DOI QR코드

DOI QR Code

A Survey of Cybersecurity Vulnerabilities in Healthcare Systems

  • 투고 : 2023.06.05
  • 발행 : 2023.06.30

초록

In the process of remarkable progress in the medical and technical field and activating the role of technology in health care services and applications, and since the safety of medical data and its protection from security violations plays a major role in assessing the security of health facilities and the safety of medical servers Thus, it is necessary to know the cyber vulnerabilities in health information systems and other related services to prevent and address them in addition to obtaining the best solutions and practices to reach a high level of cybersecurity against attackers, especially due to the digital transformation of health care systems and the rest of the dealings. This research is about what cyberattacks are and the purpose of them, in addition to the methods of penetration. Then challenges, solutions and some of the security issues will be discussed in general, and a special highlight will be given to obtaining a safe infrastructure to enjoy safe systems in return.

키워드

참고문헌

  1. Dogaru, D. I., & Dumitrache, I. (2017). Cyber security in healthcare networks. 2017 E-Health and Bioengineering Conference, EHB 2017, 414-417. https://doi.org/10.1109/EHB.2017.7995449
  2. Priya, R., Sivasankaran, S., Ravisasthiri, P., & Sivachandiran, S. (2018). A survey on security attacks in electronic healthcare systems. Proceedings of the 2017 IEEE International Conference on Communication and Signal Processing, ICCSP 2017, 2018-January, 691-694. https://doi.org/10.1109/ICCSP.2017.8286448
  3. Newaz, A. I., Sikder, A. K., Rahman, M. A., & Selcuk Uluagac, A. (2020). A Survey on security and privacy issues in modern healthcare systems: Attacks and defenses. ArXiv, 1(1), 1-40.
  4. Dogaru, D. I., & Dumitrache, I. (2016). Cyber-physical systems in healthcare networks. 2015 E-Health and Bioengineering Conference, EHB 2015, 15-18. https://doi.org/10.1109/EHB.2015.7391368
  5. Nair, M. M., Tyagi, A. K., & Goyal, R. (2019). Medical Cyber Physical Systems and Its Issues. Procedia Computer Science, 165, 647-655. https://doi.org/10.1016/j.procs.2020.01.059
  6. Sun, Y., Lo, F. P. W., & Lo, B. (2019). Security and Privacy for the Internet of Medical Things Enabled Healthcare Systems: A Survey. IEEE Access, 7, 183339-183355. https://doi.org/10.1109/ACCESS.2019.2960617
  7. Saleem, K., Zeb, K., Derhab, A., Abbas, H., Al-Muhtadi, J., Orgun, M. A., & Gawanmeh, A. (2016). Survey on cybersecurity issues in wireless mesh networks based eHealthcare. 2016 IEEE 18th International Conference on E-Health Networking, Applications and Services, Healthcom 2016. https://doi.org/10.1109/HealthCom.2016.7749423
  8. Chen, Q., Lambright, J., & Abdelwahed, S. (2016). Towards Autonomic Security Management of Healthcare Information Systems. Proceedings - 2016 IEEE 1st International Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2016, 113-118. https://doi.org/10.1109/CHASE.2016.58
  9. Mohsin, A. H., Zaidan, A. A., Zaidan, B. B., Albahri, O. S., Albahri, A. S., Alsalem, M. A., & Mohammed, K. I. (2019). Based Medical Systems for Patient's Authentication: Towards a New Verification Secure Framework Using CIA Standard. Journal of Medical Systems, 43(7). https://doi.org/10.1007/s10916-019-1264-y
  10. Bahkali, S., Almaiman, A., Almadani, W., Househ, M., & El Metwally, A. (2014). The state public health informatics in Saudi Arabia. Studies in Health Technology and Informatics, 202, 257-260. https://doi.org/10.3233/978-1-61499-423-7-257
  11. Kwon, J., & Johnson, M. E. (2015). Protecting Patient Data - The Economic Perspective of Healthcare Security. IEEE Security and Privacy, 13(5), 90-95. https://doi.org/10.1109/MSP.2015.113