Professional Documents
Culture Documents
Telehealth Systems
CHAPTER DESCRIPTION
Patient health records sell ten times more than other data on the dark web. Therefore, threat
actors increasingly target Healthcare Organizations. They steal patient’s sensitive information
related to health and medical research. To understand how to protect this information from
Cyberattacks, Healthcare cybersecurity is a solution because it involves protecting electronic
information and assets from unauthorized access, use, and disclosure. This includes not only
the security of systems and data but also the safety of patients, employees, and other
stakeholders. A multi-faceted approach is required, including strong authentication and
access control measures, secure data storage and encryption, regular monitoring of potential
threats, and effective incident response plans, in this chapter, we are going to define
cybersecurity in healthcare by developing these subtitles , for example in talking about risk
analysis and management. We are going to speak about how to perform qualitative risk
analysis for the first time.
SUBTITLES:
1- Introduction.
7- Conclusion.
Keywords:
* Corresponding author.
E-mail address: lyamine.guezouli@hns-re2sd.dz
2
-Cyberattacks[1].
-Cybersecurity[2].
-healthcare.
-Risk Analysis[3].
-Risk Management[3].
-control.
- medical. [4]
-safety.
-Security[5].
…
References
[1], [2]Mahler, Tom, et al. "Know your enemy: Characteristics of cyber-attacks on medical imaging
devices." arXiv preprint arXiv:1801.05583 (2018).
[3]Blanke, Sandra J., and Elizabeth McGrady. "When it comes to securing patient health information from
breaches, your best medicine is a dose of prevention: A cybersecurity risk assessment checklist." Journal of
healthcare risk management 36.1 (2016): 14-24.
[4]Dykstra, J., Mathur, R., & Spoor, A. (2020, December). Cybersecurity in Medical Private Practice: Results of a
Survey in Audiology. In 2020 IEEE 6th International Conference on Collaboration and Internet Computing
(CIC) (pp. 169-176). IEEE.
[5]Rahman, Mahbubur, and Hamid Jahankhani. "Security vulnerabilities in existing security mechanisms for iomt
and potential solutions for mitigating cyber-attacks." Information Security Technologies for Controlling
Pandemics (2021): 307-334.