Будь ласка, використовуйте цей ідентифікатор, щоб цитувати або посилатися на цей матеріал: http://repository.mu.edu.ua/jspui/handle/123456789/4843
Повний запис метаданих
Поле DCЗначенняМова
dc.contributor.authorShevchenko, S.-
dc.contributor.authorZhdanova, Y.-
dc.contributor.authorDreis, Yurii-
dc.contributor.authorKyrychok, R.-
dc.contributor.authorTsyrkaniuk, D.-
dc.date.accessioned2024-01-01T09:46:12Z-
dc.date.available2024-01-01T09:46:12Z-
dc.date.issued2023-
dc.identifier.urihttp://repository.mu.edu.ua/jspui/handle/123456789/4843-
dc.descriptionShevchenko S. Protection of Information in Telecommunication Medical Systems based on a Risk-Oriented Approach / S. Shevchenko, Y. Zhdanova, Y. Dreis, R. Kyrychok, D. Tsyrkaniuk // CEUR Workshop Proceedings (CEUR-WS.org). – 2023. – Vol. 3421. – Р. 158–167.en_US
dc.description.abstractThe changes brought by informatization to society have a qualitative effect on the process of modernization of medical care. At the same time, the digitization of big data in healthcare creates numerous risks from the point of view of ensuring the confidentiality, integrity, and availability of information. Inadequate security is due to both objective and subjective reasons. Among them: are the lack of a sufficient number of qualified specialists in the field of information protection; budget restrictions; software conflict; lack of training in information security rules and skills of medical personnel; non-compliance with traditional cyber security practices; legal and ethical issues related to patient data. Determining the minimum and maximum possible degrees of risk of security breaches in information and telecommunication medical systems is the key to ensuring the protection of medical information. This confirms the significance and timeliness of this research, which is based on a risk-oriented approach. The analysis of the scientific literature, having allowed the designation of the components, is how the information-telecommunication system and the links between them are put together. For each asset, the source of the threat, the threat itself, and the variants of reaction to it are identified.en_US
dc.language.isootheren_US
dc.subjectInformation risksen_US
dc.subjectrisk-oriented approachen_US
dc.subjectrisk managementen_US
dc.subjectinformation-telecommunication medical systemen_US
dc.subjecttelemedicineen_US
dc.subjectthreatsen_US
dc.subjectvulnerabilitiesen_US
dc.titleProtection of Information in Telecommunication Medical Systems based on a Risk-Oriented Approachen_US
dc.typeArticleen_US
Розташовується у зібраннях:Дрейс Юрій Олександрович

Файли цього матеріалу:
Файл Опис РозмірФормат 
dreis_prot_2023_158.pdf6,94 MBAdobe PDFПереглянути/Відкрити


Усі матеріали в архіві електронних ресурсів захищені авторським правом, всі права збережені.