Foundation of healthcare cybersecurity

Foundation of healthcare cybersecurity

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
Information Security: Foundations, Technologies and Applications — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Healthcare automation has brought significant benefits to health care in terms of operational cost reduction, quality of care, patient convenience and initiation of personalized care. It has also brought new and increasing security and privacy challenges. The recent spate of successful cyberattacks against healthcare systems demonstrate that the security and privacy threats in health care are more varied and capable of undermining patient care and diminish revenues of healthcare sector. Considering the role that the healthcare sector plays within our society, the importance of protecting this critical infrastructure cannot be overstated. In this chapter the foundation of healthcare cybersecurity is presented. Major components of the healthcare systems and the associated requirements in terms of security and privacy are discussed. The threat landscape, vulnerabilities exploited to perpetrate cyberattacks against healthcare organizations and the various cyberattack types are identified and presented. Countermeasures and tools to defend and mitigate cyberattacks are also discussed.

Chapter Contents:

  • Abstract
  • 5.1 Introduction
  • 5.2 Health system architecture
  • 5.2.1 Healthcare infrastructure
  • 5.2.2 Healthcare dataset
  • 5.2.3 Data access infrastructure
  • 5.2.4 Privacy and security requirements
  • Health privacy
  • Health data security
  • 5.3 Health data breach incidents
  • 5.3.1 Cyberattacks against health care
  • 5.3.2 Impact of cyberattacks
  • Financial loss
  • Reputational damage
  • Danger to patients
  • 5.4 Healthcare vulnerability landscape
  • 5.4.1 Medical device vulnerability
  • 5.4.2 Outsourcing vulnerabilities
  • 5.4.3 Software and hardware vulnerabilities
  • 5.4.4 End user vulnerability
  • 5.4.5 Business vulnerability
  • 5.5 Healthcare threat landscape
  • 5.5.1 Cyber threat
  • 5.5.2 Social engineering threat
  • 5.5.3 Employee threat
  • 5.5.4 Malicious software threats
  • 5.5.5 Mobile health technologies threats
  • 5.5.6 Managing vendor security threats
  • 5.5.7 Social media and BYOD threats
  • 5.6 Cybersecurity controls
  • 5.6.1 Regulatory authorities
  • 5.6.2 Healthcare data protection
  • 5.6.3 Planning for cybersecurity
  • Cybersecurity strategic planning
  • Contingency planning
  • Planning for risk analysis and management
  • 5.6.4 Cybersecurity policies
  • 5.7 Analysis of cyberattack impacts
  • 5.7.1 Revenue loss
  • 5.7.2 Financial impact on patients
  • 5.7.3 Regulatory costs
  • 5.7.4 Cost of downtime
  • 5.8 Conclusion
  • Acknowledgment
  • References

Inspec keywords: security of data; data privacy; medical computing; medical information systems; patient care; health care

Other keywords: successful cyberattacks; initiation; healthcare organizations; privacy challenges; health care; healthcare cybersecurity; patient convenience; healthcare automation; personalized care; recent spate; healthcare systems; healthcare sector; patient care; operational cost reduction; privacy threats; significant benefits; increasing security; foundation

Subjects: Data security; Biology and medical computing

Preview this chapter:
Zoom in

Foundation of healthcare cybersecurity, Page 1 of 2

| /docserver/preview/fulltext/books/sc/pbse001e/PBSE001E_ch5-1.gif /docserver/preview/fulltext/books/sc/pbse001e/PBSE001E_ch5-2.gif

Related content

This is a required field
Please enter a valid email address