comp3521 chapter 14

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following best describes the primary goal of resilience engineering in software systems?

  • To eliminate all possible system failures and vulnerabilities.
  • To reduce the cost of software development and maintenance.
  • To maximize system performance under ideal operating conditions.
  • To ensure the system maintains continuity of critical services despite disruptive events. (correct)

Resilience engineering places emphasis on:

  • Avoiding system failures entirely.
  • Minimizing the cost of system failures and facilitating recovery. (correct)
  • Maximizing the number of technical faults in a system.
  • Ignoring the potential for system failures.

In the context of resilience activities, what is the role of 'Resistance'?

  • To recognize early indications of system failure.
  • To reduce the probability that the system will fail when problems are detected. (correct)
  • To restore all system services to normal operation.
  • To restore critical system services quickly after a failure.

What does 'proactive resistance' involve in system resilience?

<p>Including defenses in a system to trap problems before they cause failure. (B)</p> Signup and view all the answers

Which statement accurately describes the scope of cybersecurity?

<p>Cybersecurity encompasses all aspects of protecting an organization's IT assets, including networks and application systems. (B)</p> Signup and view all the answers

What is a key factor contributing to cybersecurity failure?

<p>Inappropriate trade-offs between usability and security. (D)</p> Signup and view all the answers

Which type of cybersecurity threat involves data being made accessible to unauthorized individuals?

<p>Threats to the confidentiality of assets. (D)</p> Signup and view all the answers

In cybersecurity, what is the primary purpose of firewalls?

<p>To examine network packets and allow or deny access based on organizational rules. (D)</p> Signup and view all the answers

Which practice supports recovery after a successful cyberattack?

<p>Maintaining copies of data and software on separate systems. (A)</p> Signup and view all the answers

Which of the following is a key step in cyber-resilience planning?

<p>Classifying the organization's assets based on their importance to normal operations. (B)</p> Signup and view all the answers

What is the focus of 'Threat Identification' in cyber resilience planning?

<p>Classifying and identifying potential threats to specific assets. (B)</p> Signup and view all the answers

What does 'Asset Reinstatement' involve in the context of cyber resilience planning?

<p>Defining procedures to bring the system back into normal operation after asset recovery. (C)</p> Signup and view all the answers

Why is it important to consider sociotechnical systems design when building resilient systems?

<p>Dealing with adverse external events is often easier within the broader sociotechnical system. (A)</p> Signup and view all the answers

In the Mentcare example, what is presented as a better strategy to prevent data theft from a user's credentials rather than using complex authentication procedures?

<p>Introducing organizational policies that emphasize the importance of not sharing login credentials and maintaining strong passwords. (D)</p> Signup and view all the answers

In a nested technical and sociotechnical system, what happens if a failure in system S1 leads to a failure in system ST1?

<p>Managers in the broader organization are responsible for addressing the failure. (C)</p> Signup and view all the answers

What is a key characteristic of resilient organizations?

<p>Monitoring the organization and environment. (C)</p> Signup and view all the answers

What differentiates 'the person approach' from 'the systems approach' when considering human error?

<p>The person approach considers errors as consequences of individual behavior, while the systems approach examines the impact of the system's design and conditions. (B)</p> Signup and view all the answers

According to the systems approach, what is one reason people are likely to make mistakes?

<p>Poor training. (B)</p> Signup and view all the answers

What does redundancy and diversity achieve in creating defensive layers?

<p>It creates a set of defensive layers, where each layer uses a different approach to deter attackers or trap technical or human failures. (B)</p> Signup and view all the answers

According to the Swiss Cheese model, how do system failures occur?

<p>When all the 'holes' in defensive layers line up, allowing failures to propagate through all defenses. (A)</p> Signup and view all the answers

What action increases system resilience?

<p>Both C and D (D)</p> Signup and view all the answers

What is the relationship between efficiency and resilience in process design?

<p>Operational and management processes balance efficiency and problem management. (E)</p> Signup and view all the answers

What is an implication of only presenting operators with the information they 'need to know'?

<p>Operators may be unable to detect problems that do not directly affect their immediate tasks. (D)</p> Signup and view all the answers

How can process automation negatively influence system resilience?

