Determining Internal and External Risks in a Medical Center
DOI:
https://doi.org/10.6000/1929-4409.2025.14.01Keywords:
Risk, Cybersecurity, Threat, Attack, Vulnerability, Artificial intelligence (AI), Cloud, HealthcareAbstract
An enterprise stores information in the cloud providing virtual storage of data as virtual memory. Cloud increases the enterprise’s ability to offer data and service delivery, however it also increases the chances of a cybersecurity threat, and cyber risks, and increases the vulnerability of the enterprise to risks. It is important for the organization to perform risk management to determine cybersecurity risks. Cybersecurity is a key need for hospitals to manage threats of all types. Healthcare is notoriously vulnerable to cyber-attacks due to the valuable nature of patient information and the lack of updated medical equipment. In this paper, we discuss medical applications in cybersecurity, AI's role in cybersecurity, and risk management in medical cybersecurity.
References
Albahar, M. (2019). Cyber attacks and terrorism: A twenty-first century conundrum. Science & Engineering Ethics, 25(4), 993–1006. DOI: https://doi.org/10.1007/s11948-016-9864-0
Burke, G., & Saxena, N. (2021). Cyber risks prediction and analysis in medical emergency equipment for situational awareness. Sensors, 21(16), 5325. DOI: https://doi.org/10.3390/s21165325
Coppolino, L., Sgaglione, L., D’Antonio, S., Magliulo, M., Romano, L., & Pacelli, R. (2022). Risk assessment driven use of advanced SIEM technology for cyber protection of critical e-health processes. SN Computer Science, 3, 1-13. DOI: https://doi.org/10.1007/s42979-021-00858-4
Dumitrescu Mihaela-Sorina, Paraschiv Dorel, Nițu Maria, & Florea Oana. (2020). Innovation and the evolution of cyber security Tools. Junior Scientific Researcher, 6(1), 64–71.
Fowler, C., Goffin, M., Hill, B., Lamourine, R., & Sovern, A. (2020). An introduction to mitre shield. Technical report. The MITRE Corporation.
Ho, S. M., & Gross, M. (2021). Consciousness of cyber defense: A collective activity system for developing organizational cyber awareness. Computers & Security, 108. DOI: https://doi.org/10.1016/j.cose.2021.102357
Kaberuka, J., & Johnson, C. (2020, June). Adapting STPA-sec for socio-technical cyber security challenges in emerging nations: A case study in risk management for Rwandan Health Care. In 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security) (pp. 1-9). IEEE. DOI: https://doi.org/10.1109/CyberSecurity49315.2020.9138863
Rosado, D. G., Santos-Olmo, A., Sánchez, L. E., Serrano, M. A., Blanco, C., Mouratidis, H., & Fernández-Medina, E. (2022). Managing cybersecurity risks of cyber-physical systems: The MARISMA-CPS pattern. Computers in Industry, 142, 103715. DOI: https://doi.org/10.1016/j.compind.2022.103715
Samhan, B. (2020). Can cyber risk management insurance mitigate healthcare providers’ intentions to resist electronic medical records?. International Journal of Healthcare Management. DOI: https://doi.org/10.1080/20479700.2017.1412558
Sheehan, B., Murphy, F., Kia, A. N., & Kiely, R. (2021). A quantitative bow-tie cyber risk classification and assessment framework. Journal of Risk Research, 24(12), 1619-1638. DOI: https://doi.org/10.1080/13669877.2021.1900337
Strom, B. E., Applebaum, A., Miller, D. P., Nickels, K. C., Pennington, A. G., & Thomas, C. B. (2018). Mitre att&ck: Design and philosophy. Technical report. The MITRE Corporation.
Truong, T. C., Diep, Q. B., & Zelinka, I. (2020). Artificial intelligence in the cyber domain: Offense and defense. Symmetry (20738994), 12(3), 410. DOI: https://doi.org/10.3390/sym12030410
Wasserman, L., & Wasserman, Y. (2022). Hospital cybersecurity risks and gaps: Review (for the non-cyber professional). Frontiers in Digital Health, 4, 862221. DOI: https://doi.org/10.3389/fdgth.2022.862221
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Policy for Journals/Articles with Open Access
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are permitted and encouraged to post links to their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
Policy for Journals / Manuscript with Paid Access
Authors who publish with this journal agree to the following terms:
- Publisher retain copyright .
- Authors are permitted and encouraged to post links to their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work .