Threat modeling for electronic health record systems - PubMed Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2012 Oct;36(5):2921-6.
doi: 10.1007/s10916-011-9770-6. Epub 2011 Aug 26.

Threat modeling for electronic health record systems

Affiliations

Threat modeling for electronic health record systems

Ahmad Almulhem. J Med Syst. 2012 Oct.

Abstract

The security of electronic health record (EHR) systems is crucial for their growing acceptance. There is a need for assurance that these records are securely protected from attacks. For a system as complex as an EHR system, the number of possible attacks is potentially very large. In this paper, a threat modeling methodology, known as attack tree, is employed to analyze attacks affecting EHR systems. The analysis is based on a proposed generic client-server model of EHR systems. The developed attack tree is discussed along with some system properties that enable quantitative and qualitative analysis. A list of suggested countermeasures are also highlighted.

PubMed Disclaimer

Similar articles

Cited by

References

    1. Int J Med Inform. 2008 May;77(5):291-304 - PubMed
    1. Yearb Med Inform. 2005;(1):301-304 - PubMed
    1. BMJ. 1996 Jan 13;312(7023):109-11 - PubMed
    1. J Am Med Inform Assoc. 1996 Mar-Apr;3(2):139-48 - PubMed

LinkOut - more resources