Review Analysis of Cyber Security in Healthcare System: A Systematic Approach of Modern Development
DOI:
https://doi.org/10.55524/ijircst.2023.11.3.7Keywords:
Cyber, Data, Healthcare Security, Malware, Systematic, TechnologyAbstract
The healthcare industry provides medical devices such as pharmaceuticals. The third-party vendor can also pose a risk to the organization. Cyber security if they are not properly vetted and do not have adequate security measures in place. These will help to mitigate and other cyber security risks, healthcare organizations should implement a range of security measures. Regular security assessments in healthcare organizations should conduct a regular security assessment to identify vulnerable in their systems and network. Distributed dental or services attacks where criminals overload the healthcare system. Health care system servers with traffic, causing them to crash and preventive. Lag mate users from accessing the system's network, stealing data, and causing damage to the system. Ensure that these tools are updated regularly to protect against the latest threats. Regularly check the backup data and critical data and store them in a secure location. Monitoring network activity to detect and respond to any potential security incidents conduct regularly.
Downloads
References
Wanasinghe, T. R., Wroblewski, L., Petersen, B. K., Gosine, R. G., James, L. A., De Silva, O., ... & Warrian, P. J. (2020). Digital twin for the oil and gas industry: Overview, research trends, opportunities, and challenges. IEEE access, 8,
-104197.Retrived from:
https://ieeexplore.ieee.org/iel7/6287639/8948470/09104682.p df [Retrieved on: 28/03/2023]
Taimoor, N., & Rehman, S. (2021). Reliable and resilient AI and IoT-based personalised healthcare services: A survey. IEEE Access, 10, 535-563. Retrieved from: https://ieeexplore.ieee.org/iel7/6287639/9668973/09658494.p
df [Retrieved on: 28/03/2023]
Guzmán, J. A., & Núñez, F. (2021). A cyber-physical systems approach to collaborative intersection management and control. IEEE Access, 9, 99617-99632. Retrieved from: https://ieeexplore.ieee.org/iel7/6287639/9312710/09480804.p
df[Retrieved on: 28/03/2023]
Rodriguez, E., Otero, B., Gutierrez, N., & Canal, R. (2021). A survey of deep learning techniques for cybersecurity in mobile networks. IEEE Communications Surveys & Tutorials, 23(3), 1920-1955. Retrived from: https://upcommons.upc.edu/bitstream/handle/2117/355516/su
rvey_DL_cyber%2B-%2Bfinal.pdf?sequence=3 [Retrieved on: 28/03/2023]
Mullet, V., Sondi, P., & Ramat, E. (2021). A review of cybersecurity guidelines for manufacturing factories in industry 4.0. IEEE Access, 9, 23235-23263. Retrieved from: https://www.ideals.illinois.edu/items/126167/bitstreams/4130
/object?dl=1 [Retrieved on: 28/03/2023]
Mullet, V., Sondi, P., & Ramat, E. (2021). A review of cybersecurity guidelines for manufacturing factories in industry 4.0. IEEE Access, 9, 23235-23263. Retrieved from: https://ieeexplore.ieee.org/iel7/6287639/9312710/09345803.p
df [Retrieved on: 28/03/2023]
Chkadmin (2022) what is cloud security? understand the 6 pillars, Check Point Software. Check Point Software. Available at: https://www.checkpoint.com/cyber-hub/cloud security/what-is-cloud-security/ (Accessed: April 22, 2023).
