Skip to main content

2020 | OriginalPaper | Buchkapitel

A Conceptual Redesign of a Modelling Language for Cyber Resiliency of Healthcare Systems

verfasst von : Myrsini Athinaiou, Haralambos Mouratidis, Theo Fotis, Michalis Pavlidis

Erschienen in: Computer Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Security constraints that enforce security requirements characterize healthcare systems. These constraints have a substantial impact on the resiliency of the final system. Security requirements modelling approaches allow the prevention of cyber incidents; however, the focus to date has been on prevention rather than resiliency. Resiliency extends into the detection, mitigation and recovery after security violations. In this paper, we propose an enhanced at a conceptual level that attempts to align cybersecurity with resiliency. It does so by extending the Secure Tropos cybersecurity modelling language to include resiliency. The proposed conceptual model examines resiliency from three viewpoints, namely the security requirements, the healthcare context and its implementational capability. We present an overview of our conceptual model of a cyber resiliency language and discuss a case study to attest the healthcare context in our approach.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
5.
Zurück zum Zitat Arney, D., Pajic, M., Goldman, J.M., Lee, I., Mangharam, R., Sokolsky, O.: Toward patient safety in closed-loop medical device systems. In: Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems - ICCPS 2010, pp. 139–148. ACM Press, Stockholm (2010) Arney, D., Pajic, M., Goldman, J.M., Lee, I., Mangharam, R., Sokolsky, O.: Toward patient safety in closed-loop medical device systems. In: Proceedings of the 1st ACM/IEEE International Conference on Cyber-Physical Systems - ICCPS 2010, pp. 139–148. ACM Press, Stockholm (2010)
7.
Zurück zum Zitat Boddy, A., Hurst, W., Mackay, M., Rhalibi, A.E.: A study into data analysis and visualisation to increase the cyber-resilience of healthcare infrastructures. In: Proceedings of the 1st International Conference on Internet of Things and Machine Learning - IML 1917, pp. 1–7. ACM Press, Liverpool (2017) Boddy, A., Hurst, W., Mackay, M., Rhalibi, A.E.: A study into data analysis and visualisation to increase the cyber-resilience of healthcare infrastructures. In: Proceedings of the 1st International Conference on Internet of Things and Machine Learning - IML 1917, pp. 1–7. ACM Press, Liverpool (2017)
8.
Zurück zum Zitat Den Braber, F., Hogganvik, I., Lund, M.S., Stlen, K., Vraalsen, F.: Model-based security analysis in seven steps a guided tour to the CORAS method. BT Technol. J. 25(1), 101–117 (2007)CrossRef Den Braber, F., Hogganvik, I., Lund, M.S., Stlen, K., Vraalsen, F.: Model-based security analysis in seven steps a guided tour to the CORAS method. BT Technol. J. 25(1), 101–117 (2007)CrossRef
9.
Zurück zum Zitat Bresciani, P., Perini, A., Giorgini, P., Giunchiglia, F., Mylopoulos, J.: Tropos: an agent-oriented software development methodology. Auton. Agents Multi-Agent Syst. 8(3), 203–236 (2004)CrossRef Bresciani, P., Perini, A., Giorgini, P., Giunchiglia, F., Mylopoulos, J.: Tropos: an agent-oriented software development methodology. Auton. Agents Multi-Agent Syst. 8(3), 203–236 (2004)CrossRef
10.
Zurück zum Zitat Chapurlat, V., et al.: Towards a model-based method for resilient critical infrastructure engineering how to model critical infrastructures and evaluate ist resilience? How to model critical infrastructures and evaluate its Resilience? In: 2018 13th Annual Conference on System of Systems Engineering (SoSE), pp. 561–567. IEEE, Paris (2018) Chapurlat, V., et al.: Towards a model-based method for resilient critical infrastructure engineering how to model critical infrastructures and evaluate ist resilience? How to model critical infrastructures and evaluate its Resilience? In: 2018 13th Annual Conference on System of Systems Engineering (SoSE), pp. 561–567. IEEE, Paris (2018)
11.