<p>By reducing the human ability to detect issues (D)</p> Signup and view all the answers

What is a disadvantage of process automation?

<p>Automated actions may degrade due to incorrect actions (C)</p> Signup and view all the answers

What is the initial step in resilient systems design?

<p>Identifying critical services and assets. (B)</p> Signup and view all the answers

What is the purpose of 'Survivability Analysis'?

<p>To identify essential and vulnerable components and to develop survivability strategies. (B)</p> Signup and view all the answers

In the stages of survivability analysis, what is the focus of 'Identify softspots and survivability strategies'?

<p>Areas that are weak in design by attack and by failure (A)</p> Signup and view all the answers

What is a limitation of using survivability analysis for business systems?

<p>It assumes there is a detailed requirements statement for a system. (A)</p> Signup and view all the answers

What phase is 'Plan backup strategy' in Resilience Engineering?

<p>Reinstatement (C)</p> Signup and view all the answers

What is one of the work streams of resilience engineering?

<p>Test all aspects of resilience planning (B)</p> Signup and view all the answers

What should the aim be of good critical service maintenance?

<p>Continuing consultation without server access. (A)</p> Signup and view all the answers

What is one way of minimizing risks to confidentiality on multiple copies of information on laptops?

<p>Only download the summary records of patients who are scheduled to attend a clinic. (B)</p> Signup and view all the answers

What should resilience planning be based on?

<p>Insiders and outsiders and that some of these attacks will be successful. (C)</p> Signup and view all the answers

If the database is unavailable, how can doctors still access essential patient information?

<p>They should communicate directly or using an ad hoc network created using mobile phones (A)</p> Signup and view all the answers

Which is required for client and server communication?

<p>Network. (C)</p> Signup and view all the answers

Is the following an example of Recognition? Watchdog timer on client that times out if no response to client access

<p>True (B)</p> Signup and view all the answers

Is the following an example of Malware infection of client computers Security awareness workshops for all system users

<p>False (C)</p> Signup and view all the answers

What is the primary focus of resistance strategies in system resilience?

<p>Isolating critical parts of the system from broader issues. (B)</p> Signup and view all the answers

When is reactive resistance employed in system resilience?

<p>After a problem has been detected. (A)</p> Signup and view all the answers

What is the relationship between cybersecurity and system security engineering?

<p>Cybersecurity is a broader field than system security engineering. (D)</p> Signup and view all the answers

Which of the following represents a threat to the integrity of assets in cybersecurity?

<p>Data or systems being damaged by a cyberattack. (B)</p> Signup and view all the answers

How can multi-stage diverse authentication enhance system resilience?

<p>By protecting against automated password attacks. (B)</p> Signup and view all the answers

In cyber-resilience planning, what role does 'Threat Resistance' play?

<p>Identifying possible strategies to defend against identified threats. (D)</p> Signup and view all the answers

What does the 'Asset Classification' stage primarily involve in cyber resilience planning?

<p>Rating the essential nature of organizational resources. (B)</p> Signup and view all the answers

What is the primary objective of 'Threat Recognition' within cyber resilience planning?

<p>To determine methods for identifying attacks associated with potential threats. (D)</p> Signup and view all the answers

What is the purpose of 'Asset Recovery' in the context of cyber resilience planning?

<p>To develop methods for restoring assets after a successful cyberattack. (D)</p> Signup and view all the answers

What is the focus of the 'Asset Reinstatement' phase in cyber resilience planning?

<p>Executing operational procedures to revert the system to normalcy. (A)</p> Signup and view all the answers

What does sociotechnical systems design emphasize in resilient system development?

<p>Considering both technical and organizational factors that impact resilience. (C)</p> Signup and view all the answers

According to the Mentcare example, what organizational strategy is more effective in preventing data theft from user credentials than complex authentication?

<p>Educating users on the importance of not sharing login details. (D)</p> Signup and view all the answers

How do resilient organizations approach handling future threats and vulnerabilities?

<p>By proactively anticipating future challenges and opportunities. (D)</p> Signup and view all the answers

In the context of organizational resilience, what signifies 'the ability to learn'?

