Cyber-Security in the Healthcare sector (Research Paper Sample)
This paper has discussed cybersecurity threats and their mitigation of measures to be taken in the healthcare sector. Due to the corona pandemic, the cases of cybersecurity hiked up, bringing havoc to online operators. As many governments were busy combating the pandemic, cybercriminals took advantage primarily to attack healthcare systems globally. Furthermore, the healthcare sector has been prone to attacks due to its vulnerability. It has faced challenges in keeping patient's data confidential, thus making its ng its accessibility easy by attackers. As a result, this paper has highlighted the appropriate measures to be taken by the health care sector in terms of hospital system infrastructures and safety. The paper has also discussed the common cybersecurity threats to the health sector via diverse methodologies as studied in the literature review of this paper.
source..
Cyber-Security in the Healthcare Sector
line 1: 1st Given Name Surname
line 2: dept. name of organization (of Affiliation)
line 3: name of organization (of Affiliation)
line 4: City, Country
line 5: email address or ORCID
Abstract--This paper has discussed cyber security threats and their mitigation of measures to be taken in the healthcare sector. Due to the corona pandemic, the cases of cyber security hiked up, bringing havoc to online operators. As many governments were busy combating the pandemic, cybercriminals took advantage primarily to attack healthcare systems globally. Furthermore, the healthcare sector has been prone to attacks due to its vulnerability. It has faced challenges in keeping patient's data confidential, thus making its accessibility easy by attackers. As a result, this paper has highlighted the appropriate measures to be taken by the health care sector in terms of hospital system infrastructures and safety. The paper has also discussed the common cyber security threats to the health sector via diverse methodologies as studied in the literature review of this paper.
Key words: Cyber security, Cybercrime, technology, health sector, security
INTRODUCTION
COVID-19 is one of the pandemics to have ever occurred, which has cause significant damage to the global operation, it will remain in history for decades. It is one of the strangest encounters in history which continue to affect people's lives globally. The rescheduling of operation in different institutions and push for working from home has increased the cybersecurity issues because users are busier on making switch to the remote operations. [1]. As the pandemic hitting people's lives across the world and the organizations and governments having the initiative to arrest the situation and implement the safety measures, the black hats and cybercriminals are preparing bombshells of attacks to the health organizations and making the institutions remain frustrated [1]. Cyber actors have taken advantage of the pandemic and impromptu measures that institutions are taking to make their plan to attack healthcare facilities with different threats.
The more technology is being incorporated in making the organization perform better in the operations; improved security measures should be employed to ensure that the systems are safe. The infrastructures for the hospitals are well looked at to avoid theft cases [3]. According to the survey done by IBM and the Institute of Phenomenon in 2010, the graph for cybersecurity has been on the rise in the healthcare sectors and other areas like telecommunication and manufacturing industries[2]. But with the emergency of CORONAVIRUS, healthcare sectors have been hit hard by the other pandemic of cyber security threats.
Many businesses had to restructure their operations by moving physical offices to the cloud and transferring locations without requiring workers to move, but the strategy was too haphazard. Organizations were unable to prepare adequately for the crisis and mitigations due to the pace of the disruption. Still, they attempted to adapt, with only 38% having a security plan, implying that the majority
The work-from-home (WFH) operating model has increased the risks of attack and other vulnerabilities that is because businesses switched to the model unplanned worldwide, which has increased the risks to the organization's data by switching to cloud storage and remote operations using insecure devices such as mobile phones and Local Area Networks [2]. It's critical to recognize that the culture has shifted to the WFH and that people must adjust to the new reality. That means employees must work on their computers at home or remotely where supervision is not needed. They use insecure networks and other technologies at home, putting the organizations at risk of attack. It's also difficult to spot changes in the actions of Workers who could be lured into attacking groups [3]. Organizations that include business devices to employees employ administrative regulations that may or may not have existed previously. In other situations, where random rights regulate workers, they may not be more responsible for something that occurs, resulting in possible security concerns. The paper will investigate the security issues (threats) facing the healthcare industries, especially during the pandemic, which will make the challenges, the challenges that cyber security is pausing to the healthcare sectors, and how that can be used to mitigate these cyber security challenges [3]. Since the healthcare sector has one of the areas where the personal information of high profiles individuals can be gotten, cyber attackers target these institutions to get their mission accomplished through hacking systems and cause a data breach, hence stealing essential credentials. During the pandemic, the situation has been the worst, drawing attention to the quick reaction by researching and offering solutions and recommendations about the health status and what can be done.
