Cargando…

Risk management-based security evaluation model for telemedicine systems

BACKGROUND: Infectious diseases that can cause epidemics, such as COVID-19, SARS-CoV, and MERS-CoV, constitute a major social issue, with healthcare providers fearing secondary, tertiary, and even quaternary infections. To alleviate this problem, telemedicine is increasingly being viewed as an effec...

Descripción completa

Detalles Bibliográficos
Autores principales: Kim, Dong-won, Choi, Jin-young, Han, Keun-hee
Formato: Online Artículo Texto
Lenguaje:English
Publicado: BioMed Central 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7286211/
https://www.ncbi.nlm.nih.gov/pubmed/32522216
http://dx.doi.org/10.1186/s12911-020-01145-7
_version_ 1783544833847066624
author Kim, Dong-won
Choi, Jin-young
Han, Keun-hee
author_facet Kim, Dong-won
Choi, Jin-young
Han, Keun-hee
author_sort Kim, Dong-won
collection PubMed
description BACKGROUND: Infectious diseases that can cause epidemics, such as COVID-19, SARS-CoV, and MERS-CoV, constitute a major social issue, with healthcare providers fearing secondary, tertiary, and even quaternary infections. To alleviate this problem, telemedicine is increasingly being viewed as an effective means through which patients can be diagnosed and medications prescribed by doctors via untact Thus, concomitant with developments in information and communication technology (ICT), medical institutions have actively analyzed and applied ICT to medical systems to provide optimal medical services. However, with the convergence of these diverse technologies, various risks and security threats have emerged. To protect patients and improve telemedicine quality for patient safety, it is necessary to analyze these risks and security threats comprehensively and institute appropriate countermeasures. METHODS: The security threats likely to be encountered in each of seven telemedicine service areas were analyzed, and related data were collected directly through on-site surveys by a medical institution. Subsequently, an attack tree, the most popular reliability and risk modeling approach for systematically characterizing the potential risks of telemedicine systems, was examined and utilized with the attack occurrence probability and attack success probability as variables to provide a comprehensive risk assessment method. RESULTS: In this study, the most popular modelling method, an attack tree, was applied to the telemedicine environment, and the security concerns for telemedicine systems were found to be very large. Risk management and evaluation methods suitable for the telemedicine environment were identified, and their benefits and potential limitations were assessed. CONCLUSION: This research should be beneficial to security experts who wish to investigate the impacts of cybersecurity threats on remote healthcare and researchers who wish to identify new modeling opportunities to apply security risk modeling techniques.
format Online
Article
Text
id pubmed-7286211
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher BioMed Central
record_format MEDLINE/PubMed
spelling pubmed-72862112020-06-11 Risk management-based security evaluation model for telemedicine systems Kim, Dong-won Choi, Jin-young Han, Keun-hee BMC Med Inform Decis Mak Research Article BACKGROUND: Infectious diseases that can cause epidemics, such as COVID-19, SARS-CoV, and MERS-CoV, constitute a major social issue, with healthcare providers fearing secondary, tertiary, and even quaternary infections. To alleviate this problem, telemedicine is increasingly being viewed as an effective means through which patients can be diagnosed and medications prescribed by doctors via untact Thus, concomitant with developments in information and communication technology (ICT), medical institutions have actively analyzed and applied ICT to medical systems to provide optimal medical services. However, with the convergence of these diverse technologies, various risks and security threats have emerged. To protect patients and improve telemedicine quality for patient safety, it is necessary to analyze these risks and security threats comprehensively and institute appropriate countermeasures. METHODS: The security threats likely to be encountered in each of seven telemedicine service areas were analyzed, and related data were collected directly through on-site surveys by a medical institution. Subsequently, an attack tree, the most popular reliability and risk modeling approach for systematically characterizing the potential risks of telemedicine systems, was examined and utilized with the attack occurrence probability and attack success probability as variables to provide a comprehensive risk assessment method. RESULTS: In this study, the most popular modelling method, an attack tree, was applied to the telemedicine environment, and the security concerns for telemedicine systems were found to be very large. Risk management and evaluation methods suitable for the telemedicine environment were identified, and their benefits and potential limitations were assessed. CONCLUSION: This research should be beneficial to security experts who wish to investigate the impacts of cybersecurity threats on remote healthcare and researchers who wish to identify new modeling opportunities to apply security risk modeling techniques. BioMed Central 2020-06-10 /pmc/articles/PMC7286211/ /pubmed/32522216 http://dx.doi.org/10.1186/s12911-020-01145-7 Text en © The Author(s) 2020 Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated in a credit line to the data.
spellingShingle Research Article
Kim, Dong-won
Choi, Jin-young
Han, Keun-hee
Risk management-based security evaluation model for telemedicine systems
title Risk management-based security evaluation model for telemedicine systems
title_full Risk management-based security evaluation model for telemedicine systems
title_fullStr Risk management-based security evaluation model for telemedicine systems
title_full_unstemmed Risk management-based security evaluation model for telemedicine systems
title_short Risk management-based security evaluation model for telemedicine systems
title_sort risk management-based security evaluation model for telemedicine systems
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7286211/
https://www.ncbi.nlm.nih.gov/pubmed/32522216
http://dx.doi.org/10.1186/s12911-020-01145-7
work_keys_str_mv AT kimdongwon riskmanagementbasedsecurityevaluationmodelfortelemedicinesystems
AT choijinyoung riskmanagementbasedsecurityevaluationmodelfortelemedicinesystems
AT hankeunhee riskmanagementbasedsecurityevaluationmodelfortelemedicinesystems