<p>Improving resilience through analyzing responses to adverse events. (A)</p> Signup and view all the answers

What is a key concept of the 'systems approach' to human error?

<p>People make errors because of situational factors and system design. (D)</p> Signup and view all the answers

Which statement aligns with the principles of the Swiss Cheese model of accident causation?

<p>Failures happen when vulnerabilities align across multiple defensive layers. (A)</p> Signup and view all the answers

What strategy increases overall system resilience according to the content?

<p>Decreasing the chances of external factors causing system failures. (B)</p> Signup and view all the answers

In balancing efficiency and resilence, what is the impact of prioritizing process improvement solely on efficiency?

<p>It may reduce the capability to manage problems effectively. (C)</p> Signup and view all the answers

What is a potential pitfall of providing operators only with the 'need to know' information to promote efficiency?

<p>It could impair their ability to notice anomalies not directly related to their tasks. (A)</p> Signup and view all the answers

How could process automation potentially detract from system resilience?

<p>By reducing the number of personnel available to address issues the system cannot manage. (B)</p> Signup and view all the answers

How can automated management systems undermine resilience?

<p>By occasionally performing unexpected actions that worsen the situation. (A)</p> Signup and view all the answers

What is the immediate next step in resilient systems design after identifying critical services and assets?

<p>To design system parts to support problem recognition and recovery. (D)</p> Signup and view all the answers

What is the purpose of Attack Simulation in survivable systems analysis?

<p>To create attack scenarios and understand their impact. (D)</p> Signup and view all the answers

In the stages of survivability analysis, what does 'Identify attacks and compromisable components' involve?

<p>Discovering points of vulnerability and possible attacks. (D)</p> Signup and view all the answers

What is a key limitation of survivability analysis for business systems, according to the content?

<p>Its foundation relies on system requirements and architecture documentation. (D)</p> Signup and view all the answers

Which action falls under the work stream of 'Plan event recognition and resistance' in Resilience Engineering?

<p>Identify events that compromise assets. (A)</p> Signup and view all the answers

What key pieces of information are needed to maintain the availability of critical services?

<p>Essential business services, minimum service quality, and compromise methods. (A)</p> Signup and view all the answers

In the Mentcare system, what client-side action enhances resilience by minimizing risks to confidentiality?

<p>Encrypting the local disk on client laptops. (A)</p> Signup and view all the answers

Why is it better to download information to the client before consultation occurs?

<p>Clients will not need the server to access information. (C)</p> Signup and view all the answers

Flashcards

System Resilience

How well a system maintains critical services during disruptive events, like failures and cyberattacks.

Critical Services

Services whose failure could cause serious harm (human, social, economic).

Disruptive Events

Unexpected events that disrupt the ability of a system to deliver its services.

Resilience Engineering

Assumes system failures are unavoidable and focuses on minimizing costs and aiding recovery.

Signup and view all the flashcards

Recognition (Resilience)

Recognizing early signs of system failure.

Signup and view all the flashcards

Resistance (Resilience)

Strategies to lessen the likelihood of system failure once symptoms are identified.

Signup and view all the flashcards

Recovery (Resilience)

Restoring critical system services quickly after a failure to minimize user impact.

Signup and view all the flashcards

Reinstatement (Resilience)

Restoring all system services to normal operation following a failure.

Signup and view all the flashcards

Cybercrime

The illegal use of networked systems; a serious problem facing society.

Signup and view all the flashcards

Cybersecurity

A broad, sociotechnical topic ensuring the protection of digital assets.

Signup and view all the flashcards

Threat to Confidentiality

Data is accessible to unauthorized individuals.

Signup and view all the flashcards

Threat to Integrity

Systems or data are damaged by a cyberattack.

Signup and view all the flashcards

Threat to Availability

Denying authorized users access to crucial assets.

Signup and view all the flashcards

Authentication

Verifying system users are authorized.

Signup and view all the flashcards

Encryption

Data is algorithmically scrambled to prevent unauthorized access.

Signup and view all the flashcards

Firewalls

Network packets are examined and either accepted or rejected.

