Risk Assessment Report

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 51654 Experts worldwide ranked by ideXlab platform

Roumen Sedefov - One of the best experts on this subject based on the ideXlab platform.

  • technical Report on n phenyl n 1 2 phenylethyl piperidin 4 yl oxolane 2 carboxamide tetrahydrofuranylfentanyl thf f annex 1 to the Risk Assessment Report on n phenyl n 1 2 phenylethyl piperidin 4 yl oxolane 2 carboxamide tetrahydrofuranylfentanyl
    2017
    Co-Authors: S D Brandt, Ana Gallegos, S Elliott, Michael Evansbrown, Valur H Danielsson, Andres Almeida, R Jorge, R Christie, S Sola, Roumen Sedefov
    Abstract:

    In accordance with Article 6 of Council Decision 2005/387/JHA on the information exchange, Risk Assessment and control of new psychoactive substances.

  • Report on the Risk Assessment of mephedrone in the framework of the council decision on new psychoactive substances
    2011
    Co-Authors: Roumen Sedefov, Ana Gallegos
    Abstract:

    This publication presents the summary findings and the conclusions of the Risk Assessment on mephedrone, carried out by the EMCDDA’s extended Scientific Committee, with participation of additional experts from the European Commission, Europol and the EMA. The Risk Assessment Report, which was submitted to the European Commission and the Council of the European Union 26 May 2010, examines the health and social Risks of the drug, as well as information on international trafficking and the involvement of organised crime. Furthermore, the Report considers the potential implications for placing the drug under control in the EU. On the basis of this Report — and on the initiative of the European Commission — on 2 December 2010, the Council decided that mephedrone is to be subject to control measures. Table of contents: • Introduction • Physical and chemical description of mephedrone and its mechanisms of action, including its medical value • Chemical precursors that are used for the manufacture of mephedrone • Health Risks associated with mephedrone • Social Risks associated with mephedrone • Information on the level of involvement of organised crime and information on seizures and/or detections by the authorities, and the manufacture of mephedrone • Information on any Assessment of mephedrone in the United Nations system • Description of the control measures that are applicable to mephedrone in the Member States • Options for control and the possible consequences of the control measures • Conclusion • List of annexes

Yazriwati Yahya - One of the best experts on this subject based on the ideXlab platform.

  • adopting iso iec 27005 2011 based Risk treatment plan to prevent patients data theft
    International Journal on Advanced Science Engineering and Information Technology, 2020
    Co-Authors: Laura Cassandra Hamit, Haslina Md Sarkan, Nurulhuda Firdaus Mohd Azmi, Mohd Nazri Mahrin, Suriayati Chuprat, Yazriwati Yahya
    Abstract:

    The concern raised in late 2017 regarding 46.2 million mobile device subscribers’ data breach had the Malaysian police started an investigation looking for the source of the leak.  Data security is fundamental to protect the assets or information by providing its confidentiality, integrity and availability not only in the telecommunication industry but also in other sectors.  This paper attempts to protect the data of a patient-based clinical system by producing a Risk treatment plan for its software products.  The existing system is vulnerable to information theft, insecure databases, needy audit login and password management.  The information security Risk Assessment consisting of identifying Risks, analyzing and evaluating them were conducted before a Risk Assessment Report is written down.  A Risk management framework was applied to the software development unit of the organization to countermeasure these Risks.  ISO/IEC 27005:2011 standard was used as the basis for the information security Risk management framework.  The controls from Annex A of ISO/IEC 27001:2013 were used to reduce the Risks.  Thirty Risks have been identified and 7 high-level Risks for the product have been recognized.  A Risk treatment plan focusing on the Risks and controls has been developed for the system to reduce these Risks in order to secure the patients’ data.  This will eventually enhance the information security in the software development unit and at the same time, increase awareness among the team members concerning Risks and the means to handle them.

Yahya Yazriwati - One of the best experts on this subject based on the ideXlab platform.

