• Title/Summary/Keyword: Medical security

Search Result 814, Processing Time 0.039 seconds

Design of Security Agent System to Provide Ubiquitous Service (유비쿼터스 서비스를 위한 보안 에이전트 시스템 설계)

  • Kim, Seok-Soo;Park, Gil-Cheol;Song, Jae-Gu
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.101-106
    • /
    • 2007
  • Recently, Ubiquitous innovation is being promoted so that they can support the uHealthcare provide management to human's health. It is thus necessary to conduct such research on the medical care environment where there is a high demand for utilization of status information. In the current situation, there is a lack of research on measures of security processing and monitoring patient status information produced from rapid growth of infra within Medical environment. This study suggests a solution of using RFID to gather patient information such as inpatient information, location of treatment room, progress of patient, humidity, temperature, and diagnostic status, after which the information are protect and processed using security level method.

  • PDF

How to Cope with Ransomware in the Healthcare Industry (의료산업에서의 랜섬웨어 대응 방법)

  • Jeon, In-seok;Kim, Dong-won;Han, Keun-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.155-165
    • /
    • 2018
  • As medical healthcare industry is growing up rapidly these days, providing various new healthcare service is considered carefully. Health information is considered to be more important than financial information; therefore, protecting health information becomes a very significant task. Ransomware is now targeting industry groups that have high information value. Especially, ransomware has grown in various ways since entering maturity in 2017. Healthcare industry is highly vulnerable to ransomeware since most healthcare organizations are configured in closed network with lack of malware protection. Only meeting the security criteria is not the solution. In the case of a successful attack, restoration process must be prepared to minimize damages as soon as possible. Ransomware is growing rapidly and becoming more complex that protection must be improved much faster. Based on ISO 27799 and 27002 standard, we extract and present security measures against advanced ransomware to maintain and manage healthcare system more effectively.

The Factors Affecting Patient-Flow (환자흐름에의 영향요인)

  • 박재용
    • Health Policy and Management
    • /
    • v.3 no.2
    • /
    • pp.27-80
    • /
    • 1993
  • It is widely known that patients' utilization pattern for medical care facilities and the patientflow are influenced by multi-factors, such as demographic characteristics, structural characteristics of society, socio-psychological characteristics(value, attitude, norms, culture, health behavior, etc.), economic characteristics(income, medical price, relative price, physician induced demand, etc.), geographical accessibility, systematic characteristics(health care delivery system, payment methods for physician fees, form of health care security, etc.), and characteristics of medical facilities(reliability, quality of medical care, convenience, kindness, tec.). This study was conducted to research the mechanism of patient-flow according to changes of health care system(implementation of national health insurance, health care referral system and regionalization of health care utilization, etc.) and characteristics of medical facilities(ownership of hospital, characteristics of medical services, non-medical characteristics, etc.). In this study, the fact could be ascertained that the patient-flow had been influenced by changes of health care system and characteristics of medical facilities.

  • PDF

A Study on the Intrusion Tolerance System Applied to the Object Oriented Middleware Environment

  • Shin Seung Jung;Kim Young Soo;Kim Jung Tae;Ryu Dae Hyun;Na Jong Whoa
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.693-698
    • /
    • 2004
  • The cyber attacks on the computer system in nowadays are focused on works that do not operate specific application. The main key point that we protect information security system has an access control to keep an application. Most of system has a main function to protect an infrastructure such as hardware, network and operating system. In this paper, we have presented an intrusion tolerance system that can service an application in spite of cyber attacks. The proposed system is based on the middle ware integrating security mechanism and separate function of application and intrusion tolerance. The main factor we use security system in nowadays is service to keep a persistency. The proposed intrusion tolerance system is applicable to such as medical, national defense and banking system.

  • PDF

Security Issues, Challenges and Techniques for U-Healthcare System (유비쿼터스 환경하에서의 헬스케어 시스템에서의 보안 문제, 해결책 및 기법)

  • Yang, Ji-su;Kim, Han Kyu;Kim, Sung Min;Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.984-985
    • /
    • 2013
  • An integrated security mechanism is one of the key challenges in the open wireless network architecture because of the diversity of the wireless network in open wireless network and the unique security mechanism used in each one of these networks. In the paper we analysed some elements to guarantee security and privacy preserving in distributed IT applications which provide some kind of support to complex medical domains.

