The Connection Between Hackers and Their Affinity Towards Healthcare

Maurice L McBride

Abstract


Cybercriminals target the healthcare sector because patient data can be traded illegally. These include ransomware attacks and medical record theft. This article analyzes the internal factors that make healthcare firms vulnerable to cybercrime. It also examines their complicated tactics for entering and profiting from these sectors. This paper examines healthcare cybersecurity case studies and current research. The goal is to help readers understand the main challenges of fighting different cyberattacks. The methodology part includes a thorough literature review and rigorous analysis of data from academic sources, industry publications, and cyber security incident databases. The numbers show the diverse threat actors targeting the healthcare business, their techniques, and the vulnerabilities of healthcare institutions to cyber attacks. The report concludes that healthcare cybersecurity is crucial. The guidelines presented are essential for healthcare cybersecurity.


Keywords


Healthcare Cyberthreats; Hackers; Access Controls; Identity Management; Patch Management

Full Text:

PDF

References


Adil, M., Khan, M. K., Kumar, N., Attique, M., Farouk, A., Guizani, M., & Jin, Z. (2024). Healthcare Internet of Things: Security Threats, Challenges and Future Research Directions. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2024.3360289

Cyber-Attacks by Type. Download Scientific Diagram. (n.d.). Retrieved March 15, 2024,

from https://www.researchgate.net/figure/Cyber-Attacks-by-Type_fig2_359155431

Healthcare Data Breach Statistics. (n.d.). Retrieved March 14, 2024, from https://www.hipaajournal.com/healthcare-data-breach-statistics/

Kaur, M., Singh, D., Kumar, V., Gupta, B. B., & Abd El-Latif, A. A. (2021). Secure and energy efficient-based E-health care framework for green internet of things. IEEE Transactions on Green Communications and Networking, 5(3), 1223-1231. https://doi.org/10.1109/TGCN.2021.3081616

Ke, J., Wang, W., & Foutz, N. Z. (2022). Heterogeneous consumer response and mitigation toward healthcare data breach: Insights from location big data. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.4029103

Kelly, B., Quinn, C., Lawlor, A., Killeen, R., & Burrell, J. (2023). Cybersecurity in Healthcare. Trends of Artificial Intelligence and Big Data for E-Health, 213-231. https://doi.org/10.1007/978-3-031-11199-0_11

Keshta, I., & Odeh, A. (2021). Security and privacy of electronic health records: Concerns and challenges. Egyptian Informatics Journal, 22(2), 177-183. https://doi.org/10.1016/j.eij.2020.07.003

Mikuletič, S., Vrhovec, S., Skela-Savič, B., & Žvanut, B. (2024). Security and privacy oriented information security culture (ISC): Explaining unauthorized access to healthcare data by nursing employees. Computers & Security, 136, 103489. https://doi.org/10.1016/j.cose.2023.103489

Parker, M. (2023). Managing threats to health data and information: toward security. In Health Information Exchange (pp. 149-196). Academic Press. https://doi.org/10.1016/B978-0-323-90802-3.00016-2

Perwej, Y., Abbas, S. Q., Dixit, J. P., Akhtar, N., & Jaiswal, A. K. (2021). A systematic literature review on the cyber security. International Journal of scientific research and management, 9(12), 669-710. https://dx.doi.org/10.18535/ijsrm/v9i12.ec04

Rachit, Bhatt, S. & Ragiri, P.R. Security trends in Internet of Things: a survey. SN Appl. Sci. 3, 121 (2021). https://doi.org/10.1007/s42452-021-04156-9

Roumani, Y. (2022). Detection time of data breaches. Computers & Security, 112, 102508. https://doi.org/10.1016/j.cose.2021.102508

Schmitz-Berndt, S. (2023). Defining the reporting threshold for a cybersecurity incident under the NIS directive and the NIS 2 directive. Journal of Cybersecurity, 9(1). https://doi.org/10.1093/cybsec/tyad009

The Cost of Cyberattacks in Healthcare in 2023 - Intraprise Health. (n.d.). Retrieved March 15, 2024, from https://intraprisehealth.com/the-cost-of-cyberattacks-in-healthcare

Thomasian, N. M., & Adashi, E. Y. (2021). Cybersecurity in the internet of medical things. Health Policy and Technology, 10(3), 100549. https://doi.org/10.1016/j.hlpt.2021.100549

van Boven, L. S., Kusters, R. W., Tin, D., van Osch, F. H., De Cauwer, H., Ketelings, L., ... & Barten, D. G. (2024). Hacking acute care: a qualitative study on the health care impacts of ransomware attacks against hospitals. Annals of emergency medicine, 83(1), 46-56. https://doi.org/10.1016/j.annemergmed.2023.04.025

Van der Kleij, R., Schraagen, J. M., Cadet, B., & Young, H. (2022). Developing decision support for cybersecurity threat and incident managers. Computers & Security, 113, 102535. https://doi.org/10.1016/j.cose.2021.102535

Van Uhm, D., South, N., & Wyatt, T. (2021). Connections between trades and trafficking in wildlife and drugs. Trends in Organized Crime, 24(4), 425-446. https://doi.org/10.1007/s12117-021-09416-z

Wasserman, L., & Wasserman, Y. (2022). Hospital cybersecurity risks and gaps: Review (for the non-cyber professional). Frontiers in Digital Health, 4. https://doi.org/10.3389/fdgth.2022.862221

Wenhua, Z., Qamar, F., Abdali, T. A. N., Hassan, R., Jafri, S. T. A., & Nguyen, Q. N. (2023). Blockchain technology: security issues, healthcare applications, challenges and future trends. Electronics, 12(3), 546. https://doi.org/10.3390/electronics12030546




DOI: https://doi.org/10.53889/aihitj.v1i1.439

Article Metrics

Abstract view : 95 times
PDF - 40 times

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.