Signup and view all the flashcards

Data Redundancy

Maintaining data and software copies on separate systems.

Signup and view all the flashcards

Asset Classification

Hardware, software, and human assets are classified by how important they are for normal operations.

Signup and view all the flashcards

Threat Identification

Identifying and classifying potential risks to organizational assets.

Signup and view all the flashcards

Threat Recognition

Determining how an attack might be detected.

Signup and view all the flashcards

Threat Resistance

Identifying resistance strategies for threats.

Signup and view all the flashcards

Asset Recovery

Determining how to recover if a cyberattack succeeds.

Signup and view all the flashcards

Asset Reinstatement

Bringing the system back to normal operation.

Signup and view all the flashcards

Sociotechnical Resilience

Considers the broader picture to prevent system failure.

Signup and view all the flashcards

Sociotechnical System Failure

Trapping S1 system failure with ST1 operator actions.

Signup and view all the flashcards

Characteristics of Resilient Organizations

Monitoring, responding, anticipating and learning.

Signup and view all the flashcards

Ability to Respond

Adapting processes in response to risks.

Signup and view all the flashcards

Ability to Monitor

Monitoring internal and external operations for threats.

Signup and view all the flashcards

Ability to Anticipate

Anticipating how possible events affect operations and resilience.

Signup and view all the flashcards

Ability to Learn

Improving from experience, especially with cyberattacks.

Signup and view all the flashcards

Human Error

The idea that people sometimes inevitably make mistakes that lead to system failure.

Signup and view all the flashcards

The Person Approach

Errors are the responsibility of the individual.

Signup and view all the flashcards

The Systems Approach

People make mistakes because of certain flaws in training or system design.

Signup and view all the flashcards

Systems Engineer Assumptions

Human errors will occur during system operation

Signup and view all the flashcards

Defensive Layer Strategy

Use redundancy and diversity to create defense layers.

Signup and view all the flashcards

Swiss Cheese Model

Layers of holes that fail when lined up, resulting in vulnerabilities.

Signup and view all the flashcards

Maximize System Resilence

Minimize latent conditions

Signup and view all the flashcards

Operational Processes

Processes used to achieve the primary purpose of system operation.

Signup and view all the flashcards

Operations Design

Balance between efficient operations and problem management.

Signup and view all the flashcards

Inefficient Practices

Maintenance of redundant information makes it easier when things go wrong.

Signup and view all the flashcards

Automated Management system flaws

Automated management systems may go wrong and take incorrect actions.

Signup and view all the flashcards

Resilient System Designs

Identify critical services and assets

Signup and view all the flashcards

System Goals

Defind system goal review with requirements and architecture.

Signup and view all the flashcards

Services Identification

Goal to maintain services and required components.

Signup and view all the flashcards

More important than general requirements.

Business Requirements

Signup and view all the flashcards

Resiliance Engineering

Identify business resiliance requirements.

Signup and view all the flashcards

Crucial services

Services that are most important for a bussnuess.

Signup and view all the flashcards

Study Notes

Resilience

  • System resilience gauges how well a system maintains critical service continuity when disruptive events occur.
  • Disruptive events include equipment failure and cyberattacks.
  • Resilience handles system failures and other disruptive events, with cyberattacks by malicious actors posing the most serious threat to networked systems.

Essential Resilience Ideas

  • Some system services are critical, and their failure can lead to severe human, social, or economic consequences
  • Some events are disruptive and can impact the ability of a system to deliver its critical services.
  • Resilience is based on expert judgment, without resilience metrics or quantifiable measures.
  • Experts assess resilience through examination of the system and its operational processes.

Resilience Engineering Assumptions

  • Resilience Engineering acknowledges that avoiding system failures is impossible.
  • The focus is on limiting the costs of failures and recovering from them.
  • Good reliability engineering practices are used to minimize technical faults.
  • Emphasis is placed on limiting failures from external events like operator errors or cyberattacks.

