You are on page 1of 2

Artificial Intelligence and Blockchain Technology in Modern

Telehealth Systems

Chapter title: Cybersecurity in healthcare systems


Lyamine Guezoulia,b,* ChelaouacAbdellatif -Atbi Aya Nessrine -Abdelmeraim Raziqa -Omerani
Alaa edinne
a LEREESI Laboratory, Higher National School of Renewable Energy, Environment and Sustainable Development. Batna, Algeria.
b Renewable Energies and New Technologies Department, Higher National School of Renewable Energy, Environment and Sustainable Development., Batna, Algeria.

CHAPTER DESCRIPTION
Patient health records sell ten times more than other data on the dark web. Therefore, threat
actors increasingly target Healthcare Organizations. They steal patient’s sensitive information
related to health and medical research. To understand how to protect this information from
Cyberattacks, Healthcare cybersecurity is a solution because it involves protecting electronic
information and assets from unauthorized access, use, and disclosure. This includes not only
the security of systems and data but also the safety of patients, employees, and other
stakeholders. A multi-faceted approach is required, including strong authentication and
access control measures, secure data storage and encryption, regular monitoring of potential
threats, and effective incident response plans, in this chapter, we are going to define
cybersecurity in healthcare by developing these subtitles , for example in talking about risk
analysis and management. We are going to speak about how to perform qualitative risk
analysis for the first time.
SUBTITLES:

1- Introduction.

2- Security Awareness and Training.

3- Risk Analysis and Management.

4- Data Security and Encryptions.

5- Access Control and Identity Management.

6- Business Continuity and Disaster Recovery Planning.

7- Conclusion.

Keywords:

* Corresponding author.
E-mail address: lyamine.guezouli@hns-re2sd.dz
2
-Cyberattacks[1].
-Cybersecurity[2].
-healthcare.
-Risk Analysis[3].
-Risk Management[3].
-control.
- medical. [4]
-safety.
-Security[5].

References
[1], [2]Mahler, Tom, et al. "Know your enemy: Characteristics of cyber-attacks on medical imaging
devices." arXiv preprint arXiv:1801.05583 (2018).
[3]Blanke, Sandra J., and Elizabeth McGrady. "When it comes to securing patient health information from
breaches, your best medicine is a dose of prevention: A cybersecurity risk assessment checklist." Journal of
healthcare risk management 36.1 (2016): 14-24.
[4]Dykstra, J., Mathur, R., & Spoor, A. (2020, December). Cybersecurity in Medical Private Practice: Results of a
Survey in Audiology. In 2020 IEEE 6th International Conference on Collaboration and Internet Computing
(CIC) (pp. 169-176). IEEE.
[5]Rahman, Mahbubur, and Hamid Jahankhani. "Security vulnerabilities in existing security mechanisms for iomt
and potential solutions for mitigating cyber-attacks." Information Security Technologies for Controlling
Pandemics (2021): 307-334.

You might also like