Zurück zum Zitat Chen, Q., Lambright, J.: Towards realizing a self-protecting healthcare information system. In: 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), pp. 687–690. IEEE, Atlanta (2016) Chen, Q., Lambright, J.: Towards realizing a self-protecting healthcare information system. In: 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), pp. 687–690. IEEE, Atlanta (2016)
12.
Zurück zum Zitat Chernyshev, M., Zeadally, S., Baig, Z.: Healthcare data breaches: implications for digital forensic readiness. J. Med. Syst. 43(1), 7 (2019)CrossRef Chernyshev, M., Zeadally, S., Baig, Z.: Healthcare data breaches: implications for digital forensic readiness. J. Med. Syst. 43(1), 7 (2019)CrossRef
13.
Zurück zum Zitat Cichonski, P., Millar, T., Grance, T., Scarfone, K.: Computer Security Incident Handling Guide: Recommendations of the National Institute of Standards and Technology. Technical report NIST SP 800-61r2, National Institute of Standards and Technology (2012) Cichonski, P., Millar, T., Grance, T., Scarfone, K.: Computer Security Incident Handling Guide: Recommendations of the National Institute of Standards and Technology. Technical report NIST SP 800-61r2, National Institute of Standards and Technology (2012)
14.
Zurück zum Zitat Cooper, T., Collmann, J., Neidermeier, H.: Organizational repertoires and rites in health information security. Camb. Q. Healthc. Ethics 17(4), 441–452 (2008)CrossRef Cooper, T., Collmann, J., Neidermeier, H.: Organizational repertoires and rites in health information security. Camb. Q. Healthc. Ethics 17(4), 441–452 (2008)CrossRef
15.
Zurück zum Zitat Dardenne, A., van Lamsweerde, A., Fickas, S.: Goal-directed requirements acquisition. Sci. Comput. Program. 20(1–2), 3–50 (1993)CrossRef Dardenne, A., van Lamsweerde, A., Fickas, S.: Goal-directed requirements acquisition. Sci. Comput. Program. 20(1–2), 3–50 (1993)CrossRef
16.
Zurück zum Zitat DeVoe, C., Rahman, S.S.M.: Incident response plan for a small to medium sized hospital. Int. J. Netw. Secur. Appl. 5(2), 1–20 (2013) DeVoe, C., Rahman, S.S.M.: Incident response plan for a small to medium sized hospital. Int. J. Netw. Secur. Appl. 5(2), 1–20 (2013)
17.
Zurück zum Zitat Genes, N., Chary, M., Chason, K.W.: Case study. An academic medical centers response to widespread computer failure. Am. J. Disaster Med. 8(2), 145–150 (2013)CrossRef Genes, N., Chary, M., Chason, K.W.: Case study. An academic medical centers response to widespread computer failure. Am. J. Disaster Med. 8(2), 145–150 (2013)CrossRef
18.
Zurück zum Zitat Ghafur, S., Grass, E., Jennings, N.A., Darzi, A.: The challenges of cybersecurity in health care: the UK National Health Service as a case study. Lancet Digit. Health 1(1), e10–e12 (2019)CrossRef Ghafur, S., Grass, E., Jennings, N.A., Darzi, A.: The challenges of cybersecurity in health care: the UK National Health Service as a case study. Lancet Digit. Health 1(1), e10–e12 (2019)CrossRef
20.
Zurück zum Zitat Giorgini, P., Mylopoulos, J., Sebastiani, R.: Goal-oriented requirements analysis and reasoning in the Tropos methodology. Eng. Appl. Artif. Intell. 18(2), 159–171 (2005)CrossRef Giorgini, P., Mylopoulos, J., Sebastiani, R.: Goal-oriented requirements analysis and reasoning in the Tropos methodology. Eng. Appl. Artif. Intell. 18(2), 159–171 (2005)CrossRef
21.
Zurück zum Zitat He, Y., Johnson, C.: Challenges of information security incident learning: an industrial case study in a Chinese healthcare organization. Inf. Health Soc. Care 42(4), 393–408 (2017)CrossRef He, Y., Johnson, C.: Challenges of information security incident learning: an industrial case study in a Chinese healthcare organization. Inf. Health Soc. Care 42(4), 393–408 (2017)CrossRef
22.
