2021
DOI: 10.21833/ijaas.2021.12.007
|View full text |Cite
|
Sign up to set email alerts
|

A survey of cybersecurity vulnerabilities in healthcare systems

Abstract: The security of healthcare servers and their applications from unauthorized access and hacking effect of patient file safety as a result of missing or modified data. Therefore, it is necessary to protect those servers and health systems and to know the cyber weaknesses in them and other related services to prevent them before they occur and treat them if they occur as soon as possible to reach the highest level of security and confidentiality of patient data and their privacy in addition to the safety of syste… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…Other vital components of a holistic cybersecurity strategy include the management of IT infrastructure (Alodaynan & Alanazi, 2021;Elhoseny et al, 2021), the implementation of an intrusion detection system (Alodaynan & Alanazi, 2021;Elhoseny et al, 2021), and risk management (Abraham et al, 2019;Bhuyan et al, 2020). According to Bhosale et al (2021), one of the reasons why healthcare institutions are vulnerable to cyberattacks is the prevalence of legacy systems.…”
Section: Cybersecurity Countermeasures and Mitigation Strategiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Other vital components of a holistic cybersecurity strategy include the management of IT infrastructure (Alodaynan & Alanazi, 2021;Elhoseny et al, 2021), the implementation of an intrusion detection system (Alodaynan & Alanazi, 2021;Elhoseny et al, 2021), and risk management (Abraham et al, 2019;Bhuyan et al, 2020). According to Bhosale et al (2021), one of the reasons why healthcare institutions are vulnerable to cyberattacks is the prevalence of legacy systems.…”
Section: Cybersecurity Countermeasures and Mitigation Strategiesmentioning
confidence: 99%
“…According to Bhosale et al (2021), one of the reasons why healthcare institutions are vulnerable to cyberattacks is the prevalence of legacy systems. Hence, it is vital that different components of IT infrastructures, including hardware and software, are adequately maintained and upgraded to ensure that cybercriminals do not exploit their weaknesses to gain access to healthcare data (Alodaynan & Alanazi, 2021;Elhoseny et al, 2021). IT infrastructure management can also entail vulnerability management, where the vulnerability of an institution to cyberattacks is regularly assessed and classified to determine their order of priority (Dias et al, 2021).…”
Section: Cybersecurity Countermeasures and Mitigation Strategiesmentioning
confidence: 99%