2019
DOI: 10.1109/access.2019.2950849
|View full text |Cite
|
Sign up to set email alerts
|

Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain

Abstract: Recently, an increasing number of cyber-attacks in the medical field has resulted in great losses in the health care industry, since medical information plays an essential role in human health. To introduce a comprehensive survey about possible cyber-attacks and solutions for these attacks, our paper first presents a brief overview of the necessary background of the dataflow in the medical domain and then identifies the vulnerabilities in each stage of the dataflow. Then, according to the weaknesses identified… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
19
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
3
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 59 publications
(21 citation statements)
references
References 83 publications
(76 reference statements)
0
19
0
Order By: Relevance
“…Table 2 shows the papers and their target domains. and there were security and privacy surveys on e-health challenges in the cloud, mobile healthcare (mHealth) systems, electronic health services, and the medical domain [15][16][17][18].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Table 2 shows the papers and their target domains. and there were security and privacy surveys on e-health challenges in the cloud, mobile healthcare (mHealth) systems, electronic health services, and the medical domain [15][16][17][18].…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, several studies were investigated the security and privacy of e-health challenges in the cloud environments, mobile healthcare system, electronic health services, and medical domain [15][16][17][18]. Chenthara et al [15] reviewed security and privacy challenges and approaches of e-health solutions for electronic health records (EHR) in the cloud environment.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Digital information not only offers advantages but also creates security threats. In handling these threats, cybersecurity is of paramount significance because it provides defensive methods to detect the potential intimidations [2]. However, the majority of the defensive methods are not very effective.…”
Section: Introductionmentioning
confidence: 99%
“…Information security is a concept is becoming increasingly enmeshed in many aspects of our society, largely as a result of our nearly ubiquitous adoption of computing technology [1]. Cybersecurity consists of largely defensive methods used to detect and thwart would-be intruders [2]. The majority of people have tunnel vision regarding information security basics, and they do not know much about other ways to consider and improve cybersecurity awareness.…”
Section: Introductionmentioning
confidence: 99%