LITERATURE REVIEW
People are using the internet to get different instructions on using some equipment related to the treatment and message for their health conditions and clinic schedules during the pandemic. Equally, they use the internet to get different instructions on how to use some equipment related to the treatment and message for their health conditions and clinic schedules. Cybercriminals are taking advantage of the same opportunity to initiate as many attacks as possible to obtain credentials for various motives. As a result of the pandemic, cyber-attacks have increased significantly [4]. Ransomware attacks on healthcare institutions, for example, cost $21 billion in 2019. According to the study, 92 individual Ransomware attacks targeted more than 600 clinics, hospitals, and organizations, resulting in the loss of more than 18 million patient records[4].
Scams and other forms of cybercrime raise more money while posing the slightest danger to the offenders unless exceptional circumstances exist. Government agencies and other companies have given financial support to individuals. Different individuals want to work for organizations and have more time to socialize using the same network. As the world waits for a possible cure to stop COVID19 from spreading, internet users will be keeping an eye on something related to the virus[4] . Scammers use this vulnerability to send malicious phishing attacks to the target, impersonating government agencies, tax entities, and other pandemic-related issues.
According to a World Economic Forum study, cyber actors are becoming more common every day due to Phishing and other malicious acts. Since many people only get information from emails rather than first-hand sources like work briefings, such attacks have proven to be highly successful [5]. As a consequence, they're more likely to be persuaded to divulge details. People expect mail from officials, employers, and other information related to their Work, so scammers can take advantage of this by luring them in with enticing emails and collecting certificates relevant to their jobs. Cybercriminals are familiar with routes. Consequently, they will create information and emails that attract target individuals on websites that mimic the original. Thereby posing as known individuals with good intentions and communications that show a sense of urgency to acquire the information so that the target person is unaware they are being followed [5]. As a result, cybercriminals' phishing attacks will become more successful. These attacks may include internal and external warnings, monetary benefits, and charitable donations, to name a few. According to a recent survey conducted by F-Secure, spam is becoming a more popular way for malware to spread. Criminals are also using the pandemic to send messages that instruct the recipient to open links by zipping them to hide the executable in Actors also use familiar objects to entice targets to open files, which is a risky move. Before acting on an email, the recipient should verify the sender to ensure that the message is genuine. This is because criminals are impersonating people to get them to click on gun-infected links. As a result of panic laws, organizations like the World Health Organization and the United Nations have been affected by working from home. The entire planet was put on lockdown as a result of the pandemic. It affects how people interact and function. Using employer-protected systems at home has resulted in vulnerabilities and other loopholes from which third parties can access information and launch an attack [7]. An issue has arisen as a result of widespread isolation. Finding solutions to technical issues has proved difficult, resulting in a variety of situations, such as remote working, that have put the industry at risk.
METHODOLOGY
The researchers used desktop analysis techniques to perform a systematic literature review, with data collected between December 2019 and May 2020. In December 2019, COVID-19 was declared an outbreak in Wuhan, China, and several scientists and researchers have published numerous papers on the subject since then (WHO 2020b). The thesis took a systematic approach to data collection and literature reviews, allowing the research question to be answered using an exclusion and inclusion formula and meta-analysis to interpret, comprehend, and disseminate the data [8]. During the pandemic, the study aimed to conduct a systematic literature review to recognize and retrieve international data on cyber threats. These international findings are consistent with the research question, helping the researcher interpret the results and establish reasonable practices and policies for the scenario...
Other Topics:
- Understanding the Health Benefit Given by Vitamin EDescription: Vitamin E is one of the most researched compounds in the medical community because of what is believed to be its ability to prevent and effectively treat cancer. There are eight forms of vitamin E, of which gamma-tocopherol and tocotriencols have shown the greatest promises in effectively treating and ...1 page/≈275 words| 11 Sources | APA | Health, Medicine, Nursing | Research Paper |
- Symptoms, Causes and Managing DyslexiaDescription: Dyslexia is a neurodevelopmental learning-based disorder that impedes with a person's capability to read, spell, and pronounce words (Peterson & Pennington, 2012). Dyslexic children may experience unexpected challenges in speech awareness, including reading smoothly, word memory, and spelling. The extent ...2 pages/≈550 words| 3 Sources | APA | Health, Medicine, Nursing | Research Paper |
- Understanding the Branches of ArteryDescription: (Occipital branch of posterior auricular artery - an overview | ScienceDirect Topics. 2018)3. List any five of the nine blood vessels involved in the make- up of the Circle of Willis. (No particular order is necessary).a. Anterior communicating arteryb. Anterior cerebral arteryc. Internal carotid artery...1 page/≈275 words| 2 Sources | APA | Health, Medicine, Nursing | Research Paper |