SYSTEM SURVIVABILITY THREATS AND FACTORS INFLUENCING ATTACKS IN HEALTH FACILITIES
Authors: Joseph SIMIYU, Dorothy RAMBIM, Jasper ONDULO
Affiliation: Masinde Muliro University of Science and Technology
Category:
Keywords: e-health, Survivability, System Vulnerabilities, Security Risks
ABSTRACT. The adoption of e-health offers affluence medical benefits, unfortunately source of effective data is poorly protected, it is also susceptible to dangerous threats and attacks. While the volume of medical data dictates the use of technology, a failure of e-health systems to include security survivability as apriority in making e-health systems compromise easier. With this numerous security issues, the system can suffer more and never recover to assure users on their mission mandate. Despite efforts to secure Kenya’s cyber space by assuring Kenya electronic transactions and online services such as e Government and health, system survivability and security attacks continues to jeopardize e-health confidentiality, credibility, reliability and availability for both providers and users. Therefore, it is important to understand issues around system survivability after attack rather than just security. Overall, this paper will try to come up with a system survivability issues for fighting information systems crime in the health sector in Kenya. Specifically, this research study will seek to outline the major system survivability threats and vulnerabilities within health sector in Kenya.
References:
Farrukh Khan, Raymond A. Paul, 2012. In Advances in Computers, M
Shenoy, A., & Appel, J. M. (2017). Safeguarding Confidentiality in Electronic Health Records. Cambridge quarterly of healthcare ethics : CQ : the international journal of healthcare ethics committees, 26(2), 337–341. https://doi.org/10.1017/S0963180116000931
Experts, A. U. (2018). Call for Experts
Burns, A. J., Johnson, M. E., & Honeyman, P. (2016). A brief chronology of medical device security. Communications of the ACM, 59(10), 66–72
Index, M. M. (2016)
Kotz, D., Gunter, C. A., Kumar, S., & Weiner, J. P. (2016). Privacy and Security in Mobile Health: A Research Agenda. Computer, 49(6), 22–30. https://doi.org/10.1109/MC.2016.185
Seh AH, Zarour M, Alenezi M, Sarkar AK, Agrawal A, Kumar R, Khan RA. Healthcare Data Breaches: Insights and Implications. Healthcare (Basel). 2020 May 13;8(2):133. doi: 10.3390/healthcare8020133. PMID: 32414183; PMCID: PMC7349636
Whitler, Kimberly & Farris, Paul. (2017). The Impact of Cyber Attacks on Brand Image: Why Proactive Marketing Expertise Is Needed for Managing Data Breaches. Journal of Advertising Research. 57. 3-9. 10.2501/JAR-2017-005
Scott, M., & Wingfield, N. (2017). Hacking attack has security experts scrambling to contain fallout. New York, USA: New York Times
Coventry, Lynne & Branley-Bell, Dawn. (2018). Cybersecurity in healthcare: A narrative review of trends, threats and ways forward. Maturitas. 113. 10.1016/j.maturitas.2018.04.008
Storm, D. (2015). MEDJACK: Hackers hijacking medical devices to create backdoors in hospital networks. London, UK: Computerworld
Pycroft, L., Boccard, S. G., Owen, S. L. F., Stein, J. F., Fitzgerald, J. J., Green, A. L., & Aziz, T. Z. (2016). Brainjacking: implant security issues in invasive neuromodulation. World Neurosurgery, 92(1), 454–462
Klonoff, D. C. (2015). Cybersecurity for connected diabetes devices. Journal of Diabetes Science and Technology, 9(5), 1143–1147
Kruse, C. S., Frederick, B., Jacobson, T., & Monticone, D. K. (2017). Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology and Health Care, 25(1), 1–10
Krisby, R. M. (2018). Health care held ransom: modifications to data breach security & the future of health care privacy protection. Health Matrix, 28(1), 365
Pope, J. (2016). Ransomware: minimizing the risks. Innovations in Clinical Neuroscience, 13(11–12), 37-41
Richardson, R., & North, M. M. (2017). Ransomware: Evolution, mitigation and prevention. International Management Review, 13(1), 10-12
Data Breach Investigations report (Verizon, 2023)
Abbas, A., Bilal, K., Zhang, L., & Khan, S. U. (2015). A cloud-based health insurance plan recommendation system: A user centered approach. Future Generation Computer Systems, 43(1), 99–109
Menu