  • Adopting ISO/IEC 27005:2011-based Risk Treatment Plan to Prevent Patients Data Theft
    International Journal on Advanced Science Engineering and Information Technology, 2020
    Co-Authors: Hamit, Laura Cassandra, Md. Sarkan Haslina, Mohd Azmi, Nurulhuda Firdaus, Mahrin, Mohd Naz’ri, Chuprat Suriayati, Yahya Yazriwati
    Abstract:

    The concern raised in late 2017 regarding 46.2 million mobile device subscribers’ data breach had the Malaysian police started an investigation looking for the source of the leak.  Data security is fundamental to protect the assets or information by providing its confidentiality, integrity and availability not only in the telecommunication industry but also in other sectors.  This paper attempts to protect the data of a patient-based clinical system by producing a Risk treatment plan for its software products.  The existing system is vulnerable to information theft, insecure databases, needy audit login and password management.  The information security Risk Assessment consisting of identifying Risks, analyzing and evaluating them were conducted before a Risk Assessment Report is written down.  A Risk management framework was applied to the software development unit of the organization to countermeasure these Risks.  ISO/IEC 27005:2011 standard was used as the basis for the information security Risk management framework.  The controls from Annex A of ISO/IEC 27001:2013 were used to reduce the Risks.  Thirty Risks have been identified and 7 high-level Risks for the product have been recognized.  A Risk treatment plan focusing on the Risks and controls has been developed for the system to reduce these Risks in order to secure the patients’ data.  This will eventually enhance the information security in the software development unit and at the same time, increase awareness among the team members concerning Risks and the means to handle them

Laura Cassandra Hamit - One of the best experts on this subject based on the ideXlab platform.

  • adopting iso iec 27005 2011 based Risk treatment plan to prevent patients data theft
    International Journal on Advanced Science Engineering and Information Technology, 2020
    Co-Authors: Laura Cassandra Hamit, Haslina Md Sarkan, Nurulhuda Firdaus Mohd Azmi, Mohd Nazri Mahrin, Suriayati Chuprat, Yazriwati Yahya
    Abstract:

    The concern raised in late 2017 regarding 46.2 million mobile device subscribers’ data breach had the Malaysian police started an investigation looking for the source of the leak.  Data security is fundamental to protect the assets or information by providing its confidentiality, integrity and availability not only in the telecommunication industry but also in other sectors.  This paper attempts to protect the data of a patient-based clinical system by producing a Risk treatment plan for its software products.  The existing system is vulnerable to information theft, insecure databases, needy audit login and password management.  The information security Risk Assessment consisting of identifying Risks, analyzing and evaluating them were conducted before a Risk Assessment Report is written down.  A Risk management framework was applied to the software development unit of the organization to countermeasure these Risks.  ISO/IEC 27005:2011 standard was used as the basis for the information security Risk management framework.  The controls from Annex A of ISO/IEC 27001:2013 were used to reduce the Risks.  Thirty Risks have been identified and 7 high-level Risks for the product have been recognized.  A Risk treatment plan focusing on the Risks and controls has been developed for the system to reduce these Risks in order to secure the patients’ data.  This will eventually enhance the information security in the software development unit and at the same time, increase awareness among the team members concerning Risks and the means to handle them.

Hamit, Laura Cassandra - One of the best experts on this subject based on the ideXlab platform.

  • Adopting ISO/IEC 27005:2011-based Risk Treatment Plan to Prevent Patients Data Theft
    International Journal on Advanced Science Engineering and Information Technology, 2020
    Co-Authors: Hamit, Laura Cassandra, Md. Sarkan Haslina, Mohd Azmi, Nurulhuda Firdaus, Mahrin, Mohd Naz’ri, Chuprat Suriayati, Yahya Yazriwati
    Abstract:

    The concern raised in late 2017 regarding 46.2 million mobile device subscribers’ data breach had the Malaysian police started an investigation looking for the source of the leak.  Data security is fundamental to protect the assets or information by providing its confidentiality, integrity and availability not only in the telecommunication industry but also in other sectors.  This paper attempts to protect the data of a patient-based clinical system by producing a Risk treatment plan for its software products.  The existing system is vulnerable to information theft, insecure databases, needy audit login and password management.  The information security Risk Assessment consisting of identifying Risks, analyzing and evaluating them were conducted before a Risk Assessment Report is written down.  A Risk management framework was applied to the software development unit of the organization to countermeasure these Risks.  ISO/IEC 27005:2011 standard was used as the basis for the information security Risk management framework.  The controls from Annex A of ISO/IEC 27001:2013 were used to reduce the Risks.  Thirty Risks have been identified and 7 high-level Risks for the product have been recognized.  A Risk treatment plan focusing on the Risks and controls has been developed for the system to reduce these Risks in order to secure the patients’ data.  This will eventually enhance the information security in the software development unit and at the same time, increase awareness among the team members concerning Risks and the means to handle them