SlideShare a Scribd company logo
P-007
TESTING SECURITY OF THE BLOOD MANAGEMENT SYSTEM, THROUGH THE USAGE OF NON FUNCTIONAL TESTING, IN THE
NATIONAL BLOOD TRANSFUSION CENTRE (NBTC), CAIRO, EGYPT
S Abdullah1
, A Ahmed2
, M Labib2
, A Ibrahim1
, M Shokri2
and A Abady2
1 2
NBTC, Cairo, Egypt National Blood Transfusion Center, Cairo, Egypt
Background: The Blood Management System(BMS) is a project which will automate manual operations in 17 sites ofthe Egyptian National Blood Transfusion Services (ENBTS).
Protecting data is a vital issue to guarantee business continuity.
Security is an essential requirement that is fulfilled by having the suitable hardwareand network architecture. Security fun ctions are granted to each user according to the degree of
their involvement in the blood transfusion system. These user privileges limit the transfer and sharing ofdata, and other functionalities amongst users in real time.
Non Functional Security Testing is a method used to measure whether theBMS application and its infrastructure is secure or not.
Aims: To examine how Non Functional Security Testing can be used as a tool to measure how far the BMS software, hardware and network are secured.
Methods: The IT teamat ENBTS arranged a series ofmeetings to study the BMS security requirements, namely ‘Test Basis’ (the network, hardware and application design) in
detail. In order to extract any points ofweakness in thedesign and provide useful feedback.
A database ofNon Functional Security Test cases was generated by using the check list testing technique, which is a techniquethat creates a catalog ofrequirements that need tobe
tracked within the BMS, concerning security.
The generated test cases were classified by site (‘headquarters only’ or ‘all sites’) and by severity, and their impact on the flow ofwork. The outcome fromthese test cases is
embedded into the execution plan database.
The execution plan database, challenges the various security steps, detects and also categorizes defects according to severity. These findings are then relayed and solutions are
found, taking security requirements into consideration.
Finally the execution plan in all its revised stages will be run, to achieveuser acceptance with regards security ofthe BMS.
Results: The ENBTS IT teamcreated a repository ofabout 100 test cases extracted fromthe security requirements, which highlighted several points: The
importance offirewall and optimal antivirus softwareinstallment.
Security lists should be applied on switches.
To protect data, it was found that full identification ofeach user must be monitored during login; our systemis expected to dictate password changes at a pre-determined period (30
days).
Locking ofthe session ifusers don0
t use the systemwithin a set period oftime, to protect confidentiality.
Control ofaccess authorization to: read, update, create and delete data; according to the user’s personal functionality definition. Especially concerning data defined by the blood
center’s management as sensitive.
Conclusion: Non functional security testing insures theintegrity, and safety ofany system, especially one as the BMS. It predicts problems, protects businesses fromdata theft and
saves money. Such considerations are crucial in low income settings and an institution as sensitive as a blood transfusion centre.
Achieving strong security is mandatory to achieve confidentiality, build trust, and strengthen the donor and patient relationship with the ENBTS.
Journal of Vox Sanguinis, volume 109 supplement 2
ISSN: 0042-9007

More Related Content

What's hot

Achieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security AutomationAchieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security Automation
Tripwire
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
jayussuryawan
 
Medical Device Cybersecurity : A Regulatory Perspective
Medical Device Cybersecurity : A Regulatory PerspectiveMedical Device Cybersecurity : A Regulatory Perspective
Medical Device Cybersecurity : A Regulatory Perspective
Jon Lendrum
 
Security and Control Issues in information Systems
Security and Control Issues in information SystemsSecurity and Control Issues in information Systems
Security and Control Issues in information Systems
Dr. Rosemarie Sibbaluca-Guirre
 
Critical Controls Of Cyber Defense
Critical Controls Of Cyber DefenseCritical Controls Of Cyber Defense
Critical Controls Of Cyber Defense
Rishu Mehra
 
Continuous Monitoring: Getting Past Complexity & Reducing Risk
Continuous Monitoring: Getting Past Complexity & Reducing RiskContinuous Monitoring: Getting Past Complexity & Reducing Risk
Continuous Monitoring: Getting Past Complexity & Reducing Risk
Tripwire
 
