• 제목/요약/키워드: health security system

Search Result 417, Processing Time 0.168 seconds

A Research on the Exposure Status of Cybersecurity Risk of Process Control System and Its Counterplan (공정제어시스템의 사이버보안 위험 노출 현황 및 대응방안 연구)

  • Kim, Youngse;Park, Jinhyung;Kim, Sangki;Kim, Byungjick;Lee, Joonwon;Park, Kyoshik
    • Korean Chemical Engineering Research
    • /
    • v.60 no.4
    • /
    • pp.492-498
    • /
    • 2022
  • Process control systems used in most domestic petrochemical corporates today are based on the Windows platforms. As technology leans toward opened environment, the exposure risk of control systems is increasing. However, not many companies are preparing for various cyberattacks due to lack of awareness and misunderstanding of cyber intrusion. This study investigated the extent of how much exposed the petrochemical process control system is to security threats and suggested practical measures to reduce OT cybersecurity vulnerabilities. To identify the cyber threat status of process control systems, vulnerabilities of the Windows platform, a principal cyber threat factor, have been analyzed. For research, three major DCS providers in Korea and the discontinuation of Windows platform of 635 control systems were investigated. It was confirmed that 78% of the survey subjects were still operating in the discontinued windows platforms, and those process control systems were operated in a state vulnerable to cyber intrusions. In order to actively cope with these cyber threats, legal regulations such as designation of critical infrastructure for major petrochemical facilities which is implemented in advanced countries such as the United States are needed. Additionally, it is necessary to take the initiative in eradicating security threats to the process control systems by aggressively introducing security solutions provided from existing DCS suppliers. This paper was submitted to Professor Ko JaeWook's retirement anniversary issue.

Security issues and requirements for cloud-based u-Healthcare System (클라우드기반 u-헬스케어 시스템을 위한 보안 이슈 및 요구사항 분석)

  • Lee, Young Sil;Kim, TaeYong;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.299-302
    • /
    • 2014
  • Due to the convergence between digital devices and the development of wireless communication technology, bit-signal sensor miniaturization, building an Electronic Medical Record (EMR) which is a digital version of a paper chart that contains all of a patient's medical history and the information of Electronic Health Record (EHR), Ubiquitous healthcare (u-Healthcare) that can monitor their health status and provide personal healthcare service anytime and anywhere. Also, the appearance of cloud computing technology is one of the factors that accelerate the development of u-healthcare service. However, if the individual information to be used maliciously during the u-healthcare service utilization, leads to serious problems directly related to the individual's life because if it goes beyond the level of simple health screening and treatment, it may not provide accurate and reliable healthcare services. For this reason, we analyzed a variety of security issues related to u-healthcare service in cloud computing environment and described about directions of secure health information sharing system construction. In addition, we suggest the future developmental direction for th activation of u-healthcare industry.

  • PDF

Evaluation of Hospital Information System Based on the Performance Reference Model (병원정보화 평가를 위한 PRM 기반의 체계 개발 및 적용)

  • Chae, Young-Moon;Cho, Kyoung-Won;Kim, Hye-Sook;Park, Chun-Bok
    • The Korean Journal of Health Service Management
    • /
    • v.5 no.1
    • /
    • pp.1-13
    • /
    • 2011
  • The purpose of this paper was to evaluate performance of information system for one national university hospital in order to identify the factors influencing performance of information system. KPIs were collected for 181 users of information system (41 doctors, 104 nurses, and 11 medical supporting staffs, and 25 administrative staffs) from August 10 to 24, 2010. The results were as follows: Average performance score for input layer was 3.16; average performance score for process layer was 3.35; and average performance score for business layer was 3.57. Scores for input layer was lowest for nurses and scores for process and business layer were lowest for doctors. Results from the path analysis showed that system quality, demographic characteristics, and security significantly influenced management process but these factors except demographic characteristics influenced user satisfaction; and management process also significantly influenced user satisfaction.