Resilience Activities

  • Recognition involves the system or its operators identifying early signs of system failure.
  • Resistance involves implementing strategies to reduce the failure probability when problems or cyberattacks are detected early.
  • Recovery ensures the quick restoration of critical system services when a failure occurs.
  • Reinstatement involves restoring all system services, allowing normal system operation to continue.

Resistance Strategies

  • Isolation of critical system parts to prevent impact from problems elsewhere is important.
  • Proactive resistance includes defenses to trap problems.
  • Reactive resistance involves actions taken upon problem discovery.

Cybersecurity

  • Cybercrime is the unlawful utilization of networked systems, posing a significant societal challenge.
  • Cybersecurity is broader than system security engineering.
  • Cybersecurity is a sociotechnical issue that protects citizens, businesses, and critical infrastructure from threats arising from computer and internet use.
  • Cybersecurity is concerned with protecting all IT assets, from networks to application systems.

Factors Contributing to Cybersecurity Failure

  • Organizational ignorance of problem severity.
  • Poor security procedure design and lax application.
  • Human carelessness.
  • Inappropriate trade-offs between usability and security.

Cybersecurity Threats

  • Threats to confidentiality involve unauthorized data access without damage.
  • Threats to integrity involve system or data damage through cyberattacks.
  • Threats to availability aim to prevent authorized users from accessing assets.

Examples of Security Controls

  • Authentication requires users to prove their authorization.
  • Encryption algorithmically scrambles data to prevent unauthorized access.
  • Firewalls examine network packets and accepts or rejects them based on organizational rules.
  • Firewalls ensure only trusted traffic passes from the internet to the local network

Redundancy and Diversity

  • Data and software copies should be maintained on separate computer systems to support cyberattack recovery.
  • Multi-stage diverse authentication protects against password attacks and serves as a resistance measure.
  • Critical servers may be over-provisioned to handle expected load. This allows for resistance without service degradation.

Cyber-Resilience Planning Steps

  • Asset classification involves classifying hardware, software, and human assets based on their importance to normal operations.
  • Threat identification involves identifying and classifying threats to each asset.
  • Threat recognition involves identifying how each threat might be recognized.
  • Threat resistance involves identifying potential resistance strategies for each threat.
  • Asset recovery involves determining the recovery process for each critical asset after a successful cyberattack.
  • Asset reinstatement involves defining procedures to restore the system to normal operation.

Sociotechnical Resilience

  • Resilience Engineering addresses external events leading to system failure.
  • Resilient system design considers sociotechnical systems, rather than only software.
  • Addressing adverse events is easier and more effective within a broader sociotechnical system.

Mentcare Example

  • Cyberattacks may aim to steal legitimate user credentials.
  • Technical solutions include complex authentication, which can irritate users and reduce security if they avoid logging out.
  • A better strategy involves organizational policies emphasizing strong passwords and discouraging credential sharing.

Failure Hierarchy

  • Operator actions in a broader sociotechnical system (ST1) may trap failures in system S1.
  • Organizational damage is therefore limited.
  • Managers in the broader organization respond to failures in ST1 caused by failures in S1.

Organizational Resilience Characteristics

  • Characteristics include responsiveness, monitoring, anticipation, and learning.
  • Organizations must adapt processes and procedures to both anticipated risks and detected threats.
  • Internal operations and the external environment should be monitored for threats.
  • Resilient organizations anticipate future events and changes.
  • Organizational resilience improves by learning from experience.
  • Learning from successful responses such as resisting cyberattacks is particularly important.

Human Error

  • People inevitably make mistakes that can lead to serious system failures.
  • The person approach attributes errors to individual carelessness or reckless behavior.
  • The systems approach recognizes that people are fallible and make mistakes due to workload, training, or system design.

Systems Approach Regarding Human Error

  • Systems engineers should assume human errors will occur during system operation.
  • System designers should consider defences and barriers to human error.
  • Barriers can involve either technical components or processes, procedures, and guidelines.

Defensive Layers

  • Redundancy and diversity should be used to create a set of defensive layers.
  • Each layer uses a different approach to deter attackers or trap technical/human failures.
  • Air Traffic Control (ATC) system examples include conflict alert systems, formalized recording procedures, and collaborative checking.