Auditing information System
Auditing information SystemAuditing information System
Auditing information System
Dr. Rosemarie Sibbaluca-Guirre
 
Chapter006
Chapter006Chapter006
Chapter006
Jeanie Delos Arcos
 
IT General Controls
IT General ControlsIT General Controls
IT General Controls
Cicero Ray Rufino
 
CSEC630_TeamAssignment_TeamBlazer_FINAL
CSEC630_TeamAssignment_TeamBlazer_FINALCSEC630_TeamAssignment_TeamBlazer_FINAL
CSEC630_TeamAssignment_TeamBlazer_FINAL
Ronald Jackson, Jr
 
Distributed system for access control to physical resources based on qualific...
Distributed system for access control to physical resources based on qualific...Distributed system for access control to physical resources based on qualific...
Distributed system for access control to physical resources based on qualific...
Darshan Vithani
 
General and Application Control - Security and Control Issues in Informatio...
General and Application Control - Security  and Control Issues in  Informatio...General and Application Control - Security  and Control Issues in  Informatio...
General and Application Control - Security and Control Issues in Informatio...
Dr. Rosemarie Sibbaluca-Guirre
 
Chapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systemsChapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systems
jayussuryawan
 
Protection
ProtectionProtection
Protection
Bellal Hossain
 
Understanding the Experian independent third party assessment (EI3PA ) requir...
Understanding the Experian independent third party assessment (EI3PA ) requir...Understanding the Experian independent third party assessment (EI3PA ) requir...
Understanding the Experian independent third party assessment (EI3PA ) requir...
Redspin, Inc.
 
bankauditinITEnv
bankauditinITEnvbankauditinITEnv
bankauditinITEnv
Dr Vijay Pithadia Director
 
Functions and features network management
Functions and features network managementFunctions and features network management
Functions and features network management
Flightcase1
 
Application and Systems Development
Application and Systems DevelopmentApplication and Systems Development
Application and Systems Development
amiable_indian
 
Blue Eye
Blue EyeBlue Eye

What's hot (19)

Achieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security AutomationAchieving Continuous Monitoring with Security Automation
Achieving Continuous Monitoring with Security Automation
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
 
Medical Device Cybersecurity : A Regulatory Perspective
Medical Device Cybersecurity : A Regulatory PerspectiveMedical Device Cybersecurity : A Regulatory Perspective
Medical Device Cybersecurity : A Regulatory Perspective
 
Security and Control Issues in information Systems
Security and Control Issues in information SystemsSecurity and Control Issues in information Systems
Security and Control Issues in information Systems
 
Critical Controls Of Cyber Defense
Critical Controls Of Cyber DefenseCritical Controls Of Cyber Defense
Critical Controls Of Cyber Defense
 
Continuous Monitoring: Getting Past Complexity & Reducing Risk
Continuous Monitoring: Getting Past Complexity & Reducing RiskContinuous Monitoring: Getting Past Complexity & Reducing Risk
Continuous Monitoring: Getting Past Complexity & Reducing Risk
 
Auditing information System
Auditing information SystemAuditing information System
Auditing information System
 
Chapter006
Chapter006Chapter006
Chapter006
 
IT General Controls
IT General ControlsIT General Controls
IT General Controls
 
CSEC630_TeamAssignment_TeamBlazer_FINAL
CSEC630_TeamAssignment_TeamBlazer_FINALCSEC630_TeamAssignment_TeamBlazer_FINAL
CSEC630_TeamAssignment_TeamBlazer_FINAL
 
Distributed system for access control to physical resources based on qualific...
Distributed system for access control to physical resources based on qualific...Distributed system for access control to physical resources based on qualific...
Distributed system for access control to physical resources based on qualific...
 
General and Application Control - Security and Control Issues in Informatio...
General and Application Control - Security  and Control Issues in  Informatio...General and Application Control - Security  and Control Issues in  Informatio...
General and Application Control - Security and Control Issues in Informatio...
 
Chapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systemsChapter 4 security part ii auditing database systems
Chapter 4 security part ii auditing database systems
 
Protection
ProtectionProtection
Protection
 
Understanding the Experian independent third party assessment (EI3PA ) requir...
Understanding the Experian independent third party assessment (EI3PA ) requir...Understanding the Experian independent third party assessment (EI3PA ) requir...
Understanding the Experian independent third party assessment (EI3PA ) requir...
 
bankauditinITEnv
bankauditinITEnvbankauditinITEnv
bankauditinITEnv
 
Functions and features network management
Functions and features network managementFunctions and features network management
Functions and features network management
 
Application and Systems Development
Application and Systems DevelopmentApplication and Systems Development
Application and Systems Development
 
Blue Eye
Blue EyeBlue Eye
Blue Eye
 

Viewers also liked

Vocabulary- One Word Substitutes
Vocabulary- One Word SubstitutesVocabulary- One Word Substitutes
Vocabulary- One Word Substitutes
saraswathi tenneti
 
Semantics for Integrated Analytical Laboratory Processes – the Allotrope Pers...
Semantics for Integrated Analytical Laboratory Processes – the Allotrope Pers...Semantics for Integrated Analytical Laboratory Processes – the Allotrope Pers...
Semantics for Integrated Analytical Laboratory Processes – the Allotrope Pers...
OSTHUS
 
Recommandation cyril fahy_052015
Recommandation cyril fahy_052015Recommandation cyril fahy_052015
Recommandation cyril fahy_052015BEPILA
 
Introduction to React
Introduction to ReactIntroduction to React
Introduction to React
Sebastian Pederiva
 
Omar Tarek CV
Omar  Tarek CVOmar  Tarek CV
Omar Tarek CV
omar tarek
 
It101 a quincywanzala_myfav
It101 a quincywanzala_myfavIt101 a quincywanzala_myfav
It101 a quincywanzala_myfav
cephas1992
 
How to use Yasmin to Avoid Unwanted Pregnancy
How to use Yasmin to Avoid Unwanted PregnancyHow to use Yasmin to Avoid Unwanted Pregnancy
How to use Yasmin to Avoid Unwanted Pregnancy
Parveen Wadhwa
 
2012-108
2012-1082012-108
La cadena hortifrutícola del meta en el 2014 y proyeccion para el año 2015
La cadena hortifrutícola del meta en el 2014  y proyeccion para el año 2015La cadena hortifrutícola del meta en el 2014  y proyeccion para el año 2015
La cadena hortifrutícola del meta en el 2014 y proyeccion para el año 2015
Emilio Garcia Gutierrez
 
Introduction to React JS for beginners
Introduction to React JS for beginners Introduction to React JS for beginners
Introduction to React JS for beginners
Varun Raj
 
Justin Segler Resume
Justin Segler ResumeJustin Segler Resume
Justin Segler Resume
Justin Segler
 
Tabla resúmen fármacos
Tabla resúmen fármacos Tabla resúmen fármacos
Tabla resúmen fármacos
Medsafe Capacitaciones
 
JIT
JITJIT

Viewers also liked (13)

Vocabulary- One Word Substitutes
Vocabulary- One Word SubstitutesVocabulary- One Word Substitutes
Vocabulary- One Word Substitutes
 
Semantics for Integrated Analytical Laboratory Processes – the Allotrope Pers...
Semantics for Integrated Analytical Laboratory Processes – the Allotrope Pers...Semantics for Integrated Analytical Laboratory Processes – the Allotrope Pers...
Semantics for Integrated Analytical Laboratory Processes – the Allotrope Pers...
 
