Page 9 - ISCI’2017
P. 9

terms associated with the top ten publicly traded health care firms in the country. They

                       discovered numerous sensitive documents – for example, a spreadsheet from an  AIDS
                       clinic with 232 client names, including Social Security numbers, addresses and birthdates.

                       The  researchers  also  found  a  1,718-page document from a  medical testing  laboratory
                       containing patient Social Security numbers, insurance information, and treatment codes

                       for thousands of patients. Moreover,  in another place relating to a group  of
                       anesthesiologists, more than 350 megabytes of data comprising sensitive patient reports

                       were found.

                   5.  October, 2011, Stanford Hospital (Palo Alto, California), officials  confirmed that for
                       almost a year, private medical data for nearly 20,000 emergency room patients were

                       exposed because a billing contractor’s marketing agent sent the electronic spreadsheet to
                       a job prospect as part of a skills test.

                   The most promising aspects pertaining to economic (financial, bank, medical, etc.) security
            and its threats, functioning of the Organization Security System, the principles of Information and

            Analytical Support (IAS), the  OSS  formation  and  functioning of  its structural components,

            development and management, have been investigated by many researchers:          I. Ansoff (1989),
            O. Bandurka (2003), V. Heiets (2006), N. Reverchuk (2004), H. Kozachenko, O. Liashenko (2003),

            V. Ponomarenko (2008), O. Kirichenko (2008). T. Klebanova (2000), M. Kurkin (2004), the well-

            known experts, dealt with IAS development and its implementation for any organizations.
                   Existing technologies and  mechanisms of  OSS  are sometimes contradictory,  inefficient,  and

            sometimes  have a lot  of discrepancy that causes slowdown or even  the impossibility of creating  a
            generalized theoretical basis of information and analytical support (IAS) of OSS. One should also admit

            that the question of information and analytical support of organization security system synthesis is not
            properly investigated,  either from the practical  or theoretical  point of  view.  Moreover,  there is no

            systematic generalization of the latter. Therefore, IAS of OSS development and its further implementation

            could be a basic factor in determining the market cost (value) of organizations (for example, banks,
            hospitals, companies, etc.) when enhancing their competitiveness to a high standard.

                   In the course of their commercial activities, various organizations are subject to economic
            crime, negligence of employees, which  leads them to  financial, physical, temporal, economic,

            medical, and other kinds of the losses. Such activities of the staff are called insider ones. Computer
            Security Institute was considering the problem of insider’s detection in the report in 2007 (Kavun and

            Brumnik, 2013). Since year 2011 (Kavun, 2014), this problem has been stated considered as the most

            important problem in the world of Internet among all threats and vulnerabilities. Thus, the problem
            of insider’s detection and defense against it, by its importance, has exceeded the problem of virus

            vulnerability. Especially susceptible to insider attacks are the organizations related to the finances,
                                                                                                            9
   4   5   6   7   8   9   10   11   12   13   14