CFP last date
20 May 2024
Reseach Article

A Review on Data Breaches in Healthcare Security Systems

by Jahnavi Reddy, Nelly Elsayed, Zag ElSayed, Murat Ozer
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 45
Year of Publication: 2023
Authors: Jahnavi Reddy, Nelly Elsayed, Zag ElSayed, Murat Ozer
10.5120/ijca2023922333

Jahnavi Reddy, Nelly Elsayed, Zag ElSayed, Murat Ozer . A Review on Data Breaches in Healthcare Security Systems. International Journal of Computer Applications. 184, 45 ( Feb 2023), 1-7. DOI=10.5120/ijca2023922333

@article{ 10.5120/ijca2023922333,
author = { Jahnavi Reddy, Nelly Elsayed, Zag ElSayed, Murat Ozer },
title = { A Review on Data Breaches in Healthcare Security Systems },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2023 },
volume = { 184 },
number = { 45 },
month = { Feb },
year = { 2023 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number45/32603-2023922333/ },
doi = { 10.5120/ijca2023922333 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:23:58.525378+05:30
%A Jahnavi Reddy
%A Nelly Elsayed
%A Zag ElSayed
%A Murat Ozer
%T A Review on Data Breaches in Healthcare Security Systems
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 45
%P 1-7
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Providing security to Health Information is considered the topmost priority compared to any other field. After digitalizing patients records in the medical field, the healthcare/medical field has become a victim of several internal and external cyberattacks. Data breaches in the healthcare industry have been increasing rapidly. Despite having security standards such as HIPAA (Health Insurance Portability and Accountability Act), data breaches still happen on a daily basis. All various types of data breaches have a similar harmful impact on healthcare data, especially on patients

