HOLISTIC SECURITY ARCHITECTURE FOR EFFECTIVE MANAGEMENT OF HEALTHCARE CYBER THREATS
Öz
Cyber security has become one of the top priorities for healthcare systems, due to the fact that the healthcare information security and personal privacy are major concerns for patients, healthcare providers and governments. The information that is incrementally available in the health records has a much longer shelf life and is a fertile and invaluable source for identity theft. The stagnant social security numbers cannot be easily canceled and medical and prescription records are permanent in the systems. Furthermore, healthcare information has a higher value than credit card information in the underground market in the dark web. There is a huge market for health insurance fraud and abuse, which may be more profitable than selling the records honestly in the forums. There are common but seriously increasing threats, which can be exploit healthcare information, is becoming compromised or stolen outright, when patient health records are being digitized. The abuses of health data such as DNA information is the most critical since it can be used for possible targeted biological weapons or certain targeted artificial diseases. The aim of this study is to provide a framework for future research by identifying concept of security and cyber threats in the healthcare systems.
Anahtar Kelimeler
Kaynakça
- Abbas A., Khan US., (2014), A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds, IEEE Journal of Biomedical and Health Informatics, Vol. 18, No. 4, July
- Adam David, (2004), https://www.theguardian.com/science/2004/oct/28/thisweekssciencequestions.weaponstechnology, last accesed on 25.06.2018
- Bioterror, (2012), https://sites.google.com/site/bioterrorbible/BIO-WEAPONS/RACE-SPECIFIC-BIO-WEAPONS, last accesed on 10.05.2018
- Cert, (2017), https://www.certtr.com/Iletisim.aspx, (Access Date: 28/05/2017).
- Cryptome, (2013), https://cryptome.org/2013/09/infosecurity-cert.pdf, (Access Date: 28/05/2017).
- EC, (2018), http://ec.europa.eu/justice/data-protection/reform/files/regulation_oj_en.pdf, last accesed on 35.03.2018
- Efe, A, (2015), COBIT-5 Framework As A Model For The Regional Development Agencies. International Journal of Ebusiness And Egovernment Studies, 33-43.
- Efe, A. (2016), Unearthing and Enhancing Intelligence and Wisdom Within the COBIT 5 Governance of Information Model. ISACA Journal.
Ayrıntılar
Birincil Dil
İngilizce
Konular
-
Bölüm
Araştırma Makalesi
Yayımlanma Tarihi
31 Ağustos 2018
Gönderilme Tarihi
5 Haziran 2018
Kabul Tarihi
11 Ağustos 2018
Yayımlandığı Sayı
Yıl 2018 Cilt: 4 Sayı: 2