You are on page 1of 6

Running head: Evaluating Risk Handling Strategies

Evaluating Risk Handling Strategies

1
Running head: Evaluating Risk Handling Strategies

Case Brief

This report discusses the risk handling strategies for a hospital in Las Vegas

which is facing the problem of huge power supply cut. As the information system of

the hospital that also holds the detail of the patient medical record is available

digitally, the power cut obviously creates several problems in respect to working of

medical appliances and access of patient record both. The consequences of a power

outage in a hospital, urgent care centre, or other medical facility may be deadly.

Medical facilities may also be severely harmed if they lose their HVAC, water

pressure, sterilising technology, or refrigeration capabilities. HVAC systems that

depend on power for heating, cooling, and ventilation will be unavailable. Patients in

intensive care, neonatal units, or cardiac units who rely on life-saving equipment are

at risk. High-risk surgical operations may be harmed by a lack of illumination, and

rooms without backup lighting are in danger of becoming completely dark (Jing et al.,

2014)

Risk Handling Strategies

Risk Handling Description

Strategy

2
Running head: Evaluating Risk Handling Strategies

Avoidance In order to lessen their exposure to risk, some companies

choose not to engage in high-risk operations. Even though it is

difficult to remove all risks, a risk avoidance plan may assist in

preventing certain losses from occurring. An organization's

assets might be adversely impacted by the reduction of

dangers, activities, and exposures. There are two types of risk

management: one that strives to minimise harm and financial

losses, and the other that aims to eliminate all risk (Gunduz &

Das, 2020). Create a product or method that eliminates the

components that might lead to an undesirable risk. Due to

unacceptable wear on a less robust material, a design

adjustment to a more robust material prevents undesirable

failures. Implementing a back-up system and allowing access to

patient records in offline mode, as well as providing printed

copies of records. Along with this, important medical equipment

must be supported by it (Sasidharan & Thomas, 2021)

Transference It is a frequent practise in risk management to transfer a

person's or an organization's potential losses to a third party.

Periodic payments are often made to the third party to cover the

cost of the risk that the person or organisation has assumed. In

the event of a power outage, the hospital must set up a backup

power system or agency. Data should be stored in the cloud so

that it may be accessed from any location (Al-Qershi et al.,

2014). An IT risk assessment should be performed. All hospital

workers should get regular training on HIPAA requirements.

3
Running head: Evaluating Risk Handling Strategies

Keep an eye on all of the building's technological gadgets and

documents. Patients' data should be encrypted, as well as any

devices used to access it. It is recommended that patients with

tight rules use a mobile-based information system to view their

data (Ahmed & Sallow, 2017)

Mitigation Mitigation strategies must be developed in order to minimise,

remove, or manage risk to an acceptable level. Locate potential

sources of supplies and service providers in the region’s most at

risk of power disruptions and look into alternate sourcing

agreements. Manage and disseminate information about

scheduled service cutbacks or power outages to plant

managers or other operations executives. Review all equipment

shutdown timings and assess how they may be handled with

respect to anticipated service interruptions or power outages.

Critical EDP functions that might be affected if power to data

centres is lost or an outage that surpasses the capacity of UPS

systems is required (La Polla et al., 2013)

4
Running head: Evaluating Risk Handling Strategies

References

Ahmed, O. M., & Sallow, A. B. (2017). Android Security: A Review. Academic

Journal of Nawroz University, 6(3), 135–140.

https://doi.org/10.25007/ajnu.v6n3a99

Al-Qershi, F., Al-Qurishi, M., Md Mizanur Rahman, S., & Al-Amri, A. (2014, January

1). Android vs. iOS: The security battle. IEEE Xplore.

https://doi.org/10.1109/WCCAIS.2014.6916629

Gunduz, M. Z., & Das, R. (2020). Cyber-security on smart grid: Threats and potential

solutions. Computer Networks, 169, 107094.

https://doi.org/10.1016/j.comnet.2019.107094

Jing, Y., Ahn, G.-J., Zhao, Z., & Hu, H. (2014). RiskMon. Proceedings of the 4th

ACM Conference on Data and Application Security and Privacy - CODASPY

’14. https://doi.org/10.1145/2557547.2557549

La Polla, M., Martinelli, F., & Sgandurra, D. (2013). A Survey on Security for Mobile

Devices. IEEE Communications Surveys & Tutorials, 15(1), 446–471.

https://doi.org/10.1109/surv.2012.013012.00028

5
Running head: Evaluating Risk Handling Strategies

Sasidharan, S. K., & Thomas, C. (2021). ProDroid — An Android malware detection

framework based on profile hidden Markov model. Pervasive and Mobile

Computing, 72, 101336. https://doi.org/10.1016/j.pmcj.2021.101336

You might also like