2018 IEEE Technology and Engineering Management Conference (TEMSCON) 2018
DOI: 10.1109/temscon.2018.8488449
|View full text |Cite
|
Sign up to set email alerts
|

Security Risk Assessment in Electronic Health Record System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…Vulnerability is defined as a weakness that is either accidentally or intentionally triggered. The weakness in the security or controls of asset may be exploited by threats [9], [15] Vulnerabilities usually is a technical issue, but sometimes the incidents were caused by human, for example, the employee uses weak password which is vulnerable to attack from an outsider. Sometimes, without notice or awareness, someone will download software, not knowing that it contains malicious code.…”
Section: Vulnerabilitymentioning
confidence: 99%
See 1 more Smart Citation
“…Vulnerability is defined as a weakness that is either accidentally or intentionally triggered. The weakness in the security or controls of asset may be exploited by threats [9], [15] Vulnerabilities usually is a technical issue, but sometimes the incidents were caused by human, for example, the employee uses weak password which is vulnerable to attack from an outsider. Sometimes, without notice or awareness, someone will download software, not knowing that it contains malicious code.…”
Section: Vulnerabilitymentioning
confidence: 99%
“…The controls from Annex A of ISO/IEC 27001:2013 [8], [9] are useful in handling and helping to reduce the risks encountered. Risk treatment will reduce the risks which are not acceptable by using the controls from Annex A in ISO/IEC 27001.…”
Section: Introductionmentioning
confidence: 99%