Review Analysis of Cyber Security in Healthcare System: A Systematic Approach of Modern Development

Authors

  • Venkateswaran Radhakrishnan Faculty, Cyber and Information Security-IT, College of Computing and Information Sciences, University of Technology and Applied Sciences, Salalah, Oman Author

DOI:

https://doi.org/10.55524/ijircst.2023.11.3.7

Keywords:

Cyber, Data, Healthcare Security, Malware, Systematic, Technology

Abstract

The healthcare industry provides medical  devices such as pharmaceuticals. The third-party vendor can  also pose a risk to the organization. Cyber security if they are  not properly vetted and do not have adequate security  measures in place. These will help to mitigate and other  cyber security risks, healthcare organizations should  implement a range of security measures. Regular security  assessments in healthcare organizations should conduct a  regular security assessment to identify vulnerable in their  systems and network. Distributed dental or services attacks  where criminals overload the healthcare system. Health care  system servers with traffic, causing them to crash and  preventive. Lag mate users from accessing the system's  network, stealing data, and causing damage to the  system. Ensure that these tools are updated regularly to  protect against the latest threats. Regularly check the backup  data and critical data and store them in a secure location.  Monitoring network activity to detect and respond to any  potential security incidents conduct regularly.

Downloads

Download data is not yet available.

References

Wanasinghe, T. R., Wroblewski, L., Petersen, B. K., Gosine, R. G., James, L. A., De Silva, O., ... & Warrian, P. J. (2020). Digital twin for the oil and gas industry: Overview, research trends, opportunities, and challenges. IEEE access, 8,

-104197.Retrived from:

https://ieeexplore.ieee.org/iel7/6287639/8948470/09104682.p df [Retrieved on: 28/03/2023]

Taimoor, N., & Rehman, S. (2021). Reliable and resilient AI and IoT-based personalised healthcare services: A survey. IEEE Access, 10, 535-563. Retrieved from: https://ieeexplore.ieee.org/iel7/6287639/9668973/09658494.p

df [Retrieved on: 28/03/2023]

Guzmán, J. A., & Núñez, F. (2021). A cyber-physical systems approach to collaborative intersection management and control. IEEE Access, 9, 99617-99632. Retrieved from: https://ieeexplore.ieee.org/iel7/6287639/9312710/09480804.p

df[Retrieved on: 28/03/2023]

Rodriguez, E., Otero, B., Gutierrez, N., & Canal, R. (2021). A survey of deep learning techniques for cybersecurity in mobile networks. IEEE Communications Surveys & Tutorials, 23(3), 1920-1955. Retrived from: https://upcommons.upc.edu/bitstream/handle/2117/355516/su

rvey_DL_cyber%2B-%2Bfinal.pdf?sequence=3 [Retrieved on: 28/03/2023]

Mullet, V., Sondi, P., & Ramat, E. (2021). A review of cybersecurity guidelines for manufacturing factories in industry 4.0. IEEE Access, 9, 23235-23263. Retrieved from: https://www.ideals.illinois.edu/items/126167/bitstreams/4130

/object?dl=1 [Retrieved on: 28/03/2023]

Mullet, V., Sondi, P., & Ramat, E. (2021). A review of cybersecurity guidelines for manufacturing factories in industry 4.0. IEEE Access, 9, 23235-23263. Retrieved from: https://ieeexplore.ieee.org/iel7/6287639/9312710/09345803.p

df [Retrieved on: 28/03/2023]

Chkadmin (2022) what is cloud security? understand the 6 pillars, Check Point Software. Check Point Software. Available at: https://www.checkpoint.com/cyber-hub/cloud security/what-is-cloud-security/ (Accessed: April 22, 2023).

Marques, G., Pitarma, R., M. Garcia, N., & Pombo, N. (2019). Internet of things architectures, technologies, applications, challenges, and future directions for enhanced living environments and healthcare systems: a review. Electronics, 8(10), 1081. Retrieved from: https://www.mdpi.com/2079-9292/8/10/1081/pdf [Retrieved on: 28/03/2023]

Tidjon, L. N., Frappier, M., & Mammar, A. (2019). Intrusion detection systems: A cross-domain overview. IEEE Communications Surveys & Tutorials, 21(4), 3639-3681. . Retrieved from: https://arxiv.org/pdf/2302.14536 [Retrieved on: 28/03/2023]

Zambrano, P., Torres, J., Tello-Oquendo, L., Jácome, R., Benalcázar, M. E., Andrade, R., & Fuertes, W. (2019). Technical mapping of the grooming anatomy using machine learning paradigms: An information security approach. IEEE Access, 7, 142129-142146. Retrived from: https://ieeexplore.ieee.org/iel7/6287639/8600701/08845626.p

df [Retrieved on: 28/03/2023]

