{"title":"Classification of Security Attacks in Healthcare and associated Cyber-harms","authors":"M. Aijaz, Mohammed Nazir, Malik Nadeem Anwar","doi":"10.1109/icacfct53978.2021.9837349","DOIUrl":null,"url":null,"abstract":"The integration of various technologies into healthcare systems provide numerous benefits to end-users. However, these technologies also bring a variety of security attacks aimed at patient data, healthcare operations, and critical assets. These attacks cause harm to patients and healthcare organizations alike. However, there is a lack of appropriate methods for classifying and analyzing these attacks. This paper provides an in-depth insight into the potential attacks to the healthcare system via a taxonomy. It also discusses the associated harms, countermeasures and propagation of harms in the whole system. Overall, this research aims to increase the awareness of the stakeholders by enabling them to identify the potential security attacks, associated cyber-harms and the corresponding mitigations.","PeriodicalId":312952,"journal":{"name":"2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 First International Conference on Advances in Computing and Future Communication Technologies (ICACFCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/icacfct53978.2021.9837349","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The integration of various technologies into healthcare systems provide numerous benefits to end-users. However, these technologies also bring a variety of security attacks aimed at patient data, healthcare operations, and critical assets. These attacks cause harm to patients and healthcare organizations alike. However, there is a lack of appropriate methods for classifying and analyzing these attacks. This paper provides an in-depth insight into the potential attacks to the healthcare system via a taxonomy. It also discusses the associated harms, countermeasures and propagation of harms in the whole system. Overall, this research aims to increase the awareness of the stakeholders by enabling them to identify the potential security attacks, associated cyber-harms and the corresponding mitigations.