Swiss Cheese Model

  • Defensive layers have vulnerabilities
  • The ‘holes’ are not always in the same place and the size of the holes may vary depending on the operating conditions.
  • System failures occur when all defenses fail because the holes in the layers align.

Increasing System Resilience

  • Reduce the probability of an external event that might trigger system failures.
  • Increase the number of defensive layers
  • The more layers that you have in a system, the less likely it is that the holes will line up and a system failure occur.
  • Design a system so that diverse types of barriers are included
  • By including diverse types of barriers, the 'holes' will probably be in different places and so there is less chance of the holes lining up and failing to trap an error.
  • Minimize the number of latent conditions in a system
  • Reducing the number and size of system 'holes' will minimize latent conditions.

Operational And Management Processes

  • All software systems have associated operational processes that reflect the assumptions of the designers about how these systems will be used.
  • For example, in an imaging system in a hospital, the operator may have the responsibility of checking the quality of the images immediately after these have been processed.
  • This allows the imaging procedure to be repeated if there is a problem.

Operational Processes

  • Operational processes are involved in using the system for its defined purpose.
  • These processes must be defined and documented during system development for new systems.
  • Operators require training, and other work processes may need adaptation for effective new system use.

Personal And Enterprise IT Processes

  • Designers for personal systems may describe expected system use, but have no control over user behavior.
  • Enterprise IT systems may provide user training to teach users how to use the system.
  • While user behaviour cannot be controlled, it is reasonable to expect that users will normally follow the defined process.

Process Design

  • Operational and management processes are vital defence mechanisms that must balance efficient operation and problem management.
  • Process improvement focuses on identifying and codifying good practice and developing software to support this.
  • A focus on efficiency during process improvement can make dealing with problems more difficult.

Efficiency And Resilience

  • Efficient process operation include process optimization and control, information hiding and security and role specialization.
  • Problem management requires process flexibility and adaptability, information sharing and visibility and manual processes with spare operator/manager capacity.

Coping With Failures

  • Retaining redundant information or sharing information helps handle problems effectively.
  • Operators and system managers often recover from issues, even if it requires breaking rules or working around the defined process.
  • Operational processes should be therefore designed to enhance both flexibility and adaptability.

Information Provision And Management

  • Presenting operators with necessary information when needed can increase efficiency.
  • Operators may struggle to detect issues not directly affecting immediate tasks if shown only what the process designer considers necessary.
  • Lack of a broad system overview complicates strategy formulation for dealing with problems.

Process Automation

  • Process automation can affect system resilience both positively and negatively.
  • Automated systems can efficiently detect problems, invoke cyberattack resistance, and initiate recovery.
  • Fewer personnel may be available to handle problems if the automated system can't handle it, and system automation may worsen system damage.

Disadvantages Of Process Automation

  • Automated management systems may take unexpected actions making problems worse and that cannot be understood by the system managers.
  • Collaborative problem solving may be slowed due to fewer available managers needed to figure out a recovery strategy.

Resilient Systems Design

  • Critical services and assets are those elements of the system that allow a system to fulfill its primary purpose.
  • For example, the critical services in a system that handles ambulance dispatch are those concerned with taking calls and dispatching ambulances.
  • System components should be designed to have problem recognition, resistance, recovery and reinstatement.
  • For example, in an ambulance dispatch system, a watchdog timer may be included to detect if the system is not responding to events.

Survivable Systems Analysis

  • System understanding involves reviewing goals, requirements, and architecture.
  • Critical service identification involves pinpointing what must be maintained and the components required.
  • Attack simulation involves finding scenarios and use-cases for attacks along with system components that would be affected.
  • Survivability analysis involves identifying essential and compromisable components and finding survivability strategies based on resistance, recognition and recovery.

Problems For Business Systems

  • The starting point for survivability analysis is requirements and architecture documentation.
  • It is not explicitly related to the business requirements for resilience.
  • It assumes that there is a detailed requirements statement for a system.

Streams Of Work In Resilience Engineering

  • First identify business resilience requirements.
  • Next, plan how to bring systems back to their normal operating state.
  • Then, identify system failures and cyberattacks that could compromise a system.
  • Next, plan how to recover critical services quickly after damage from a cyberattack.
  • Finally, test all aspects of resilience planning.