Zurück zum Zitat Lee, I., et al.: Challenges and research directions in medical cyberphysical systems. Proc. IEEE 100(1), 75–90 (2012)CrossRef Lee, I., et al.: Challenges and research directions in medical cyberphysical systems. Proc. IEEE 100(1), 75–90 (2012)CrossRef
23.
Zurück zum Zitat Jalali, M.S., Russell, B., Razak, S., Gordon, W.J.: EARS to cyber incidents in health care. J. Am. Med. Inf. Assoc. 26(1), 81–90 (2019)CrossRef Jalali, M.S., Russell, B., Razak, S., Gordon, W.J.: EARS to cyber incidents in health care. J. Am. Med. Inf. Assoc. 26(1), 81–90 (2019)CrossRef
25.
Zurück zum Zitat van Lamsweerde, A.: Goal-oriented requirements engineering: a guided tour. In: Proceedings Fifth IEEE International Symposium on the Requirements Engineering, pp. 249–262. IEEE Computer Society, Toronto (2000) van Lamsweerde, A.: Goal-oriented requirements engineering: a guided tour. In: Proceedings Fifth IEEE International Symposium on the Requirements Engineering, pp. 249–262. IEEE Computer Society, Toronto (2000)
27.
Zurück zum Zitat Lin, L., Nuseibeh, B., Ince, D., Jackson, M., Moffett, J.: Introducing abuse frames for analyzing security requirements. J. Lightwave Technol. 371–372 (2003). IEEE Comput. Soc, Monterey Bay, CA, USA Lin, L., Nuseibeh, B., Ince, D., Jackson, M., Moffett, J.: Introducing abuse frames for analyzing security requirements. J. Lightwave Technol. 371–372 (2003). IEEE Comput. Soc, Monterey Bay, CA, USA
29.
Zurück zum Zitat McDermott, J., Fox, C.: Using abuse case models for security requirements analysis. In: Proceedings 15th Annual Computer Security Applications Conference (ACSAC 1999), pp. 55–64. IEEE Computer Society, Phoenix (1999) McDermott, J., Fox, C.: Using abuse case models for security requirements analysis. In: Proceedings 15th Annual Computer Security Applications Conference (ACSAC 1999), pp. 55–64. IEEE Computer Society, Phoenix (1999)
30.
Zurück zum Zitat McGlade, D., Scott-Hayward, S.: ML-based cyber incident detection for Electronic Medical Record (EMR) systems. Smart Health 12, 3–23 (2019)CrossRef McGlade, D., Scott-Hayward, S.: ML-based cyber incident detection for Electronic Medical Record (EMR) systems. Smart Health 12, 3–23 (2019)CrossRef
31.
Zurück zum Zitat Mead, N.R., Stehney, T.: Security quality requirements engineering (SQUARE) methodology. ACM SIGSOFT Softw. Eng. Notes 30(4), 1 (2005)CrossRef Mead, N.R., Stehney, T.: Security quality requirements engineering (SQUARE) methodology. ACM SIGSOFT Softw. Eng. Notes 30(4), 1 (2005)CrossRef
32.
Zurück zum Zitat Meland, P.H., Paja, E., Gjre, E.A., Paul, S., Dalpiaz, F., Giorgini, P.: Threat analysis in goal-oriented security requirements modelling. In: Computer Systems and Software Engineering: Concepts, Methodologies, Tools, and Applications, pp. 2025–2042. IGI Global (2018) Meland, P.H., Paja, E., Gjre, E.A., Paul, S., Dalpiaz, F., Giorgini, P.: Threat analysis in goal-oriented security requirements modelling. In: Computer Systems and Software Engineering: Concepts, Methodologies, Tools, and Applications, pp. 2025–2042. IGI Global (2018)
34.
Zurück zum Zitat Mouratidis, H., Giorgini, P.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Softw. Eng. Knowl. Eng. 17(02), 285–309 (2007)CrossRef Mouratidis, H., Giorgini, P.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Softw. Eng. Knowl. Eng. 17(02), 285–309 (2007)CrossRef
35.