Recommandation cyril fahy_052015
Recommandation cyril fahy_052015Recommandation cyril fahy_052015
Recommandation cyril fahy_052015
 
Introduction to React
Introduction to ReactIntroduction to React
Introduction to React
 
Omar Tarek CV
Omar  Tarek CVOmar  Tarek CV
Omar Tarek CV
 
It101 a quincywanzala_myfav
It101 a quincywanzala_myfavIt101 a quincywanzala_myfav
It101 a quincywanzala_myfav
 
How to use Yasmin to Avoid Unwanted Pregnancy
How to use Yasmin to Avoid Unwanted PregnancyHow to use Yasmin to Avoid Unwanted Pregnancy
How to use Yasmin to Avoid Unwanted Pregnancy
 
2012-108
2012-1082012-108
2012-108
 
La cadena hortifrutícola del meta en el 2014 y proyeccion para el año 2015
La cadena hortifrutícola del meta en el 2014  y proyeccion para el año 2015La cadena hortifrutícola del meta en el 2014  y proyeccion para el año 2015
La cadena hortifrutícola del meta en el 2014 y proyeccion para el año 2015
 
Introduction to React JS for beginners
Introduction to React JS for beginners Introduction to React JS for beginners
Introduction to React JS for beginners
 
Justin Segler Resume
Justin Segler ResumeJustin Segler Resume
Justin Segler Resume
 
Tabla resúmen fármacos
Tabla resúmen fármacos Tabla resúmen fármacos
Tabla resúmen fármacos
 
JIT
JITJIT
JIT
 

Similar to Poster

How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
Schneider Electric
 
Ijricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individuality
Ijripublishers Ijri
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
Nirmal Thaliyil
 
In what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxIn what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docx
jaggernaoma
 
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical SystemsUpsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
IRJET Journal
 
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural AnalyticsIRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET Journal
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET Journal
 
Integrated Control and Safety - Assessing the Benefits; Weighing the Risks
Integrated Control and Safety - Assessing the Benefits; Weighing the RisksIntegrated Control and Safety - Assessing the Benefits; Weighing the Risks
Integrated Control and Safety - Assessing the Benefits; Weighing the Risks
Schneider Electric
 
Authentication and Authorization for User Roles and Device for Attack Detecti...
Authentication and Authorization for User Roles and Device for Attack Detecti...Authentication and Authorization for User Roles and Device for Attack Detecti...
Authentication and Authorization for User Roles and Device for Attack Detecti...
IRJET Journal
 
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File SystemDynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
Radita Apriana
 
Dashboard of intelligent transportation system (ITS) using mobile agents stra...
Dashboard of intelligent transportation system (ITS) using mobile agents stra...Dashboard of intelligent transportation system (ITS) using mobile agents stra...
Dashboard of intelligent transportation system (ITS) using mobile agents stra...
IJECEIAES
 
A Dashboard of ITS - Tableau de bord du STI
A Dashboard of ITS - Tableau de bord du STIA Dashboard of ITS - Tableau de bord du STI
A Dashboard of ITS - Tableau de bord du STI
n allali
 
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
IRJET Journal
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
YogeshIJTSRD
 
A method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesA method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devices
Raja Ram
 
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
IJNSA Journal
 
CISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICSCISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICS
Muhammad FAHAD
 
Seven recommendations for bolstering industrial control system cyber security
Seven recommendations for bolstering industrial control system cyber securitySeven recommendations for bolstering industrial control system cyber security
Seven recommendations for bolstering industrial control system cyber security
CTi Controltech
 
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control SystemsNCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
Miller Energy, Inc.
 
Defending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackDefending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From Cyberattack
CTi Controltech
 

Similar to Poster (20)

How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
 
Ijricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individuality
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
In what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docxIn what ways do you think the Elaboration Likelihood Model applies.docx
In what ways do you think the Elaboration Likelihood Model applies.docx
 
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical SystemsUpsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
 
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural AnalyticsIRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural Analytics
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
 
Integrated Control and Safety - Assessing the Benefits; Weighing the Risks
Integrated Control and Safety - Assessing the Benefits; Weighing the RisksIntegrated Control and Safety - Assessing the Benefits; Weighing the Risks
Integrated Control and Safety - Assessing the Benefits; Weighing the Risks
 
Authentication and Authorization for User Roles and Device for Attack Detecti...
Authentication and Authorization for User Roles and Device for Attack Detecti...Authentication and Authorization for User Roles and Device for Attack Detecti...
Authentication and Authorization for User Roles and Device for Attack Detecti...
 
