Cyber-Physical Threat Intelligence for Critical Infrastructures Security: A Guide to Integrated Cyber-Physical Protection of Mo 2020
DOI: 10.1561/9781680836875.ch8
|View full text |Cite
|
Sign up to set email alerts
|

8. Security Challenges for the Critical Infrastructures of the Healthcare Sector

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…Bamiah et al [33] assert that CC adoption in healthcare minimizes complexity and enhances EHR management. Nevertheless, the healthcare sector's sensitivity to data breaches due to the nature of the information processed makes it a prime target for cyberattacks [34]. Research from the University of Minnesota's Public Health Department highlights a rise in cyberattacks against healthcare providers from 2016 to 2021, endangering the private health data of over 42 million patients [35].…”
Section: Cloud Computing Implementation In Healthcare: Strategies And...mentioning
confidence: 99%
“…Bamiah et al [33] assert that CC adoption in healthcare minimizes complexity and enhances EHR management. Nevertheless, the healthcare sector's sensitivity to data breaches due to the nature of the information processed makes it a prime target for cyberattacks [34]. Research from the University of Minnesota's Public Health Department highlights a rise in cyberattacks against healthcare providers from 2016 to 2021, endangering the private health data of over 42 million patients [35].…”
Section: Cloud Computing Implementation In Healthcare: Strategies And...mentioning
confidence: 99%
“…After its entry into force, the NIS Directive underwent a series of challenges in practice [ 23 , p. 147]. 11 The most crucial issue was its incoherent application due to the divergent Member State methodologies for identifying OES [ 17 ].…”
Section: Medical Device Cybersecurity In the Context Of The...mentioning
confidence: 99%
“…comprise another example in which physical tampering can significantly distort the system function (e.g., by changing antenna characteristics). According to the European Union Agency for Cybersecurity (ENISA) [5], physical tamper attacks within IoT applications are one of the main threats faced by healthcare organizations as well. An assumption in all these cases is that the transceivers must not be tampered for the system to work correctly.…”
Section: Introductionmentioning
confidence: 99%