Improving Public Medical and Social Services Market Management: Application of Information Technologies

  • Barzylovych, Anastasiia;Malinina, Olena;Gnyloskurenko, Ganna;Borysiuk, Iryna;Yuriy, Rayisa
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.257-266
    • /
    • 2021
  • This article examines the features of improving the public management of the market of medical and social services using information technology to improve the efficiency of public activity in modern conditions. The interpretation of the essence of the categories "information technologies" and "information support" is analyzed. The importance of the organization of information support of public authorities in the insurance of the state apparatus of information management for the adoption and solution of state issues of the market of medical and social services has been studied. Issues and system of information support of public management of the market of medical and social services are considered. The stages of the ICT implementation process in the market of medical and social services are described. The tools of state regulation in the market of medical and social services and the introduction of targeted programs for the development of the social sphere and health care are highlighted. Recommendations for improvement are formulated public management of the market of medical services and social way introduction of ICT tools, which provide for the implementation of a set of measures aimed at intellectualizing the entire system public data management spheres. The necessity of development of innovative tools of public management of the market of medical and social services of Ukraine for the purpose of working out of strategies of increase of quality of medical and social services in the XXI century is substantiated. A number of benefits from the implementation of an effective process of application of information support of public management of the market of medical and social services to ensure the efficiency of public authorities of Ukraine. It is proposed to create a "Department of information support of self-government" and electronic health care system (e-Health) to improve the management decision-making process, which will provide an opportunity to accumulate, process, analyze, and as a result, get the expected effect in the form of balanced management decisions by public authorities of Ukraine.

Analyses of Characteristics of U-Healthcare System Based on Wireless Communication

  • Kim, Jung Tae
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.4
    • /
    • pp.337-342
    • /
    • 2012
  • The medical industries are integrated with information technology with mobile devices and wireless communication. The advent of mobile healthcare systems can benefit patients and hospitals, by not only providing better quality of patient care, but also by reducing administrative and medical costs for both patients and hospitals. Security issues present an interesting research topic in wireless and pervasive healthcare networks. As information technology is developed, many organizations such as government agencies, public institutions, and corporations have employed an information system to enhance the efficiency of their work processes. For the past few years, healthcare organizations throughout the world have been adopting health information systems (HIS) based on the wireless network infrastructure. As a part of the wireless network, a mobile agent has been employed at a large scale in hospitals due to its outstanding mobility. Several vulnerabilities and security requirements related to mobile devices should be considered in implementing mobile services in the hospital environment. Secure authentication and protocols with a mobile agent for applying ubiquitous sensor networks in a healthcare system environment is proposed and analyzed in this paper.

Development of ML and IoT Enabled Disease Diagnosis Model for a Smart Healthcare System

  • Mehra, Navita;Mittal, Pooja
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.1-12
    • /
    • 2022
  • The current progression in the Internet of Things (IoT) and Machine Learning (ML) based technologies converted the traditional healthcare system into a smart healthcare system. The incorporation of IoT and ML has changed the way of treating patients and offers lots of opportunities in the healthcare domain. In this view, this research article presents a new IoT and ML-based disease diagnosis model for the diagnosis of different diseases. In the proposed model, vital signs are collected via IoT-based smart medical devices, and the analysis is done by using different data mining techniques for detecting the possibility of risk in people's health status. Recommendations are made based on the results generated by different data mining techniques, for high-risk patients, an emergency alert will be generated to healthcare service providers and family members. Implementation of this model is done on Anaconda Jupyter notebook by using different Python libraries in it. The result states that among all data mining techniques, SVM achieved the highest accuracy of 0.897 on the same dataset for classification of Parkinson's disease.