Maintaining Critical Service Availability

  • System services most critical for a business
  • The minimal quality of service that must be maintained
  • How these services might be compromised
  • How these services can be protected
  • How one can recover quickly if the services become unavailable
  • Assets may be hardware, software, data or people

Mentcare System Resilience

  • Mentcare assists clinicians treating patients with mental health issues.
  • It offers patient data and consultation records from doctors and nurses.
  • It includes alerts for patients at risk of harm or suicidal tendencies.
  • It’s based on a client-server architecture.

Critical Mentcare Services

  • Information service about a patient's current diagnosis and treatment.
  • A warning service that highlights patients that could pose a danger to others or to themselves.
  • Complete patient record availability is NOT a critical service, because routine information is not normally required during consultations.

Assets Required for Normal Mentcare Service Operation

  • The patient record database with all patient information.
  • A database server providing database access for local clients.
  • A network that allows for client/server communication.
  • Local laptop or desktop computers used to access patient information.
  • A rule set to identify if patients are dangerous, highlighting dangerous patients to system users.

Adverse Events Affecting Mentcare System

  • The database server may be unavailable due to failure, a network issue, or a cyberattack.
  • Patient records or rules that define at risk designations may be corrupted accidentally, or deliberately.
  • Client computers may be infected with malware.
  • Unauthorized individuals may access client computers gaining access to patient records.

Recognition And Resistance Strategies For Mentcare

Event Recognition Resistance
Server Unavailability Client watchdog timer alerts to client access failure.Text messages from system manager to clinician System architecture maintains copies of critical info.Peer-to-peer search across clients.Staff provided with smartphones that can access network if server fails. Provide back up server
Patient database corruption Record level cryptographic checksums. Regular autochecking of database integrity. Reporting system for incorrect information Replayable transaction log to update database backup with recent transactions. Maintenance of local copies of patient information and software to restore database from local copies and backups
Malware infection of client computer Reporting system where computer users can report unusual activity.Automated malware checks on start up Security awareness workshops for system users.USB port prevention on client computers.Automated system set up for new clients.Installation of security software
Unauthorized access to patient information Warning text messages from users about possible intruders. Log analysis for unusual activity Multi level system Authentication process.Security awareness workshops for system users.USB port prevention on client computers.Access logging and real-time log analysis

Architecture For Resilience

  • Client computers locally store summary patient records, exchanging information via network or ad hoc connections for database unavailability, doctors and nurses can access essential patient information.
  • A backups store makes server snapshots to act as the server if the main one fails.
  • Database integrity checking and recovery software checks for database corruption, initiating automatic recovery with a transaction log updating backups.

Critical Service Maintenance

  • Clients downloading data enables consultations during server access issues, only data that needs to be downloaded will be downloaded.
  • Harmful actions by others may be implemented if patient records are identified before download, software can highlight the patient to suggest special care.

Risks To Confidentiality

  • To minimize risks of lost data on laptops, only load patient data who are scheduled at the clinic.
  • To ensure confidentiality, the system encrypts a local drive so that hackers cannot access data.
  • To ensure limited data, the system deleted data from a clinic session as limited records of deletion will enable less hacker entry.
  • To enable secure entry, transactions are encrypted so that unauthorized attacks cannot gain entry to information during traffic.

Key points

  • System design requires defensive layers with a variety of tools to trap potential human and technical failures.
  • To cope with problems, system providers should design a system with processes that are flexible and adaptable.
  • Designers should always design a system that can be recoverable, recognizable and able to implement reinstatement.
  • Cyber attacks tend to involve either an insider/outsider attack to gain entry for a system.
  • System designers should implement a multi layer defensive system to trap potential cyber attacks from entry.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Resilience and System Reliability Quiz
40 questions
Chapter 3: Food System Resilience
10 questions
System Resilience and Performance
5 questions

System Resilience and Performance

FavoriteRationality8811 avatar
FavoriteRationality8811
Use Quizgecko on...
Browser
Browser