Mohd Javaid , Abid Haleem , Ravi Pratap Singh , Rajiv Suman
{"title":"Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends","authors":"Mohd Javaid , Abid Haleem , Ravi Pratap Singh , Rajiv Suman","doi":"10.1016/j.csa.2023.100016","DOIUrl":null,"url":null,"abstract":"<div><p>Healthcare information security is becoming a significant responsibility for all healthcare organisations and individuals. Innovative medical equipment and healthcare apps are vital to patient care, yet they are often the target of hackers. Moreover, attackers are silently working against healthcare data. Once a hacker has gained access to a network, they might install ransomware to lock down essential services or encrypt files until a specified ransom is paid. Businesses are frequently compelled to pay the ransom, hoping the money is eventually recovered since the healthcare sector is time-sensitive. Although less common, network-connected devices can be taken over and used to distribute incorrect medications or alter a machine's functionality. So, there is a need to implement cyber security in healthcare to protect all information. In comparison to other industries, security duties in the healthcare industry are particularly broad and new. This is especially true given that data is accumulated and accessed from various destinations. Data on a specific patient is gathered from various sources, including hospital and lab records, insurance records, fitness apps, trackers and gadgets, health portals, and many more. It can be easily protected by using cybersecurity technology. This paper briefs about cybersecurity and its need in healthcare. Several tools, traits and roles of cybersecurity in the Healthcare Sector are studied. Finally, we identified and studied the applications of cybersecurity in healthcare. For hackers, a patient's aggregated data might be regarded as a goldmine, providing them with a detailed biography of an individual, including basic information, health trends, family history, and financial details. The importance of Data access in the healthcare sector emerges from numerous endpoints, which can be regarded as the weak spots of the healthcare data management system and can also open up an infringement in the medical data management infrastructure.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"1 ","pages":"Article 100016"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cyber Security and Applications","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2772918423000048","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14
Abstract
Healthcare information security is becoming a significant responsibility for all healthcare organisations and individuals. Innovative medical equipment and healthcare apps are vital to patient care, yet they are often the target of hackers. Moreover, attackers are silently working against healthcare data. Once a hacker has gained access to a network, they might install ransomware to lock down essential services or encrypt files until a specified ransom is paid. Businesses are frequently compelled to pay the ransom, hoping the money is eventually recovered since the healthcare sector is time-sensitive. Although less common, network-connected devices can be taken over and used to distribute incorrect medications or alter a machine's functionality. So, there is a need to implement cyber security in healthcare to protect all information. In comparison to other industries, security duties in the healthcare industry are particularly broad and new. This is especially true given that data is accumulated and accessed from various destinations. Data on a specific patient is gathered from various sources, including hospital and lab records, insurance records, fitness apps, trackers and gadgets, health portals, and many more. It can be easily protected by using cybersecurity technology. This paper briefs about cybersecurity and its need in healthcare. Several tools, traits and roles of cybersecurity in the Healthcare Sector are studied. Finally, we identified and studied the applications of cybersecurity in healthcare. For hackers, a patient's aggregated data might be regarded as a goldmine, providing them with a detailed biography of an individual, including basic information, health trends, family history, and financial details. The importance of Data access in the healthcare sector emerges from numerous endpoints, which can be regarded as the weak spots of the healthcare data management system and can also open up an infringement in the medical data management infrastructure.