References
  1. Shohan database, 2020.
  2. Victor Adewopo, Bilal Gonen, Nelly Elsayed, Murat Ozer, and Zaghloul Saad Elsayed. Deep learning algorithm for threat detection in hackers forum (deep web). arXiv preprint arXiv:2202.01448, 2022.
  3. Steve Alder. Ransomware Attacks Reported by North Shore Pain Management and Florida Orthopaedic Institute. 2020.
  4. Steve Alder. Healthcare Data Breach Statistics, 2021.
  5. Richard J Barnett and Barry Irwin. Towards a taxonomy of network scanning techniques. In Proceedings of the 2008 annual research conference of the South African Institute of Computer Scientists and Information Technologists on IT research in developing countries: riding the wave of technology, pages 1–7, 2008.
  6. Joel Brenner. Iso 27001 risk management and compliance. Risk management, 54(1):24–29, 2007.
  7. Matthew D Byrne. Cybersecurity and the new age of ransomware attacks. Journal of PeriAnesthesia Nursing, 36(5):594–596, 2021.
  8. Ruveyda Celik and Ali Gezer. Behavioral analysis of Trickbot banking trojan with its new tricks. Int. J. Technol. Eng. Stud, 5:95–105, 2019.
  9. Qian Chen, Jonathan Lambright, and Sherif Abdelwahed. Towards autonomic security management of healthcare information systems. In 2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), pages 113–118. IEEE, 2016.
  10. Yu Cheng, Alberto Leon-Garcia, and Ian Foster. Toward an autonomic service management framework: A holistic vision of soa, aon, and autonomic computing. IEEE Communications Magazine, 46(5):138–146, 2008.
  11. Veronica Combs. The five biggest cybersecurity threats for the healthcare industry, 2020.
  12. Sanchari Das, Bingxing Wang, Andrew Kim, and L Jean Camp. Mfa is a necessary chore!: exploring user mental models of multi-factor authentication technologies. 2020.
  13. Jessica Davis. Magellan Health Data Breach Victim Tally Reaches 365K Patients. https://healthitsecurity.com/news/magellan-health-databreach- victim-tally-reaches-365k-patients, 2020.
  14. Marc J Dupuis and Samantha Smith. Clickthrough testing for real-world phishing simulations. In Proceedings of the 21st Annual Conference on Information Technology Education, pages 347–347, 2020.
  15. A Craig Eddy. The effect of the health insurance portability and accountability act of 1996 (hipaa) on health care fraud in montana. Mont. L. Rev., 61:175, 2000.
  16. Jesse M Ehrenfeld.Wannacry, cybersecurity and health information technology: A time to act. Journal of medical systems, 41(7):104, 2017.
  17. Martin Eling and Nicola Loperfido. Data breaches: Goodness of fit, pricing, and risk measurement. Insurance: mathematics and economics, 75:126–136, 2017.
  18. Mike Gibbs and Howard Quillen. The medical-grade network: Helping transform healthcare. Cisco White Paper, 2008.
  19. Olivia Haring, Sylvia Worlali Azumah, and Nelly Elsayed. A review of network evolution towards a smart connected world. arXiv preprint arXiv:2105.13964, 2021. Nihad A Hassan. Ransomware families. In Ransomware Revealed, pages 47–68. Springer, 2019.
  20. Kimmo Hiltunen. Wlan attacks and risks. White Paper, Ericson, 2008.
  21. Michael Howard and Bryan Sullivan. Test your security iq. MSDN magazine, page 46, 2008.
  22. Ahmed Ibrahim, Craig Valli, Ian McAteer, and Junaid Chaudhry. A security review of local government using nist csf: a case study. The Journal of Supercomputing, 74(10):5171–5186, 2018.
  23. A. Jayanthilladevi, K. Sangeetha, and E. Balamurugan. Healthcare biometrics security and regulations: Biometrics data security and regulations governing phi and hipaa act for patient privacy, 2020.
  24. Katharina Krombholz, Heidelinde Hobel, Markus Huber, and Edgar Weippl. Advanced social engineering attacks. Journal of Information Security and applications, 22:113–122, 2015.
  25. Shivansh Kumar, Aman Kumar Bharti, and Ruhul Amin. Decentralized secure storage of medical records using blockchain and ipfs: A comparative analysis with future directions. Security and Privacy, 4(5):e162, 2021.
  26. Ridho Surya Kusuma, Rusydi Umar, and Imam Riadi. Network forensics against ryuk ransomware using trigger, acquire, analysis, report, and action (taara) method. Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, 2021.
  27. Monica Lareau. Trinity Health Report. Technical report, Trinity Health, Trinity, 2020.
  28. Yair Levy and Ruti Gafni. Introducing the concept of cybersecurity footprint. Information and Computer Security, 2021.
  29. Lexigram. Security Standards in Healthcare. https://www.lexigram.io/lexipedia/security-standards-inmedicine/.
  30. Savita Mohurle and Manisha Patil. A brief study of wannacry threat: Ransomware attack 2017. International Journal of Advanced Research in Computer Science, 8(5):1938–1940, 2017.
  31. K. J. Nahra. Hipaa security enforcement is here. IEEE Security Privacy, 6(6):70–72, 2008.
  32. Tembisa G Ngqondi. The iso/iec 27002 and iso/iec 27799 information security management standards: A comparative analysis from a healthcare perspective. Port Elizabeth: Nelson Mandela Metropolitan University, 2009.
  33. Aleksandr Ometov, Sergey Bezzateev, Niko M¨akitalo, Sergey Andreev, Tommi Mikkonen, and Yevgeni Koucheryavy. Multi-factor authentication: A survey. Cryptography, 2(1):1, 2018.
  34. Fragkiskos Papadopoulos, Constantinos Psomas, and Dmitri Krioukov. Network mapping by replaying hyperbolic growth. IEEE/ACM Transactions on Networking, 23(1):198–211, 2014.
  35. M. Puppala, T. He, X. Yu, S. Chen, R. Ogunti, and S. T. C. Wong. Data security and privacy management in healthcare applications and clinical data warehouse environment, 2016.
  36. Tracy Rock. U.S. Hospitals on High Alert for “Imminent” Ransomware Threat, 2020.
  37. Adil Hussain Seh, Mohammad Zarour, Mamdouh Alenezi, Amal Krishna Sarkar, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan. Healthcare data breaches: Insights and implications. In Healthcare, volume 8, page 133. Multidisciplinary Digital Publishing Institute, 2020.
  38. Adil Hussain Seh, Mohammad Zarour, Mamdouh Alenezi, Amal Krishna Sarkar, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan. Healthcare Data Breaches: Insights and Implications. Healthcare, 8(2):133, 2020.
  39. F Spagnoli, S van der Graaf, and A Smets. Behaviour monitoring in context: a methodology for measuring the impact of the human factor on smart cities big data and technologies. Measuring Behavior 2018. Lynne Terry. Data Breach Affects 650,000 Medicaid Members In Portland Area. 2020.
  40. AK Tjan. How leaders become self-aware. ed. Harvard Business Review. Tobin, DR, 1997. John Wack, Ken Cutler, and Jamie Pole. Guidelines on firewalls and firewall policy. Technical report, BOOZ-ALLEN AND HAMILTON INC MCLEAN VA, 2002.
Index Terms

Computer Science
Information Sciences

Keywords

Data Breaches Healthcare System Cybersecurity Security Challenges