The First Comprehensive Plan of National Health Insurance (제1차 국민건강보험 종합계획)

  • Park, Eun-Cheol
    • Health Policy and Management
    • /
    • v.29 no.2
    • /
    • pp.99-104
    • /
    • 2019
  • On May 1, 2019, the Minister of Health and Welfare announced publicly the first Comprehensive Plan of National Health Insurance (NHI). The Comprehensive Plan which is the 5-year plan including expenditure and revenue aspect of NHI, is desirable in 42 years of introduction of NHI and 30 years of universal coverage of NHI, though the Plan was late and had some conflict process. The Comprehensive Plan was established without evaluation of Moon's Care Plan, did not included to relationship with NHI and other health security systems, and did not have the blue print of NHI. The Plan was not sufficient in content of adequate health care utilization and relationship with service benefit and cash benefit. The Comprehensive Plan should be modified in considering the blue print of NHI and national healthcare system with participating stakeholder in turbulent environment-low fertility, rapid ageing, low economic growth rate, era of non-communicable diseases, unification of the Korean Peninsula, and 4th industrial revolution. Therefore, I suggest to establish the President's Committee of Improving Healthcare System for the blue print of health care and NHI.

A Study for u-Healthcare Networking Technology Framework Approach Based on Secure Oriented Architecture(SOA) (Secure Oriented Architecture(SOA)에 기반한 u-Healthcare 네트워크 보안기술 프레임워크 모델)

  • Kim, Jeom Goo;Noh, SiChoon
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.101-108
    • /
    • 2013
  • Sensor network configurations are for a specific situation or environment sensors capable of sensing, processing the collected information processors, and as a device is transmitting or receiving data. It is presently serious that sensor networks provide many benefits, but can not solve the wireless network security vulnerabilities, the risk of exposure to a variety of state information. u-Healthcare sensor networks, the smaller the sensor node power consumption, and computing power, memory, etc. restrictions imposing, wireless sensing through the kind of features that deliver value, so it ispossible that eavesdropping, denial of service, attack, routing path. In this paper, with a focus on sensing of the environment u-Healthcare system wireless security vulnerabilities factors u-Healthcare security framework to diagnose and design methods are presented. Sensor network technologies take measures for security vulnerabilities, but without the development of technology, if technology is not being utilized properly it will be an element of threat. Studies suggest that the u-Healthcare System in a variety of security risks measures user protection in the field of health information will be used as an important guide.

Injury Prevention, Disaster and Public Health Preparedness and Response (손상예방, 재난과 보건분야 준비와 대응)

  • Jeong, Ae-Suk
    • Health Policy and Management
    • /
    • v.28 no.3
    • /
    • pp.308-314
    • /
    • 2018
  • Injury is a serious problem that not only causes death but also significantly degrades the quality of life of the people and causes loss of socioeconomic opportunities and costs. Damage occurs as a result of an accident. Among them, natural disasters and artificial disasters take lives of many people in a short time and threaten their physical and mental health. The United States has responded to the disaster by establishing relevant laws and regulations and a response system with the recognition that health is recognised soon to be as national security in the wake of the 9/11 terrorist attacks and the Katrina disaster. It is necessary to build a knowledge infrastructure to train disaster response experts in public health area and to have health competence to cope with disasters.

A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability

  • Lin, Guofeng;You, Lirong;Hu, Bing;Hong, Hanshu;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1832-1853
    • /
    • 2018
  • The personal health record (PHR) system is a promising application that provides precise information and customized services for health care. To flexibly protect sensitive data, attribute-based encryption has been widely applied for PHR access control. However, escrow, exposure and abuse of private keys still hinder its practical application in the PHR system. In this paper, we propose a coordinated ciphertext policy attribute-based access control with user accountability (CCP-ABAC-UA) for the PHR system. Its coordinated mechanism not only effectively prevents the escrow and exposure of private keys but also accurately detects whether key abuse is taking place and identifies the traitor. We claim that CCP-ABAC-UA is a user-side lightweight scheme. Especially for PHR receivers, no bilinear pairing computation is needed to access health records, so the practical mobile PHR system can be realized. By introducing a novel provably secure construction, we prove that it is secure against selectively chosen plaintext attacks. The analysis indicates that CCP-ABAC-UA achieves better performance in terms of security and user-side computational efficiency for a PHR system.