Cyber Threats in the Healthcare Sector and Countermeasures

Cyber Threats in the Healthcare Sector and Countermeasures

Muhammad Mashhood Ahmed, Leandros Maglaras, Mohamed Amine Ferrag
ISBN13: 9781799836483|ISBN10: 1799836487|ISBN13 Softcover: 9781799836490|EISBN13: 9781799836506
DOI: 10.4018/978-1-7998-3648-3.ch007
Cite Chapter Cite Chapter

MLA

Ahmed, Muhammad Mashhood, et al. "Cyber Threats in the Healthcare Sector and Countermeasures." Entrepreneurial Development and Innovation in Family Businesses and SMEs, edited by Andreas Masouras, et al., IGI Global, 2020, pp. 109-124. https://doi.org/10.4018/978-1-7998-3648-3.ch007

APA

Ahmed, M. M., Maglaras, L., & Ferrag, M. A. (2020). Cyber Threats in the Healthcare Sector and Countermeasures. In A. Masouras, G. Maris, & A. Kavoura (Eds.), Entrepreneurial Development and Innovation in Family Businesses and SMEs (pp. 109-124). IGI Global. https://doi.org/10.4018/978-1-7998-3648-3.ch007

Chicago

Ahmed, Muhammad Mashhood, Leandros Maglaras, and Mohamed Amine Ferrag. "Cyber Threats in the Healthcare Sector and Countermeasures." In Entrepreneurial Development and Innovation in Family Businesses and SMEs, edited by Andreas Masouras, Georgios Maris, and Androniki Kavoura, 109-124. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-3648-3.ch007

Export Reference

Mendeley
Favorite

Abstract

Healthcare is one of the most targeted industries by cybercriminals. The healthcare sector is far behind in cybersecurity as compared to other organizations. The vulnerabilities in the system open the door for cybercriminals to exploit it and get unauthorized access into the system or network to do a malicious activity. Healthcare should have to take cyber threats seriously and follow a security framework that detects and mitigates cyber threats. This chapter presents all cyber threat actors that exist in the healthcare sector, common cyber-attacks that can be launched against all actors, and real incidents that took place during the past years. Based on these, the authors propose in a tabular form a set of recommendations that can be used as countermeasures against any type of attack.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.