Abstract
Recently, an incrementing number of cyber-attacks in the medical field have resulted in great losses. In the health care industry, since medical information plays an essential role in human health. To prevent from these types of cyber attacks, there are various steps are taken by Hospital Institute Management Systems (HIMS) regarding to its security which is also called cyber security as it is related to computer technology. In response, we have been discussing this misconduct and trying to increase the awareness of researchers, but it seems that there is a lack of research that presents guidelines for editors to help them protect themselves against these threats In this paper, we understand more about cyber security in medical field and a brief overview of cyber securities is presented along with building of cyber securities is explained for the better understanding. We then explain the details involved in each type of attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
C. Peng, M.M. Hossain, Cyber-physical security for ongoing smart grid initiatives: a survey. IET Cyber Phys. Syst. Theor. Appl. https://doi.org/10.1049/iet-cps.2019.0039 (2020)
Security for industrial cyber-physical systems, in 2018 IEEE Industrial Cyber-Physical Systems (ICPS). https://doi.org/10.1109/icphys.2018.8390806 (2018)
J. Chen, Q. Zhu, Security as a service for cloud-enabled internet of controlled things under advanced persistent threats: a contract design approach. IEEE Trans. Inf. Forensics Secur. 12(11), 2736–2750 (2017). https://doi.org/10.1109/tifs.2017.2718489
F. Li, Y. Shi, A. Shinde, J. Ye, W. Song, Enhanced cyber-physical security in internet of things through energy auditing. IEEE Internet Things J. 6(3), 5224–5231 (2019). https://doi.org/10.1109/jiot.2019.2899492
M. Span, L.O. Mailloux, R.F. Mills, W. Young, Conceptual systems security requirements analysis: aerial refueling case study. IEEE Access 6, 46668–46682 (2018). https://doi.org/10.1109/access.2018.2865736
H. Orojloo, M.A. Azgomi, Modelling and evaluation of the security of cyber-physical systems using stochastic petri nets. IET Cyber Phys. Syst. Theor. Appl. 4(1), 50–57 (2019). https://doi.org/10.1049/iet-cps.2018.0008
S. Kim, Y. Won, I.-H. Park, Y. Eun, K.-J. Park, Cyber-physical vulnerability analysis of communication-based train control. IEEE Internet Things J. 6(4), 6353–6362 (2019). https://doi.org/10.1109/jiot.2019.2919066
Y. Zhang, Y. Xiang, X. Huang, A cross-layer key establishment model for wireless devices in cyber-physical systems, in Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security—CPSS 17. https://doi.org/10.1145/3055186.3055187 (2017)
T. Varshney, N. Sharma, I. Kaushik, B. Bhushan, Architectural model of security threats and their countermeasures in IoT, in 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). https://doi.org/10.1109/icccis48478.2019.8974544 (2019)
V. Venkataramanan, A. Hahn, A. Srivastava, CP-SAM: cyber-physical security assessment metric for monitoring microgrid resiliency. IEEE Trans. Smart Grid 11(2), 1055–1065 (2020). https://doi.org/10.1109/tsg.2019.2930241
X. Li, K.W. Hedman, Enhancing power system cyber-security with systematic two-stage detection strategy. IEEE Trans. Power Syst. 35(2), 1549–1561 (2020). https://doi.org/10.1109/tpwrs.2019.2942333
I. Kaushik, N. Sharma, N. Singh, Intrusion detection and security system for blackhole attack, in 2019 2nd International Conference on Signal Processing and Communication (ICSPC). https://doi.org/10.1109/icspc46172.2019.8976797 (2019)
S. Mili, N. Nguyen, R. Chelouah, Transformation-based approach to security verification for cyber-physical systems. IEEE Syst. J. 13(4), 3989–4000 (2019). https://doi.org/10.1109/jsyst.2019.2923818
A. Sharma, A. Singh, N. Sharma, I. Kaushik, B. Bhushan, Security countermeasures in web based application, in 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). https://doi.org/10.1109/icicict46008.2019.8993141 (2019)
