Adopting ISO/IEC 27005:2011-based risk treatment plan to prevent patients data theft

The concern raised in late 2017 regarding 46.2 million mobile device subscriber's data breach had the Malaysian police started an investigation looking for the source of the leak. Data security is very important to protect the assets or information by providing its confidentiality, integrity, a...

Full description

Bibliographic Details
Main Authors: Hamit, Laura Cassandra (Author), Md. Sarkan, Haslina (Author), Mohd. Azmi, Nurulhuda Firdaus (Author), Mahrin, Mohd. Naz'ri (Author), Chuprat, Suriayati (Author), Yahya, Yazriwati (Author)
Format: Article
Language:English
Published: Insight Society, 2020.
Subjects:
Online Access:Get fulltext
LEADER 02246 am a22001933u 4500
001 93635
042 |a dc 
100 1 0 |a Hamit, Laura Cassandra  |e author 
700 1 0 |a Md. Sarkan, Haslina  |e author 
700 1 0 |a Mohd. Azmi, Nurulhuda Firdaus  |e author 
700 1 0 |a Mahrin, Mohd. Naz'ri  |e author 
700 1 0 |a Chuprat, Suriayati  |e author 
700 1 0 |a Yahya, Yazriwati  |e author 
245 0 0 |a Adopting ISO/IEC 27005:2011-based risk treatment plan to prevent patients data theft 
260 |b Insight Society,   |c 2020. 
856 |z Get fulltext  |u http://eprints.utm.my/id/eprint/93635/1/HaslinaMdSarkan2020_AdoptingISOIEC270052011BasedRiskTreatment.pdf 
520 |a The concern raised in late 2017 regarding 46.2 million mobile device subscriber's data breach had the Malaysian police started an investigation looking for the source of the leak. Data security is very important to protect the assets or information by providing its confidentiality, integrity, and availability not only in the telecommunication industry but also in other sectors. This paper attempts to protect the data of a patient-based clinical system by producing a risk treatment plan for its software products. The existing system is vulnerable to information theft, insecure databases, poor audit login, and password management. The information security risk assessment consisting of identifying risks, analyzing, and evaluating them were conducted before a risk assessment report is written down. A risk management framework was applied to the software development unit of the organization to countermeasure these risks. ISO/IEC 27005:2011 standard was used as the basis for the information security risk management framework. The controls from Annex A of ISO/IEC 27001:2013 were used to reduce the risks. Thirty risks have been identified, and seven high-level risks for the product have been recognized. A risk treatment plan focusing on the risks and controls has been developed for the system to reduce these risks to secure the patient's data. This will eventually enhance the information security in the software development unit and, at the same time, increase awareness among the team members concerning risks and the means to handle them. 
546 |a en 
650 0 4 |a T Technology (General)