Modeling of threats in the sphere of medical data storage

Автор: Sergey S. Pirozhkov, Olga N. Sakharova, Konstantin K. Kamyshev, Viktor M. Kureichik, Ilya M. Borodyansky

Журнал: Cardiometry @cardiometry

Рубрика: Short report

Статья в выпуске: 20, 2021 года.

Бесплатный доступ

In medical institutions of various levels, a large amount of data is stored in electronic form, to ensure the safety of which are presented with special requirements. Ensuring the safety of the storage of medical data should begin with an analysis of existing threats. This article provides a model of threats in the area of data storage, which includes the following components: comunicative, spatial and destructive threat. It is shown that, to date, communicative and spatial threats have minor rates, which can be neglected. The destructive threat is considered in more detail, its components are described. Recommendations for the development of medical data storage systems are given.

Еще

Data storage, Recommender system, Medical records, Database

Короткий адрес: https://sciup.org/148322450

IDR: 148322450   |   DOI: 10.18137/cardiometry.2021.20.190193

Список литературы Modeling of threats in the sphere of medical data storage

  • Kurechik VM, Pirogkov SS. Overview: Problems of Storage of Large Data. Proceedings of the International Scientific and Technical Congress “Intellectual Systems and Information Technologies 2020”.2020;1:420-6. [in Russian]
  • Konstantin V. Kamyshev, Viktor M. Kureichik, Ilya M. Borodyanskiy. Review of the recommender systems application in cardiology. Cardiometry; Issue 16; May 2020; p.97-105; DOI: 10.12710/cardiometry.2020.16.97105
  • Kureichik VM, Sakharova ON, Pirozhkov SS. Threats in the storage of data // Engineering Journal of Don. 2021;7. URL: http://www.ivdon.ru/uploads/article/pdf/IVD_60__6_kureichik_sakharova_pirozhkov.pdf_d70c5b810a.pdf [in Russian]
  • A Taxonomy of DDoSW Attacks and DDoS Defense Mechanism – UCLA CSD Thechnical Report no. 020018. URL: lasr.cs.u cla.edu/ddos/ucla_tech_report_020018.pdf
  • Zhdanova IV, Bykov DV. Options for building an electronic document protection system from copying. Engineering Journal of Don. 2012. No. 2 URL: ivdon.ru/ru/magazine/archive/n2y2012/825 [in Russian]
  • Panov RI. Modern methods of information protection on the example of a Russian device. Modern problems of science and education, 2015, № 2-2.;URL: http://science-education.ru/ru/article/view?id=23134 [in Russian]
  • Zhdanova IV, Bykov DV. Options for building an electronic document protection system from copying. Engineering Journal of Don. 2012. No. 2. URL: ivdon.ru/ru/magazine/archive/n2y2012/825 [in Russian]
  • Panov RI. Modern methods of information protection on the example of a Russian device. Modern problems of science and education. 2015;2-2. URL: http://science-education.ru/ru/article/view?id=23134 [in Russian]
  • Enikeeva LA, Stelmashonok EV, Stelmashonok VL. Modeling of information protection system of business processes infrastructure on an industrial plant. International business management. 2016;3:315-9.
  • Mingaleva Z, Mirskikh I. Small innovative enterprise: the problems of protection of commercial confidential information and know-how. Middle east journal of scientific research, 2013;13:97-101.
  • Onyigwang OJ, Shestak Y, Oksiuk A. Information protection of data processing center against cyber attacks. Proceedings of the 2016 IEEE 1st international conference on data stream mining and processing, DSMP 2016. 2016. p.397-400
Еще
Статья научная