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File SystemDynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
Dynamic RWX ACM Model Optimizing the Risk on Real Time Unix File System
 
Dashboard of intelligent transportation system (ITS) using mobile agents stra...
Dashboard of intelligent transportation system (ITS) using mobile agents stra...Dashboard of intelligent transportation system (ITS) using mobile agents stra...
Dashboard of intelligent transportation system (ITS) using mobile agents stra...
 
A Dashboard of ITS - Tableau de bord du STI
A Dashboard of ITS - Tableau de bord du STIA Dashboard of ITS - Tableau de bord du STI
A Dashboard of ITS - Tableau de bord du STI
 
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
 
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber SecuritySystematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
 
A method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devicesA method for detecting abnormal program behavior on embedded devices
A method for detecting abnormal program behavior on embedded devices
 
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNA...
 
CISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICSCISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICS
 
Seven recommendations for bolstering industrial control system cyber security
Seven recommendations for bolstering industrial control system cyber securitySeven recommendations for bolstering industrial control system cyber security
Seven recommendations for bolstering industrial control system cyber security
 
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control SystemsNCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
 
Defending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackDefending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From Cyberattack
 

Poster

  • 1. P-007 TESTING SECURITY OF THE BLOOD MANAGEMENT SYSTEM, THROUGH THE USAGE OF NON FUNCTIONAL TESTING, IN THE NATIONAL BLOOD TRANSFUSION CENTRE (NBTC), CAIRO, EGYPT S Abdullah1 , A Ahmed2 , M Labib2 , A Ibrahim1 , M Shokri2 and A Abady2 1 2 NBTC, Cairo, Egypt National Blood Transfusion Center, Cairo, Egypt Background: The Blood Management System(BMS) is a project which will automate manual operations in 17 sites ofthe Egyptian National Blood Transfusion Services (ENBTS). Protecting data is a vital issue to guarantee business continuity. Security is an essential requirement that is fulfilled by having the suitable hardwareand network architecture. Security fun ctions are granted to each user according to the degree of their involvement in the blood transfusion system. These user privileges limit the transfer and sharing ofdata, and other functionalities amongst users in real time. Non Functional Security Testing is a method used to measure whether theBMS application and its infrastructure is secure or not. Aims: To examine how Non Functional Security Testing can be used as a tool to measure how far the BMS software, hardware and network are secured. Methods: The IT teamat ENBTS arranged a series ofmeetings to study the BMS security requirements, namely ‘Test Basis’ (the network, hardware and application design) in detail. In order to extract any points ofweakness in thedesign and provide useful feedback. A database ofNon Functional Security Test cases was generated by using the check list testing technique, which is a techniquethat creates a catalog ofrequirements that need tobe tracked within the BMS, concerning security. The generated test cases were classified by site (‘headquarters only’ or ‘all sites’) and by severity, and their impact on the flow ofwork. The outcome fromthese test cases is embedded into the execution plan database. The execution plan database, challenges the various security steps, detects and also categorizes defects according to severity. These findings are then relayed and solutions are found, taking security requirements into consideration. Finally the execution plan in all its revised stages will be run, to achieveuser acceptance with regards security ofthe BMS. Results: The ENBTS IT teamcreated a repository ofabout 100 test cases extracted fromthe security requirements, which highlighted several points: The importance offirewall and optimal antivirus softwareinstallment. Security lists should be applied on switches. To protect data, it was found that full identification ofeach user must be monitored during login; our systemis expected to dictate password changes at a pre-determined period (30 days). Locking ofthe session ifusers don0 t use the systemwithin a set period oftime, to protect confidentiality. Control ofaccess authorization to: read, update, create and delete data; according to the user’s personal functionality definition. Especially concerning data defined by the blood center’s management as sensitive. Conclusion: Non functional security testing insures theintegrity, and safety ofany system, especially one as the BMS. It predicts problems, protects businesses fromdata theft and saves money. Such considerations are crucial in low income settings and an institution as sensitive as a blood transfusion centre. Achieving strong security is mandatory to achieve confidentiality, build trust, and strengthen the donor and patient relationship with the ENBTS. Journal of Vox Sanguinis, volume 109 supplement 2 ISSN: 0042-9007