Page 349 -
P. 349

332   Chapter 12   Dependability and security specification


                     Asset                    Value                         Exposure

                     The information system   High. Required to support all  High. Financial loss as clinics may
                                              clinical consultations. Potentially  have to be canceled. Costs of
                                              safety-critical.              restoring system. Possible patient
                                                                            harm if treatment cannot be
                                                                            prescribed.

                     The patient database     High. Required to support all  High. Financial loss as clinics may
                                              clinical consultations. Potentially  have to be canceled. Costs of
                                              safety-critical.              restoring system. Possible patient
                                                                            harm if treatment cannot be
                                                                            prescribed.

                     An individual patient record  Normally low although may be  Low direct losses but possible loss
                                              high for specific high-profile  of reputation.
                                              patients.



                                        be requirements for the system infrastructure or the application system (risk
                   Figure 12.10  Asset
                   analysis in a        reduction).
                   preliminary risk
                   assessment report  An important input to the risk assessment and management process is the organi-
                   for the MHC-PMS
                                    zational security policy. An organizational security policy applies to all systems and
                                    should set out what should and what should not be allowed. For example, one aspect
                                    of a military security policy may state ‘Readers may only examine documents whose
                                    classification is the same as or below the reader’s vetting level.’ This means that if a
                                    reader has been vetted to a ‘secret’ level, they may access documents that are classed
                                    as ‘secret,’ ‘confidential,’ or ‘open’ but not documents classed as ‘top secret.’
                                      The security policy sets out conditions that should always be maintained by a
                                    security system and so helps identify threats that might arise. Threats are any-
                                    thing that could threaten business security. In practice, security policies are usu-
                                    ally informal documents that define what is and what isn’t allowed. However,
                                    Bishop (2005) discusses the possibility of expressing security policies in a formal
                                    language and generating automated checks to ensure that the policy is being
                                    followed.
                                      To illustrate this process of security risk analysis, consider the hospital informa-
                                    tion system for mental health care, MHC-PMS. I don’t have space to discuss a com-
                                    plete risk assessment here but rather draw on this system as a source of examples.
                                    I have shown these as a fragment of a report (Figures 12.10 and 12.11) that might be
                                    generated from the preliminary risk assessment process. This preliminary risk analysis
                                    report is used in defining the security requirements.
                                      From the risk analysis for the hospital information system, you can derive secu-
                                    rity requirements. Some examples of these requirements are:

                                    1.  Patient information shall be downloaded, at the start of a clinic session, from the
                                        database to a secure area on the system client.
   344   345   346   347   348   349   350   351   352   353   354