과제정보
이 논문은 2024년도 정부(과학기술정보통신부)의 재원으로 정보통신기획평가원의 지원을 받아 수행된 연구임 (RS-2024-00438796, 클라우드 기반 사이버 훈련장 구축 기술 및 사이버 훈련 시나리오 기술 언어(K-SDL) 개발).
참고문헌
- 과학기술정보통신부, 한국정보보호산업협회, 2023년 정보보호 실태조사, 2024.
- 보건복지부, 2020년 보건의료정보화 실태조사, 2021.
- 한국인터넷진흥원, 디지털 헬스케어 보안 모델, 2021.
- Almulhem, A., "Threat modeling for electronic health record systems", Journal of Medical Systems, Vol.36, 2012, 2921-2926. https://doi.org/10.1007/s10916-011-9770-6
- Argaw, S. T., J. R. Troncoso-Pastoriza, D. Lacey, M. V. Florin, F. Calcavecchia, D. Anderson, W. Burleson, J. M. Vogel, C. O. Leary, B. Eshaya-Chauvin, and A. Flahault, "Cybersecurity of Hospitals: discussing the challenges and working towards mitigating the risks", BMC Medical Informatics and Decision Making, Vol.20, No.146, 2020, 1-10. https://doi.org/10.1186/s12911-019-1002-x
- Coronado, A. J. and T. L. Wong, "Healthcare cybersecurity risk management: Keys to an effective plan", Biomedical Instrumentation & Technology, Vol.48, No.s1, 2014, 26-30. https://doi.org/10.2345/0899-8205-48.s1.26
- Fielder, A., E. Panaousis, P. Malacaria, C. Hankin, F. Smeraldi, "Decision support approaches for cyber security investment", Decision Support Systems, Vol.86, 2016, 13-23. https://doi.org/10.1016/j.dss.2016.02.012
- Ganin, A. A., P. Quach, M. Panwar, Z. A. Collier, J. M. Keisler, D. Marchese, and I. Linkov, "Multicriteria decision framework for cybersecurity risk assessment and management", Risk Analysis, Vol.40, No.1, 2020, 183-199. https://doi.org/10.1111/risa.12891
- IBM, Cost of a Data Breach Report 2022, 2022.
- Ismail, A., A. T. Jamil, A. F. A. Rahman, J.M. A. Bakar, N. M. Saad, and H. Saadi, "The Implementation Of Hospital Information System (HIS) in tertiary hospitals in Malaysia: A qualitative study", Journal of Public Health Medicine, Vol.10, No.2, 2010, 16-24.
- Javorník, M. and M. Husák, "Mission-centric decision support in cybersecurity via Bayesian Privilege Attack Graph", Engineering Reports, Vol.4, No.12, 2022, e12538. https://doi.org/10.1002/eng2.12538
- Khouzani, M. H. R., Z. Liu, and P. Malacaria, "Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs", European Journal of Operational Research, Vol.278, No.3, 2019, 894-903. https://doi.org/10.1016/j.ejor.2019.04.035
- Lee, I., "Cybersecurity: Risk management framework and investment cost analysis", Business Horizons, Vol.64, No.5, 2021, 659-671. https://doi.org/10.1016/j.bushor.2021.02.022
- Lee, S. H., H. J. Jun, and T. S. Kim, "Early career turnover model and career path for self-realization: Findings in Korea's information security industry", Asia Pacific Journal of Information Systems, Vol. 33, No. 4, 2023, 1135-1155. https://doi.org/10.14329/apjis.2023.33.4.1135
- NBC News, "Baby died because of ransomware attack on hospital", 2021.10.1.
- Ponemon Institute, Cyber Insecurity in Healthcare: The Cost and Impact on Patient Safety and Care, 2023.
- Smeraldi, F. and P. Malacaria, "How to spend it: optimal investment for cyber security", In Proceedings of the 1st International Workshop on Agents and CyberSecurity, 2014, 1-4.
- Sönmez, F. Ö., C. Hankin, and P. Malacaria, "Decision support for healthcare cyber security", Computers & Security, Vol.122, 2022, 102865. https://doi.org/10.1016/j.cose.2022.102865
- Taylor, C. R., Venkatasubramanian, K., Shue, C. A., "Understanding the security of interoperable medical devices using attack graphs", In Proceedings of the 3rd International Conference on High Confidence Networked Systems, 2014, 31-40.
- The HIPAA Journal, Change Healthcare Cyberattack Affected 100 Million Individuals, 2024.10., https://www.hipaajournal.com/change-healthcare-responding-to-cyberattack/, accessed on2024. 10. 28.
- The New York Times, "Cyber Attack Suspected in German Woman's Death", 2020.9.18.
- Wang, S., Z. Zhang, and Y. Kadobayashi, "Exploring attack graph for cost-benefit security hardening: A probabilistic approach", Computers & Security, Vol.32, 2013, 158-169. https://doi.org/10.1016/j.cose.2012.09.013
- Yeng, P., S. D. Wolthusen, and B. Yang, "Comparative analysis of threat modeling methods for cloud computing towards healthcare security practice", International Journal of Advanced Computer Science and Applications, Vol.11, No.11, 2020, 772-784. https://doi.org/10.14569/IJACSA.2020.0111194