Page 9 - ISCI’2017
P. 9
terms associated with the top ten publicly traded health care firms in the country. They
discovered numerous sensitive documents – for example, a spreadsheet from an AIDS
clinic with 232 client names, including Social Security numbers, addresses and birthdates.
The researchers also found a 1,718-page document from a medical testing laboratory
containing patient Social Security numbers, insurance information, and treatment codes
for thousands of patients. Moreover, in another place relating to a group of
anesthesiologists, more than 350 megabytes of data comprising sensitive patient reports
were found.
5. October, 2011, Stanford Hospital (Palo Alto, California), officials confirmed that for
almost a year, private medical data for nearly 20,000 emergency room patients were
exposed because a billing contractor’s marketing agent sent the electronic spreadsheet to
a job prospect as part of a skills test.
The most promising aspects pertaining to economic (financial, bank, medical, etc.) security
and its threats, functioning of the Organization Security System, the principles of Information and
Analytical Support (IAS), the OSS formation and functioning of its structural components,
development and management, have been investigated by many researchers: I. Ansoff (1989),
O. Bandurka (2003), V. Heiets (2006), N. Reverchuk (2004), H. Kozachenko, O. Liashenko (2003),
V. Ponomarenko (2008), O. Kirichenko (2008). T. Klebanova (2000), M. Kurkin (2004), the well-
known experts, dealt with IAS development and its implementation for any organizations.
Existing technologies and mechanisms of OSS are sometimes contradictory, inefficient, and
sometimes have a lot of discrepancy that causes slowdown or even the impossibility of creating a
generalized theoretical basis of information and analytical support (IAS) of OSS. One should also admit
that the question of information and analytical support of organization security system synthesis is not
properly investigated, either from the practical or theoretical point of view. Moreover, there is no
systematic generalization of the latter. Therefore, IAS of OSS development and its further implementation
could be a basic factor in determining the market cost (value) of organizations (for example, banks,
hospitals, companies, etc.) when enhancing their competitiveness to a high standard.
In the course of their commercial activities, various organizations are subject to economic
crime, negligence of employees, which leads them to financial, physical, temporal, economic,
medical, and other kinds of the losses. Such activities of the staff are called insider ones. Computer
Security Institute was considering the problem of insider’s detection in the report in 2007 (Kavun and
Brumnik, 2013). Since year 2011 (Kavun, 2014), this problem has been stated considered as the most
important problem in the world of Internet among all threats and vulnerabilities. Thus, the problem
of insider’s detection and defense against it, by its importance, has exceeded the problem of virus
vulnerability. Especially susceptible to insider attacks are the organizations related to the finances,
9