Assessing the information technology security risk in medical supply chains

Author(s):  
Jason K. Deane ◽  
Christopher L. Rees ◽  
Wade H. Baker
2021 ◽  
Vol 40 (2) ◽  
pp. 16-20
Author(s):  
L.V. Zahoruyko ◽  
◽  
T.A. Martʹyanova ◽  
A.V. Skyrda ◽  
◽  
...  

Author(s):  
M. J. Warren

Understanding and managing information infrastructure (II) security risks is a priority to most organizations dealing with information technology and information warfare (IW) scenarios today (Libicki, 2000). Traditional security risk analysis (SRA) was well suited to these tasks within the paradigm of computer security, where the focus was on securing tangible items such as computing and communications equipment (NCS,1996; Cramer, 1998). With the growth of information interchange and reliance on information infrastructure, the ability to understand where vulnerabilities lie within an organization, regardless of size, has become extremely difficult (NIPC, 1996). To place a value on the information that is owned and used by an organization is virtually an impossible task. The suitability of risk analysis to assist in managing IW and information infrastructure-related security risks is unqualified, however studies have been undertaken to build frameworks and methodologies for modeling information warfare attacks (Molander, Riddile, & Wilson, 1996; Johnson, 1997; Hutchinson & Warren, 2001) which will assist greatly in applying risk analysis concepts and methodologies to the burgeoning information technology security paradigm, information warfare.


2020 ◽  
pp. 2-10
Author(s):  
Roman Anosov ◽  
◽  
Sergey Anosov ◽  
Igor Shakhalov ◽  
◽  
...  

2020 ◽  
Vol 8 (6) ◽  
pp. 1567-1571

Information technology security risk evaluations are necessary in determining measures being taken for risk analysis. Risk analysis is also significant as it predicts the loopholes in the software which can get manipulated during suspicious activities. The article has attempted to analyze the risk issue and further suggests a multi-fuzzy risk evaluation approach for the identification of security threats. This approach analyses hacker risks based on the potential ability for an assailant, their overall probability for an attacks as well as the implications of such attacks. It typically consists of 3 sub fuzzy inference structures. The 1 st fuzzy inference structure assesses an assailant's total capacities. The 2 nd fuzzy inference structure assesses the general probability of ambush success, whereas the 3 rd fuzzy inference structure measures risk thresholds.


2020 ◽  
Vol 14 (3) ◽  
pp. 44-53
Author(s):  
N. E. Sokolinskaya ◽  
L. M. Kupriyanova

The relevance of the article is because in parallel with the processes of introduction of innovations in the field of automation and computerization of the banking system, the number of types of banking risks associated with innovations in the field of on-line customer service and internal Bank reporting, as well as information systems. As a result of this article, we have studied the latest legislative acts of the Central Bank of Russia as a mega-regulator and summarized the practice of both individual credit institutions and the banking sector in the field of information technology development risks in the banking sector. To strengthen the development of new financial technologies in the digital economy, it is necessary to regularly discuss the emergence of new phenomena and innovations; to consider the possibility of further analysis of existing methodological developments to exchange best practices of banks. Building an effective it security risk management system is not a one-time project. Still, a complex process is important, focused on minimizing external and internal threats and taking into account the limitations on resources and time factor


Sign in / Sign up

Export Citation Format

Share Document