Marques, G., Pitarma, R., M. Garcia, N., & Pombo, N. (2019). Internet of things architectures, technologies, applications, challenges, and future directions for enhanced living environments and healthcare systems: a review. Electronics, 8(10), 1081. Retrieved from: https://www.mdpi.com/2079-9292/8/10/1081/pdf [Retrieved on: 28/03/2023]
Tidjon, L. N., Frappier, M., & Mammar, A. (2019). Intrusion detection systems: A cross-domain overview. IEEE Communications Surveys & Tutorials, 21(4), 3639-3681. . Retrieved from: https://arxiv.org/pdf/2302.14536 [Retrieved on: 28/03/2023]
Zambrano, P., Torres, J., Tello-Oquendo, L., Jácome, R., Benalcázar, M. E., Andrade, R., & Fuertes, W. (2019). Technical mapping of the grooming anatomy using machine learning paradigms: An information security approach. IEEE Access, 7, 142129-142146. Retrived from: https://ieeexplore.ieee.org/iel7/6287639/8600701/08845626.p
df [Retrieved on: 28/03/2023]
Lopez, T., Tun, T., Bandara, A., Mark, L., Nuseibeh, B., & Sharp, H. (2019, May). An anatomy of security conversations in stack overflow. In 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Society (ICSE-SEIS) (pp. 31-40). IEEE. Retrieved from: https://oro.open.ac.uk/59243/1/PID5783059-CRC.pdf
[Retrieved on: 28/03/2023]
Langehaug, T. J., Graham, S. R., Kabban, C. M. S., & Borghetti, B. J. (2022). MADFAM: MicroArchitectural Data Framework and Methodology. IEEE Access, 10, 23511- 23531. Retrieved from: https://ieeexplore.ieee.org/iel7/6287639/9668973/09718324.p
df [Retrieved on: 28/03/2023]
Liu, Y., Hassan, K. A., Karlsson, M., Pang, Z., & Gong, S. (2019). A data-centric internet of things framework based on azure cloud. IEEE Access, 7, 53839-53858. Retrieved from: https://ieeexplore.ieee.org/iel7/6287639/6514899/08698762.p
df [Retrieved on: 28/03/2023]
Ashenden, D., Ollis, G., & Reid, I. (2022, October). Dancing, not Wrestling: Moving from Compliance to Concordance for Secure Software Development. In 37th IEEE/ACM International Conference on Automated Software Engineering (pp. 1-9). Retrieved from: https://yuxi
wu.github.io/pubs/sp22_sok_socialcybersecurity.pdf [Retrieved on: 28/03/2023]
Jiang, B., Li, J., Yue, G., & Song, H. (2021). Differential privacy for industrial internet of things: Opportunities, applications, and challenges. IEEE Internet of Things Journal, 8(13), 10430-10451. Retrived from: https://www.academia.edu/download/96834000/2101.10569v
pdf [Retrieved on: 28/03/2023]
FAQ: In Oil & Gas What is upstream and downstream?: Eland Cables (no date) FAQ: In Oil & Gas what is upstream and downstream? |Eland Cables. Available at: https://www.elandcables.com/the-cable-lab/faqs/faq-what
are-upstream-and-downstream-works-in-the-oil-gas-industry (Accessed: April 14, 2023).
Wallarm (2023) what is cyber-attack meaning? types and examples, RSS. Available at: https://www.wallarm.com/what/what-is-a-cyber-attack (Accessed: April 14, 2023).
Kruse, C.S. et al. (2017) “Cybersecurity in Healthcare: A systematic review of modern threats and Trends,” Technology and Health Care, 25(1), pp. 1–10. Available at: https://doi.org/10.3233/thc-161263.
McKeon, J. (2023) Quantifying the financial impact of healthcare ransomware attacks, HealthITSecurity. HealthITSecurity. Available at: https://healthitsecurity.com/news/quantifying-the-financial
impact-of-healthcare-ransomware-attacks (Accessed: April 20, 2023).
Basic level certification - international association for ... - IAHSS (no date). Available at: https://www.iahss.org/page/basic (Accessed: April 20, 2023).
Ambulatory tracks selections (no date) The Healthcare Security Institute. Available at: https://www.thehealthcaresecurityinstitute.com/new-page-2 (Accessed: April 20, 2023).
Michali (2023) Cyberattacks on the healthcare sector, Check Point Software. Check Point Software. Available at: https://www.checkpoint.com/cyber-hub/cyber-
security/what-is-healthcare-cybersecurity /cyberattacks-on the-healthcare-sector/ (Accessed: April 20, 2023). [24] Biggest cyber threats in healthcare (updated for 2023): Upguard (no date) RSS. Available at: https://www.upguard.com/blog/biggest-cyber-threats-in healthcare (Accessed: April 20, 2023).
9 reasons healthcare is the biggest target for cyberattacks (2022) Swivel Secure. Available at: https://swivelsecure.com/solutions/healthcare/healthcare-is the-biggest-target-for-cyberattacks/ (Accessed: April 20, 2023).
HealthITSecurity (no date) Home, Healthcare Information Security. Available at: https://healthitsecurity.com/topic/latest-health-data-breaches (Accessed: April 20, 2023).