Selected Security Standards

Keyword(s):  
2019 ◽  
Vol 5 (3) ◽  
pp. 213-223
Author(s):  
Muhamat Nofiyanto ◽  
Tetra Saktika Adhinugraha

Background: Patients with critical conditions in the ICU depend on a variety of tools to support their lifes. Patients’ conditions and and their unstable hemodynamic are challenges for nurses to perform mobilization. Less mobilization in critical patients can cause a variety of physical problems, one of them is cardiorespiratory function disorder. Objective: to investigate differences in heart rate (HR) and respiratory rate (RR) before, during, and immediately after early mobilization. Methods: This study employed quasi experiment with one group pre and post test design. Twenty four respondents were selected based on the criteria HR <110 / min at rest, Mean Arterial Blood Pressure between 60 to 110 mmHg, and the fraction of inspired oxygen <0.6. Early mobilization was performed to the respondents, and followed by assessments on the changes of respiratory rate and heart rate before, during, and immediately after the mobilization. Analysis of differences in this study used ANNOVA. Results: Before the early mobilization, mean RR was 22.54 and mean HR was 78.58. Immediately after the mobilization,  mean RR was 23.21 and mean HR was 80.75. There was no differences in the value of RR and HR, before and immediately after the early mobilization with the p-value of 0.540 and 0.314, respectively. Conclusions: Early mobilization of critical patients is relatively safe. Nurses are expected to perform early mobilization for critical patients. However, it should be with regard to security standards and rigorous assessment of the patient's conditions. Keywords: Early mobilization, critical patients, ICU


OP-Journal ◽  
2021 ◽  
Author(s):  
Genevieve Westacott ◽  
Kirsten Vallmurr ◽  
Michael Schütz

AbstractData transfer has been forced to evolve as digital technologies are implemented throughout various aspects of the healthcare system. Despite the uniqueness of both the geography and the population of Queensland, information exchange and data communication has continued to follow this evolutionary trend. There have been a number of different health reforms designed to integrate digital innovations and allow critical data and information to be shared with the appropriate health professionals when necessary. Strict healthcare legislation has been navigated and to provide newly upgraded technologies and processes while maintaining privacy, confidentiality and security standards. A large portion of the digital revolution has been the implementation of the national run project, the My Health Record and the state run project, the Integrated Electronic Medical Record. Both are platforms that allow secure information exchange allowing patients to have improved quality of care. To maintain the steady progress, both the state and federal governments have developed strategies and visions to help provide guidance and direct for ongoing and future digital projects. They also outline areas that require further advancements to ensure Queensland is delivering equitable, high quality healthcare.


2021 ◽  
Vol 26 (4) ◽  
Author(s):  
Mazen Mohamad ◽  
Jan-Philipp Steghöfer ◽  
Riccardo Scandariato

AbstractSecurity Assurance Cases (SAC) are a form of structured argumentation used to reason about the security properties of a system. After the successful adoption of assurance cases for safety, SAC are getting significant traction in recent years, especially in safety-critical industries (e.g., automotive), where there is an increasing pressure to be compliant with several security standards and regulations. Accordingly, research in the field of SAC has flourished in the past decade, with different approaches being investigated. In an effort to systematize this active field of research, we conducted a systematic literature review (SLR) of the existing academic studies on SAC. Our review resulted in an in-depth analysis and comparison of 51 papers. Our results indicate that, while there are numerous papers discussing the importance of SAC and their usage scenarios, the literature is still immature with respect to concrete support for practitioners on how to build and maintain a SAC. More importantly, even though some methodologies are available, their validation and tool support is still lacking.


2021 ◽  
Vol 54 (3) ◽  
pp. 1-36
Author(s):  
Syed Wasif Abbas Hamdani ◽  
Haider Abbas ◽  
Abdul Rehman Janjua ◽  
Waleed Bin Shahid ◽  
Muhammad Faisal Amjad ◽  
...  

Cyber threats have been growing tremendously in recent years. There are significant advancements in the threat space that have led towards an essential need for the strengthening of digital infrastructure security. Better security can be achieved by fine-tuning system parameters to the best and optimized security levels. For the protection of infrastructure and information systems, several guidelines have been provided by well-known organizations in the form of cybersecurity standards. Since security vulnerabilities incur a very high degree of financial, reputational, informational, and organizational security compromise, it is imperative that a baseline for standard compliance be established. The selection of security standards and extracting requirements from those standards in an organizational context is a tedious task. This article presents a detailed literature review, a comprehensive analysis of various cybersecurity standards, and statistics of cyber-attacks related to operating systems (OS). In addition to that, an explicit comparison between the frameworks, tools, and software available for OS compliance testing is provided. An in-depth analysis of the most common software solutions ensuring compliance with certain cybersecurity standards is also presented. Finally, based on the cybersecurity standards under consideration, a comprehensive set of minimum requirements is proposed for OS hardening and a few open research challenges are discussed.


2013 ◽  
Vol 5 (2) ◽  
pp. 88-91
Author(s):  
Simona Ramanauskaitė ◽  
Eglė Radvilė ◽  
Dmitrij Olifer

A large amount of different security documents, standards, guidelines and best practices requires to ensure mapping between different security requirements. As the result of mapping, security requirements of different standards can coincide or require to be amended or harmonised. This is the reason why it is so difficult to map more than two different security documents. Ontologies can be used to solve this issue. The article offers a review of different security documents and ontology types as well as investigates possible use of ontologies for mapping of security standards. Article in Lithuanian Santrauka Esant daugybei informacijos saugą reglamentuojančių dokumentų, gairių ir standartų, aktualu tarpusavyje susieti juose apibrėžtus saugumo reikalavimus. Skirtinguose saugos dokumentuose aprašyti saugumo reikalavimai gali ne tik sutapti arba papildyti vienas kitą, bet ir prieštarauti vienas kitam. Tai labai apsunkina daugiau negu dviejų informacijos saugą reglamentuojančių dokumentų susiejimą. Vienas būdų susieti daugiau negu du saugą reglamentuojančius dokumentus galėtų būti ontologijos naudojimas. Straipsnyje apžvelgiami šiuo metu pagrindiniai saugą reglamentuojantys standartai, egzistuojančios saugumo ontologijos, išnagrinėta galimybė naudoti ontologiją saugą reglamentuojančių dokumentų reikalavimams susieti ir galimybę tokį susiejimą atvaizduoti grafais.


2012 ◽  
Vol 8 (1) ◽  
pp. 1-25 ◽  
Author(s):  
Geoffrey Karokola ◽  
Louise Yngström ◽  
Stewart Kowalski

E-Government offers many benefits to government agencies, citizens and the business community. However, e-Government services are prone to current and emerging security challenges posing potential threats to critical information assets. Securing it appears to be a major challenge facing governments globally. Based on the international security standards – the paper thoroughly investigates and analyzes eleven e-government maturity models (eGMMs) for security services. Further, it attempts to establish a common frame of reference for eGMM critical stages. The study utilizes the Soft Systems Methodology (SSM) of scientific inquiry/ learning cycle adopted from Checkland and Scholes. The findings show that security services (technical and non-technical) are lacking in eGMMs – implying that eGMMs were designed to measure more quantity of offered e-government services than the quality of security services. Therefore, as a step towards achieving secure e-government services the paper proposes a common frame of reference for eGMM with five critical stages. These stages will later be extended to include the required security services.


Sign in / Sign up

Export Citation Format

Share Document