Zurück zum Zitat Mwiki, H., Dargahi, T., Dehghantanha, A., Choo, K.-K.R.: Analysis and triage of advanced hacking groups targeting western countries critical national infrastructure: APT28, RED October, and Regin. In: Gritzalis, D., Theocharidou, M., Stergiopoulos, G. (eds.) Critical Infrastructure Security and Resilience. ASTSA, pp. 221–244. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-00024-0_12CrossRef Mwiki, H., Dargahi, T., Dehghantanha, A., Choo, K.-K.R.: Analysis and triage of advanced hacking groups targeting western countries critical national infrastructure: APT28, RED October, and Regin. In: Gritzalis, D., Theocharidou, M., Stergiopoulos, G. (eds.) Critical Infrastructure Security and Resilience. ASTSA, pp. 221–244. Springer, Cham (2019). https://​doi.​org/​10.​1007/​978-3-030-00024-0_​12CrossRef
37.
Zurück zum Zitat Pavlidis, M., Islam, S., Mouratidis, H., Kearney, P.: Modeling trust relationships for developing trustworthy information systems. Int. J. Inf. Syst. Model. Des. 5(1), 25–48 (2014)CrossRef Pavlidis, M., Islam, S., Mouratidis, H., Kearney, P.: Modeling trust relationships for developing trustworthy information systems. Int. J. Inf. Syst. Model. Des. 5(1), 25–48 (2014)CrossRef
40.
Zurück zum Zitat Ross, R., Graubart, R., Bodeau, D., McQuaid, R.: Systems Security Engineering Cyber Resiliency Considerations for the Engineering of Trustworthy Secure Systems. Technical report, NIST (2018) Ross, R., Graubart, R., Bodeau, D., McQuaid, R.: Systems Security Engineering Cyber Resiliency Considerations for the Engineering of Trustworthy Secure Systems. Technical report, NIST (2018)
42.
Zurück zum Zitat Sindre, G., Firesmith, D.G., Opdahl, A.L.: A reuse-based approach to determining security requirements. Requirements Eng. 10, 34–44 (2004)CrossRef Sindre, G., Firesmith, D.G., Opdahl, A.L.: A reuse-based approach to determining security requirements. Requirements Eng. 10, 34–44 (2004)CrossRef
43.
Zurück zum Zitat Sittig, D., Singh, H.: A socio-technical approach to preventing, mitigating, and recovering from ransomware attacks. Appl. Clin. Inf. 07(02), 624–632 (2016)CrossRef Sittig, D., Singh, H.: A socio-technical approach to preventing, mitigating, and recovering from ransomware attacks. Appl. Clin. Inf. 07(02), 624–632 (2016)CrossRef
44.
Zurück zum Zitat Wiant, T.L.: Information security policy’s impact on reporting security incidents. Comput. Secur. 24(6), 448–459 (2005)CrossRef Wiant, T.L.: Information security policy’s impact on reporting security incidents. Comput. Secur. 24(6), 448–459 (2005)CrossRef
45.
Zurück zum Zitat Williams, P.A.H.: Is cyber resilience in medical practice security achievable? In: Proceedings of the 1st International Cyber Resilience Conference, pp. 105–111. Edith Cowan University, Perth (2010) Williams, P.A.H.: Is cyber resilience in medical practice security achievable? In: Proceedings of the 1st International Cyber Resilience Conference, pp. 105–111. Edith Cowan University, Perth (2010)
46.
Zurück zum Zitat Yu, E.S.K.: Modeling strategic relationships for process reengineering, Ph.D. thesis, University of Toronto, Canada (1995) Yu, E.S.K.: Modeling strategic relationships for process reengineering, Ph.D. thesis, University of Toronto, Canada (1995)
47.
Zurück zum Zitat Jiang, Z., Pajic, M., Mangharam, R.: Cyberphysical modeling of implantable cardiac medical devices. Proc. IEEE 100(1), 122–137 (2012)CrossRef Jiang, Z., Pajic, M., Mangharam, R.: Cyberphysical modeling of implantable cardiac medical devices. Proc. IEEE 100(1), 122–137 (2012)CrossRef
Metadaten
Titel
A Conceptual Redesign of a Modelling Language for Cyber Resiliency of Healthcare Systems
verfasst von
Myrsini Athinaiou
Haralambos Mouratidis
Theo Fotis
Michalis Pavlidis
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-42048-2_10