Author:
C. Miller Andrew,M. Khan Abbas,Ziad Sophia
Abstract
Healthcare is among the leading industries targeted by cyber-criminals. Ransomware exploits vulnerabilities to hijack target information technology (IT) infrastructures for monetary gain. Due to the nature and value of information, access to medical information enables cyber-criminals to commit identity theft, medical fraud, and extortion, and illegally obtain controlled substances. The utility and versatility of medical information, extensive centralized storage of medical information, relatively weak IT security systems, and the expanding use of healthcare IT infrastructure all contribute to an increase in cyber-attacks on healthcare entities. Research suggests that an individual’s medical information is 20–50 times more valuable to cyber-criminals than personal financial information. As such, cyber-attacks targeting medical information are increasing 22% per year. This chapter explores the history of ransomware attacks in healthcare, ransomware types, ransom payment, healthcare vulnerabilities, implications for international health security, and means of institutional protection.
Reference41 articles.
1. Kruse CS, Frederick B, Jacobson T, Monticone DK. Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology and Health Care. 2017;25(1):1-10. DOI: 10.3233/THC-161263
2. Chernyshev M, Zeadally S, Baig Z. Healthcare data breaches: Implications for digital forensic readiness. Journal of Medical Systems. 2018;43(1):7. DOI: 10.1007/s10916-018-1123-2
3. Coventry L, Branley D. Cybersecurity in healthcare: A narrative review of trends, threats and ways forward. Maturitas. 2018;113:48-52. DOI: 10.1016/j.maturitas.2018.04.008
4. Spence N, Bhardwaj N, Paul DP, Coustasse A. Ransomware in healthcare facilities: A harbinger of the future? Perspectives in Health Information Management. 2018:15(Summer):1-22
5. Cook S. 2017-2019 Ransomware statistics and facts. Comparitech [Internet]. 2019. Available from: https://www.comparitech.com/antivirus/ransomware-statistics/ [Accessed: 18 November 2017]
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献