A. Ahmed, V.V.G. Krishnan, S.A. Foroutan, M. Touhiduzzaman, A. Srivastava, Y. Wu, S. Sindhu et al. Cyber physical security analytics for anomalies in transmission protection systems, in 2018 IEEE Industry Applications Society Annual Meeting (IAS). https://doi.org/10.1109/ias.2018.8544672 (2018)
P. Sinha, A.K. Rai, B. Bhushan, Information security threats and attacks with conceivable counteraction, in 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). https://doi.org/10.1109/icicict46008.2019.8993384 (2019)
A. Ahmed, V.V.G. Krishnan, S.A. Foroutan, M. Touhiduzzaman, C. Rublein, A. Srivastava, S. Suresh et al., Cyber physical security analytics for anomalies in transmission protection systems. IEEE Trans. Ind. Appl. 55(6), 6313–6323 (2019). https://doi.org/10.1109/tia.2019.292850
S. Soni, B. Bhushan, Use of machine learning algorithms for designing efficient cyber security solutions, in 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). https://doi.org/10.1109/icicict46008.2019.8993253 (2019)
Comparative analysis of 3-D password using various techniques. Int. J. Emerg. Technol. Innov. Res. 6(6), 711–718. ISSN 2349-5162, www.jetir.org (2019)
B. Bhushan, G. Sahoo, Requirements, protocols, and security challenges in wireless sensor networks: an industrial perspective. in Handbook of Computer Networks and Cyber Security, pp. 683–713. https://doi.org/10.1007/978-3-030-22277-2_27 (2020)
A. Carelli, A. Vallero, S.D. Carlo, Performance monitor counters: interplay between safety and security in complex cyber-physical systems. IEEE Trans. Device Mater. Reliab. 19(1), 73–83 (2019). https://doi.org/10.1109/tdmr.2019.2898882
B. Bhushan, G. Sahoo, Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks. Wirel. Pers. Commun. 98(2), 2037–2077 (2017). https://doi.org/10.1007/s11277-017-4962-0
M. Evans, Y. He, C. Luo, I. Yevseyeva, H. Janicke, E. Zamani, L.A. Maglaras, Real-time information security incident management: a case study using the IS-CHEC technique. IEEE Access 7, 142147–142175 (2019). https://doi.org/10.1109/access.2019.2944615
Aditya Khamparia, Babita Pandey, A novel method of case representation and retrieval in CBR for e-learning. Edu. Inform. Technol. 22(1), 337–354 (2015). https://doi.org/10.1007/s10639-015-9447-8
A. Nourian, S. Madnick, A systems theoretic approach to the security threats in cyber physical systems applied to Stuxnet. IEEE Trans. Dependable Sec. Comput. 15(1), 2–13 (2018). https://doi.org/10.1109/tdsc.2015.2509994
P. Sinha, V.K. Jha, A.K. Rai, B. Bhushan, Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: a survey, in 2017 International Conference on Signal Processing and Communication (ICSPC). https://doi.org/10.1109/cspc.2017.8305855 (2017)
Y. Cui, F. Bai, Y. Liu, Y. Liu, A measurement source authentication methodology for power system cyber security enhancement. IEEE Trans. Smart Grid 9(4), 3914–3916 (2018). https://doi.org/10.1109/tsg.2018.2826444
Y. Liu, A. Liu, X. Liu, M. Ma, A trust-based active detection for cyber-physical security in industrial environments. IEEE Trans. Ind. Inf. 15(12), 6593–6603 (2019). https://doi.org/10.1109/tii.2019.2931394
A. Singh, A. Sharma, N. Sharma, I. Kaushik, B. Bhushan, Taxonomy of attacks on web based applications, in 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). https://doi.org/10.1109/icicict46008.2019.8993264 (2019)
A.K.. Luhach, A. Khamparia, R. Sihag, R. Kumar, Honey bee optimization based sink mobility aware heterogeneous protocol for wireless sensor network. Scalable Comput. Prac. Exp. 20(4), 591–598 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Bhardwaj, J., Gautam, S., Yadav, H., Tyagi, N., Abidin, S. (2021). Taxonomy of Cyber Security in Medical Science. In: Tavares, J.M.R.S., Chakrabarti, S., Bhattacharya, A., Ghatak, S. (eds) Emerging Technologies in Data Mining and Information Security. Lecture Notes in Networks and Systems, vol 164. Springer, Singapore. https://doi.org/10.1007/978-981-15-9774-9_36
Download citation
DOI: https://doi.org/10.1007/978-981-15-9774-9_36
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9773-2
Online ISBN: 978-981-15-9774-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)