwar neoliberal economic processes. This essay provides an empirical contribution to this debate, taking the case study of Ukraine as an atypical example of how WPS has been adopted and implemented for the first time during an active conflict. The integration of FPE and FSS proves especially relevant for a country in conflict, where economic austerity policies come along with increased military expenditure. The essay illustrates that the bridging of security and economy is entirely absent in Ukraine's WPS agenda, which has largely prioritized military security while failing to connect it to the austerity policies and the gendered structural inequalities deepened by the ongoing conflict.


Sign in / Sign up

Export Citation Format

Share Document