Publication:
Security assessment of information system in hospital environment

dc.contributor.authorSuratose Tritilanunten_US
dc.contributor.authorRuaysungnoen Surapolen_US
dc.contributor.otherMahidol Universityen_US
dc.date.accessioned2018-12-11T02:37:28Z
dc.date.accessioned2019-03-14T08:04:30Z
dc.date.available2018-12-11T02:37:28Z
dc.date.available2019-03-14T08:04:30Z
dc.date.issued2016-12-17en_US
dc.description.abstract© 2016 ACM. The purpose of this paper is to propose the risk assessment for an IT security system used in a hospital. The process is developed based on the study of standard and best practices of security risk assessment used in information system. The security assessment includes key processes such as Risk Assessment and Vulnerability Verification along with other factors for supporting the development. Results from the experiment at sample hospitals, our tool was able to assess and rate the security risk which reflects the environment of the hospital's information system. This tool was able to simulate some examples of exploitation in order to test system flaws and generate a report to be used as a reference.en_US
dc.identifier.citationACM International Conference Proceeding Series. (2016), 11-16en_US
dc.identifier.doi10.1145/3033288.3033296en_US
dc.identifier.other2-s2.0-85018302962en_US
dc.identifier.urihttps://repository.li.mahidol.ac.th/handle/20.500.14594/43445
dc.rightsMahidol Universityen_US
dc.rights.holderSCOPUSen_US
dc.source.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85018302962&origin=inwarden_US
dc.subjectComputer Scienceen_US
dc.titleSecurity assessment of information system in hospital environmenten_US
dc.typeConference Paperen_US
dspace.entity.typePublication
mu.datasource.scopushttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85018302962&origin=inwarden_US

Files

Collections