2021
DOI: 10.3390/app11199183
|View full text |Cite
|
Sign up to set email alerts
|

Firewall Best Practices for Securing Smart Healthcare Environment: A Review

Abstract: Smart healthcare environments are growing at a rapid pace due to the services and benefits offered to healthcare practitioners and to patients. At the same time, smart healthcare environments are becoming increasingly complex environments where a plethora of devices are linked with each other, to deliver services to patients, and they require special security measures to protect the privacy and integrity of user data. Moreover, these environments are exposed to various kinds of security risks, threats, and att… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(12 citation statements)
references
References 58 publications
0
12
0
Order By: Relevance
“…When the DMZ is part of a cybersecurity strategy (in terms of network segmentation) it cannot and should not be viewed exclusively as a performance solution. According to Anwar, et. al.…”
Section: Network Considerations Of Security Typologymentioning
confidence: 99%
See 1 more Smart Citation
“…When the DMZ is part of a cybersecurity strategy (in terms of network segmentation) it cannot and should not be viewed exclusively as a performance solution. According to Anwar, et. al.…”
Section: Network Considerations Of Security Typologymentioning
confidence: 99%
“…The effectiveness of the firewall is dependent on environmental conditions (including the layer that the firewall is at and the nature of the data being protected). Anwar, et. al.…”
Section: Network Considerations Of Security Typologymentioning
confidence: 99%
“…The interconnection of embedded technologies in the paradigm of the Internet of Things (IoT) and the increasing complexity of networks due to the continuous increase of web applications and business transactions, make networks more vulnerable to cyberattacks that can result in denial of service, unauthorized accesses and sensitive data theft or alteration [1]. Cyberattacks represent a threat in different fields of application, such as Industry 4.0 [2][3][4] and healthcare [5][6][7].…”
Section: Introductionmentioning
confidence: 99%
“…Personal information protection technology can be divided into two main categories: rewall and encryption. A rewall is a type of network security that manages data entry and exit by monitoring received and transmitted information [7]. Although building a rewall on a network is expensive, it is generally one of the most effective data protection methods.…”
Section: Introductionmentioning
confidence: 99%