Lopez, T., Tun, T., Bandara, A., Mark, L., Nuseibeh, B., & Sharp, H. (2019, May). An anatomy of security conversations in stack overflow. In 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Society (ICSE-SEIS) (pp. 31-40). IEEE. Retrieved from: https://oro.open.ac.uk/59243/1/PID5783059-CRC.pdf

[Retrieved on: 28/03/2023]

Langehaug, T. J., Graham, S. R., Kabban, C. M. S., & Borghetti, B. J. (2022). MADFAM: MicroArchitectural Data Framework and Methodology. IEEE Access, 10, 23511- 23531. Retrieved from: https://ieeexplore.ieee.org/iel7/6287639/9668973/09718324.p

df [Retrieved on: 28/03/2023]

Liu, Y., Hassan, K. A., Karlsson, M., Pang, Z., & Gong, S. (2019). A data-centric internet of things framework based on azure cloud. IEEE Access, 7, 53839-53858. Retrieved from: https://ieeexplore.ieee.org/iel7/6287639/6514899/08698762.p

df [Retrieved on: 28/03/2023]

Ashenden, D., Ollis, G., & Reid, I. (2022, October). Dancing, not Wrestling: Moving from Compliance to Concordance for Secure Software Development. In 37th IEEE/ACM International Conference on Automated Software Engineering (pp. 1-9). Retrieved from: https://yuxi

wu.github.io/pubs/sp22_sok_socialcybersecurity.pdf [Retrieved on: 28/03/2023]

Jiang, B., Li, J., Yue, G., & Song, H. (2021). Differential privacy for industrial internet of things: Opportunities, applications, and challenges. IEEE Internet of Things Journal, 8(13), 10430-10451. Retrived from: https://www.academia.edu/download/96834000/2101.10569v

pdf [Retrieved on: 28/03/2023]

FAQ: In Oil & Gas What is upstream and downstream?: Eland Cables (no date) FAQ: In Oil & Gas what is upstream and downstream? |Eland Cables. Available at: https://www.elandcables.com/the-cable-lab/faqs/faq-what

are-upstream-and-downstream-works-in-the-oil-gas-industry (Accessed: April 14, 2023).

Wallarm (2023) what is cyber-attack meaning? types and examples, RSS. Available at: https://www.wallarm.com/what/what-is-a-cyber-attack (Accessed: April 14, 2023).

Kruse, C.S. et al. (2017) “Cybersecurity in Healthcare: A systematic review of modern threats and Trends,” Technology and Health Care, 25(1), pp. 1–10. Available at: https://doi.org/10.3233/thc-161263.

McKeon, J. (2023) Quantifying the financial impact of healthcare ransomware attacks, HealthITSecurity. HealthITSecurity. Available at: https://healthitsecurity.com/news/quantifying-the-financial

impact-of-healthcare-ransomware-attacks (Accessed: April 20, 2023).

Basic level certification - international association for ... - IAHSS (no date). Available at: https://www.iahss.org/page/basic (Accessed: April 20, 2023).

Ambulatory tracks selections (no date) The Healthcare Security Institute. Available at: https://www.thehealthcaresecurityinstitute.com/new-page-2 (Accessed: April 20, 2023).

Michali (2023) Cyberattacks on the healthcare sector, Check Point Software. Check Point Software. Available at: https://www.checkpoint.com/cyber-hub/cyber-

security/what-is-healthcare-cybersecurity /cyberattacks-on the-healthcare-sector/ (Accessed: April 20, 2023). [24] Biggest cyber threats in healthcare (updated for 2023): Upguard (no date) RSS. Available at: https://www.upguard.com/blog/biggest-cyber-threats-in healthcare (Accessed: April 20, 2023).

9 reasons healthcare is the biggest target for cyberattacks (2022) Swivel Secure. Available at: https://swivelsecure.com/solutions/healthcare/healthcare-is the-biggest-target-for-cyberattacks/ (Accessed: April 20, 2023).

HealthITSecurity (no date) Home, Healthcare Information Security. Available at: https://healthitsecurity.com/topic/latest-health-data-breaches (Accessed: April 20, 2023).

Downloads

Published

2023-05-30

How to Cite

Review Analysis of Cyber Security in Healthcare System: A Systematic Approach of Modern Development . (2023). International Journal of Innovative Research in Computer Science & Technology, 11(3), 38–42. https://doi.org/10.55524/ijircst.2023.11.3.7