Security of ICTs Supporting Healthcare Activities

Author(s):  
José Manuel Gaivéo

Healthcare activities and all that are related with it are conducted by people. This single fact has brought up many precautions about patients and about information related with their health. Using information and communication technologies to support this kind of information requires particular attention about what happens, namely about who can use it and for what it can be used. This chapter intends to identify the vulnerabilities that could be explored, using an international security standard to support a proactive attitude in face of potential threats that explore the identified vulnerabilities, damaging organizational information assets. Another intention is the establishment of a basis of references in information security to define a level of risk classification to build a referential to the potential that a given threat has to exploit the vulnerabilities of an asset, preventing damages to personal and organizational property, including information, and also activity continuity.

2015 ◽  
pp. 192-212
Author(s):  
José Manuel Gaivéo

Healthcare activities and all that are related with it are conducted by people. This single fact has brought up many precautions about patients and about information related with their health. Using information and communication technologies to support this kind of information requires particular attention about what happens, namely about who can use it and for what it can be used. This chapter intends to identify the vulnerabilities that could be explored, using an international security standard to support a proactive attitude in face of potential threats that explore the identified vulnerabilities, damaging organizational information assets. Another intention is the establishment of a basis of references in information security to define a level of risk classification to build a referential to the potential that a given threat has to exploit the vulnerabilities of an asset, preventing damages to personal and organizational property, including information, and also activity continuity.


2020 ◽  
Author(s):  
N. Romashkina ◽  
◽  
A. Markov ◽  
D. Stefanovich ◽  
◽  
...  

The monograph is devoted to topical issues of international security and strategic stability in the context of accelerated development of information and communication technologies. It justifies the importance of ensuring international information security. The monograph examines the possibility of establishing an ITarms control regime under the UN auspices. Different aspects of regulation of software security systems and of the use of supercomputers in the context of the international information security are examined. The impact of information and communication technologies on strategic stability is analyzed. This monograph is addressed to specialists in the field of information and communication technologies and international security, university lecturers, students and graduate students of universities, as well as a wide range of readers.


Author(s):  
Hristo Terziev

Internet of Things is a new world for connecting object space in the real world with virtual space in a computer environment. To build IoT as an effective service platform, end users need to trust the system. With the growing quantity of information and communication technologies, the need to ensure information security and improve data security is increasing. One of the potential solutions for this are steganographic methods. Steganography based on the least significant bit (LSB) is a popular and widely used method in the spatial domain.


2020 ◽  
pp. 77-86
Author(s):  
Nataliya Romashkina ◽  
◽  
Dmitry Stefanovich ◽  

Purpose: To identify the current strategic stability problems associated with the destructive impact of information and communication technologies (ICT) on the basis of analysis and systematization according to various parameters of cyber risks and threats to international security and global stability that can reduce the level of strategic stability and to develop relevant proposals that can lay the foundation for creation of a deterrence policy in the ICT domain. Research method: analysis, synthesis and scientific forecasting, expert assessment, comparative analysis of the cyber domain within the framework of a systematic approach. Result: the article presents analysis and systematization risks and threats to international security and global stability emanating from the cyber sphere according to various parameters. The article proves the impact of the accelerated development of information and communication technologies (ICT) on strategic stability, and that ensuring the cybersecurity of nuclear weapons requires special attention. The global problems of strategic stability at the current stage are posed and the conclusions are that the protection of strategic weapons, early warning systems, air and missile defense, communications, command and control over nuclear weapons from harmful ICTs are the pressing global problems of our time. Specific scenarios of cyber threats leading to a decrease in the level of strategic stability below the necessary and sufficient level have been elaborated, and proposals have been formulated to minimize the corresponding escalation threats. Proposed measures can become a basis for a deterrence policy in the ICT domain, as it was done during the period of bipolarity with regard to nuclear weapons, and become the foundation for broader international agreements on arms control in the so-called nuclear information space of the future.


Author(s):  
V. N. Strelnikova

The article deals with significant changes that are associated with total informatization, which is a powerful converter of economic, social and other types of life activity of society. The author notes that at the same time, the satisfaction of information needs, the state of the information space for minors should be subject to moderate regulation. Attention is drawn to the fact that the intensive growth of the diversity of information and communication technologies is today the dominant environment for the development of a modern child. The characteristics of information harmful to the health and development of children are given. It is proved that relying on the principles of a systematic approach makes it possible to competently organize and correctly carry out the process of achieving the state of protection of children in the information space by various methods and means. Ensuring the information security of childhood is defined by the author as a system; the components of the system of ensuring the information security of childhood (methodological, regulatory, organizational and activity, effective) are highlighted.


2020 ◽  
Vol 2 (1) ◽  
pp. 82-98
Author(s):  
M. А. Efremova ◽  

Introduction. One of the components of the national security of the Russian Federation is information security. In the context of the information society in the Russian Federation, the role of the information component of national security has increased significantly. There are new challenges and threats to the information security of the Russian Federation, which require the reaction of the legislator. However, the conditions of globalization require States to take joint measures to address such a complex problem as information security. Consequently, international information security cannot be achieved by a single state. It is necessary to consolidate efforts and develop a uniform approach to this issue. Theoretical Basis. Methods. The Information society is characterized by a high level of development of information and communication technologies and their use in almost all spheres of life. The emergence of the global information society, the increased role of information and information and communication technologies have stimulated the adoption of a number of international legal instruments in this area. In addition, a number of other guidance documents have been developed and adopted that define the ways and directions of law-making and cooperation at the level of regional organizations. Their distinctive feature was the realization of the lack of unified and clear conceptual and categorical apparatus. This also applies to the concept of “information security”, a unified approach to the understanding of which is not available at the international level. General scientific methods (materialistic dialectics) and private scientific methods: formallogical, comparative-legal, historical-legal. Results. Currently, at the international level, there is not only no legal act regulating issues in the field of criminal law protection of information security, but also there is no common understanding of information security, its main threats of possible joint measures to prevent and eliminate them. Discussion and Conclusion. As the interstate information confrontation will continue and gain new momentum, there is an urgent need for the adoption of an international legal act aimed at the criminal law protection of information security, containing the classification of crimes against information security and recommendations to States on the criminalization of acts against information security in national legislation.


2021 ◽  
pp. 750-768
Author(s):  
Eneken Tikk

The discussion of norms and international security ahead of us will be paved with fundamental differences between cyber superpowers—the United States, China and Russia—about the pace and direction of further adoption and use of information and communication technologies (ICTs). These differences, combined with dogmatic gaps between international and national law, and international and national policy, all constitute obvious apertures for malicious and hostile actors to achieve their goals. Our normative attention to ICTs needs to be both hard and soft, high and low, national and international, reactive and anticipatory, all at the same time.


Sign in / Sign up

Export Citation Format

Share Document