2017 International Conference on Communication and Signal Processing (ICCSP) 2017
DOI: 10.1109/iccsp.2017.8286448
|View full text |Cite
|
Sign up to set email alerts
|

A survey on security attacks in electronic healthcare systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 6 publications
0
9
0
Order By: Relevance
“…The healthcare sector shares most of the threat vectors with other industries however the impact of a compromise is much higher given it involves the safety of patients. Priya et al [11] described some of the security attacks that are targeted at healthcare systems and the challenges they pose to the security, integrity and availability of sensitive data. The authors characterised the security attacks into three phases which are: the data gathering phase, network gathering phase and Storage phase.…”
Section: Healthcare Exposure To Cyber Threatsmentioning
confidence: 99%
“…The healthcare sector shares most of the threat vectors with other industries however the impact of a compromise is much higher given it involves the safety of patients. Priya et al [11] described some of the security attacks that are targeted at healthcare systems and the challenges they pose to the security, integrity and availability of sensitive data. The authors characterised the security attacks into three phases which are: the data gathering phase, network gathering phase and Storage phase.…”
Section: Healthcare Exposure To Cyber Threatsmentioning
confidence: 99%
“…A suitable and secure system must not allow access to the data to unauthorized users. Table 8 presents cyberattacks presented in the Indian data [89].…”
Section: Cyber Attacks and Hackingmentioning
confidence: 99%
“… Denial of Service Attack DoS: One of the most common network attacks, occurs by flooding the health care system with repeated, unwanted requests as the attacker pick up the network, allowing the attacker to capture the entire network. Therefore, legitimate users are not allowed to access their accounts or data in the health care system due to this attack that destroys access and overthrows the system (Priya et al, 2017).  SYN Attacks: An attack that occurs by exploiting the TCP three-way handshake when sending data, as more than one handshake request is sent, thus bypassing the limited buffer space and thus the target system ignores legitimate sent requests (Dogaru and Dumitrache, 2017).…”
Section: Active Attackermentioning
confidence: 99%
“…Therefore, the urgent and explicit need to protect the confidentiality and integrity of health care systems' information and its availability in a timely manner are the main challenges (Priya et al, 2017;Mohsin et al, 2019).…”
Section: Introductionmentioning
confidence: 99%