  • PDF

Implementation of Area Efficient Integrated TLS Security Processor for DICOM Medical Information Security (DICOM 의료정보보호를 위한 면적효율적인 통합 TLS 보안 프로세서의 구현)

  • Jang, Woo-Young;Ryu, Sang-Jun;Kim, Young-Chul
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1107-1110
    • /
    • 2005
  • 본 논문은 의료영상진단시스템에서의 의료정보보호를 위한TLS 프로세서의 구현에 관하여 기술하였다. DICOM 3.0 standard의 ‘Part 15. DICOM Security Profile’에서는 TLS와 ISCL 두 가지의 Secure Transport Connection Profile을 정의하고 있고, 인증, 데이터의 무결성 보장, 프리아버시 보호의 기능을 할 수 있도록 몇가지의 알고리즘을 사용할 것을 정의하고 있다. 그 중 TLS Security Profile에는 Triple DES CBC모드와, RSA and SHA를 정의하고 있다. 그리하여 본 논문에서는 세 알고리즘의 개별적인 동작 검증을 마친 후 통합된 TLS Processor를 설계하고 검증하였다. 일반적인 Mux만을 이용한 설계는 임베디드 시스템 적용에 있어서 면적을 많이 차지하는 단점이 나타났다. 따라서 면적을 많이 차지하는 레지스터를 줄이기 위해서 세 알고리즘 블록이 같은 레지스터를 공유하도록 설계하였다. 그리고 임베디드시스템 개발 키트인 IFC-ETK100장비의 FPGA에 회로를 올리고 검증하였다.

  • PDF

Implementation and Verification of the Image Encryption Scheme for Industrial Digital Image Security (산업용 디지털 이미지 보안을 위한 이미지 암호화 기법 구현 및 검증)

  • Hong, Young-Sik;Chung, Jang-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.13-20
    • /
    • 2011
  • Nowadays, digital-images are widely used at Web, industrial and medical applications. There have been many studies on online and Web copyright. But there are a few studies on industrial digital-image. In this paper, we propose the image encryption scheme for digital image in the industrial film. We implement and verify the proposed digital image encryption scheme for prevention of industrial secrets and intellectual property right outflow.

A Study on Security Event Detection in ESM Using Big Data and Deep Learning

  • Lee, Hye-Min;Lee, Sang-Joon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.42-49
    • /
    • 2021
  • As cyber attacks become more intelligent, there is difficulty in detecting advanced attacks in various fields such as industry, defense, and medical care. IPS (Intrusion Prevention System), etc., but the need for centralized integrated management of each security system is increasing. In this paper, we collect big data for intrusion detection and build an intrusion detection platform using deep learning and CNN (Convolutional Neural Networks). In this paper, we design an intelligent big data platform that collects data by observing and analyzing user visit logs and linking with big data. We want to collect big data for intrusion detection and build an intrusion detection platform based on CNN model. In this study, we evaluated the performance of the Intrusion Detection System (IDS) using the KDD99 dataset developed by DARPA in 1998, and the actual attack categories were tested with KDD99's DoS, U2R, and R2L using four probing methods.

Enhancing the Cybersecurity Checklist for Mobile Applications in DTx based on MITRE ATT&CK for Ensuring Privacy

  • Gee-hee Yun;Kyoung-jin Kim
    • Journal of Internet Computing and Services
    • /
    • v.24 no.4
    • /
    • pp.15-24
    • /
    • 2023
  • Digital therapeutics (DTx) are utilized to replace or supplement drug therapy to treat patients. DTx are developed as a mobile application for portability and convenience. The government requires security verification to be performed on digital medical devices that manage sensitive information during the transmission and storage of patient data. Although safety verification is included in the approval process for DTx, the cybersecurity checklist used as a reference does not reflect the characteristics of mobile applications. This poses the risk of potentially overlooking vulnerabilities during security verification. This study aims to address this issue by comparing and analyzing existing items based on the mobile tactics, techniques, and procedures of MITRE ATT&CK, which manages globally known and occurring vulnerabilities through regular updates. We identify 16 items that require improvement and expand the checklist to 29 items to propose improvement measures. The findings of this study may contribute to the safe development and advancement of DTx for managing sensitive patient information.

Efficient Multi-Disease Diagnosis in AI Medical Imaging Through Minimal Preprocessing Without Segmentation Labeling (세그멘테이션 라벨링 없는 최소 전처리를 통한 AI 의료 영상에서의 다 질병 진단 효율화)

  • Dong-Jun Seo;Seung-Chan Lee;Yoon-Jung Heo;Il-Yong Won
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.424-425
    • /
    • 2023
  • AI 의료 영상 분석 기술은 의료 분야의 인력 부족 문제를 해결하는 방법으로 주목받고 있다. 이전 연구들은 세그멘테이션 라벨링과 질병 유무를 결합하여 판단하는데, 이 방법은 큰 비용과 시간이 소요된다. 본 논문은 의료 전문가의 세그멘테이션 라벨링 없이 병명 라벨만의 학습으로 질병을 어느 정도 진단할 수 있음을 보인다. 실험에 따르면 의미있는 결과를 확인할 수 있었다.