Posted: September 20th, 2022

Topic Approval Form

Running head:

CYBER – ATTACKS ON HEALTHCARE AND THEIR MITIGATION TECHNIQUES

1

CYBER – ATTACKS ON HEALTHCARE AND THEIR MITIGATION TECHNIQUES 1

Cyber- Attacks on Healthcare and Their Mitigation Techniques

Introduction

Information on patients must be guarded carefully because of how vulnerable it is. This is why hospitals and other medical facilities go to such great lengths to safeguard their patients’ medical records.
This
Avoid general words like this, these, those in APA Style works is also why the government has policies in place to ensure that medical care providers keep the privacy of their patients’ medical records. In order to protect patients’ privacy, various government agencies are considering enacting regulations requiring medical service providers to adhere to certain standards (Branley, 2018).

In recent years, cyber-attacks have emerged as one of the greatest dangers facing healthcare facilities today. When patient data is leaked as a result of a cyberattack, the patient’s online reputation is at risk because of the actions of malevolent third parties.

In order to protect healthcare facilities against cyber-attacks, machine learning has been deployed. The purpose of the
proposed studyis work is to employ a quantitative research methodology to assess machine learning’s effectiveness in warding off cyber-attacks on hospitals and other medical facilities. (Ayala, 2016)

Cybercriminals may find the healthcare industry enticing because of the high value of its data and the low strength of its security. Ransom ware attacks on medical equipment implanted in patients’ bodies are just one type of cyberattack that might compromise the security of a healthcare facility. Breach after breach, patients lose faith in the healthcare system, which in turn poses a threat to human life. For patient’s sake, this study aimed to determine how cyberattacks and threats affect healthcare data. The study will also includes recommendations for reducing the risk of cyberattacks and other dangers to medical records.

Problem statement

Extreme reliance on technological advancements defines the world we currently inhabit. In the medical field, as in any other, people employ technology for a wide variety of reasons and functions. The medical history of a patient is common knowledge in a hospital or clinic. The information contained in a hospital’s database might be quite extensive. Considering long-term and efficient cyber security measures is crucial because of the importance and sensitivity of this data. The effects of cyber security on patients’ data privacy and integrity are explored in this work (Coventry & Branley, 2018).

Research Question

How to enhance cyber security in healthcare to overcome cyber-attacks? RQ needs to be correlational or predictive if quantitative

One of the greatest dangers hospitals faces is cyber-security breaches. The medical industry will suffer if cyber security is not improved to prevent the theft of sensitive data. While there is no denying the seriousness of the cyber security issue, safeguards can be tightened in areas where machine learning is applied, such as the use of robust passwords to secure user data in healthcare institutions from hackers. Using questionnaires and polls, we’ll
no slang assess whether or not recent efforts to bolster cyber security have been successful.

Is this your study or an arcle reported work? Seventy-five healthcare IT professionals will beere surveyed about ways to improve cyber security. Sixty-three experts believe that hackers cannot gain access to health and medical records if proper security measures are in place, whereas seven experts believe that cyber security is configuration-based. If the equipment were not correctly implemented, a hacker would defeat the security. Five experts in the field of cyber security concluded that if given enough time, hackers could gain access to whatever data they desired. Orebamjo, 2022.
Not an APA Style cite!

As for the second
What? , it use nouns not pronouns in APA Style involved scouring the internet and library catalogs for old documents. Using this technique, I gathered 210 data points on how to improve hospital cyber security. According to the opinions of 27 industry professionals, good cyber security would be enabled by security updates and critical programming languages, which would prevent hackers from accessing the systems. Twenty-three cyber security experts agreed that security may be bolstered; yet hackers can exploit flaws in healthcare networks from a variety of angles.

Gaps in the Existing Literature

The current research has been essential in examining the public cloud’s security vulnerabilities and the effects of these concerns on cloud computing consumers and service providers. Because they increase both production and efficiency, teams are an indispensable component of modern enterprises. Therefore, switching around the members of a team can improve overall productivity. Businesses are compelled to develop innovations that are team-based and increase their productivity because the external environment is fraught with uncertainty. Additionally, TMX considers the depth of relationships formed at work as well as the interdependencies that exist between members of a team. The interpersonal relationships among team members have an effect not only on the group but also on its individual members. Aspects of this include not only how individuals on the team feel but also how they behave, as well as the general environment. In addition, this concept is employed as a gauge of team membership, which is a significant indicator of the quality of the rapport between the members of the group.

The quality of TMX is also inconsistent as a result of the fact that different members of the team contribute different material and follow various procedures. Even though they are of low caliber, TMX nevertheless have to carry out the tasks that are given to them by the captain of the squad. On the other hand, high-quality TMX requires active participation from all members of the team as well as the expression of a range of emotions, including trust and respect. It is essential, as a result, to investigate how TMX influences the creation of teams.

Methodology (qualitative) you saids above your study will be quantitative??

Narrative data will be collected and evaluated according to a qualitative research design in order to pinpoint the gap or misalignment between the requirements placed on applicants by hiring managers and the pool of qualified cyber security professionals that are currently on the market (DeCrosta, 2021). Information gathered from sites like Indeed.com and LinkedIn.com, which collect data during the screening and interview phases of the employment process, as well as from interviews with hiring managers and candidates for cyber security jobs, will make up this set of data. Interviews with candidates or feedback from job-board websites will be used to collect qualitative data on the minimum criteria established by hiring managers and the talents of rejected cyber security job applicants (DeCrosta, 2021). The goal of this type of data generation is to learn more about why employers place less value on work experience than degrees and certificates when assessing the qualifications of experienced cyber security job seekers who do not hold a four-year degree or certification in the field.

Population

Targeting fifteen to twenty cyber security specialists who are familiar with cyber security and its uses in different IT contexts will be the focus of this research.

Connection

Specializing in IT (information technology), Providing the security to the application and adopt the new technologies is one of the major roles. Doing research and learning both risks and advantages by the new technologies is my responsibility before adopting them. Organizational success depends on the availability of secure networks and the safekeeping of sensitive data, making healthcare cybersecurity a top priority. Electronic health record (EHR) systems, e-prescribing systems, start practicing managerial support structures, clinical decision support systems, radiation oncology information systems, and CPOE (computerized physician order entry) systems are just a few examples of the specialized hospital information systems used by many healthcare organizations (Ali & Alyounis, 2021). Patients should know how to safely share information with their healthcare providers. Furthermore, individuals need to know the confidentiality and safety policies as well as how to keep their data private and secure if they connect virtually with their medical providers via a telehealth platform, e-visits, encrypted messaging, or any other means.

References

Branley, D. (2018). Cybersecurity in healthcare: a narrative review of trends, threats and ways forward.
Maturitas,
113, 48-52.

Coventry, L., & Branley, D. (2018). Cybersecurity in healthcare: a narrative review of trends, threats and ways forward.
Maturitas,
113, 48-52.

Ayala, L. (2016). Cybersecurity for Hospitals and Healthcare Facilities.

Ali, K. A., & Alyounis, S. (2021, July). CyberSecurity in Healthcare Industry. In 
2021 International Conference on Information Technology (ICIT) (pp. 695-701). IEEE.

DeCrosta, J. (2021). Bridging the Gap: An Exploration of the Quantitative and Qualitative Factors Influencing the Cybersecurity Workforce Shortage. Utica College.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00