E-health Security: Application, Issues, and Solutions
Verified
Added on 2023/01/06
|8
|2776
|88
AI Summary
This assignment discusses the application of e-health security in the healthcare industry, the main security issues faced, and provides effective solutions to protect data and networks. It highlights the importance of firewall, anti-virus software, strong passwords, two-factor authentication, and data encryption.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
E-health security Table of Contents
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Topic: E-health security (security in new computing area).............................................................1 INTRODUCTION...........................................................................................................................1 MAIN REPORT BODY..................................................................................................................1 Application.............................................................................................................................1 Security issues........................................................................................................................2 Security solution.....................................................................................................................4 CONCLUSION................................................................................................................................5 REFERENCES................................................................................................................................6
Topic: E-health security (security in new computing area) INTRODUCTION Advancementinsectorofinformationandcommunicationtechnologyhasleadto development and use of computer technology in many new computing areas which comprises of healthcare industry also [Ida, Jemai and Loukil, 2016]. The term e-health is mainly associated with the use of digital technologies and other telecommunication devices like computers, internet and mobile devices to facilitate improved and better health care services. Thus, e-health security has become a vital concept as implementation of electronic health records system and use of other digital platforms in heath industry has enhanced the security and network threats and issues [Security and Privacy in eHealth: Is it possible?,2020]. The current assignment is based on e- health security and its application along with discussion about its unique features. Further, an evaluation of main security issues exists in e-heath security related with network security and hacking is also included along with security solutions to overcome described hacking and network security issues. MAIN REPORT BODY Application The ongoing advancement and betterment of information and communication technology has brought use of computers in many new computing areas which has improved the services in all sector of world. The advancement and innovation in information and communication sector has lead to development of a new computing area i.e. electronic health (e-health). In order to provide best possible and more efficient services to customer’s adoption and application of e- health is numerous and beneficial as it lead to full and better utilisation of innovation in cloud based environment [Gerson and Shava, 2020].To have improvement in communication and coordination of various electronic health information like medical research laboratories, hospital, health insurance firms adoption and application of e-health is vital and allows and leads to more effective and better processing, recording and sharing of health information. The key features and utility of computing and use of e-health techniques comprises of leading better organisation and security at hospitals and within health care services. Without use of computers the record and information is stored in filing cabinets which were difficult to store and retire when needed thus, medical computers and e-health devices provides a more effective 1
computer system and cloud network to store all sensitive and needed information about the patients and other related data. Thus, e-health security system leads to maintain the smooth flow of operation at by use of medical computer carts and other devices. Apart from this, the key feature of E-health comprises of use of medical carts and computer to have better patient care as it enable mobile medical facilities and solid heath care professional to ensure all round patient care. Thus, an evaluation can be made that use of e-health facilitates and lead to enhanced access, control, better surveillance and other alarming and recording and sharing of data to ensure better health facilities and services for patients [Sahi, Lai and Li, 2016]. But with the use of e-health facilities the need and importance of E-security has also enhanced to addresses the security of a company along with locating and maintaining its vulnerabilities and also supervises the mechanisms implemented to protect the on-line services provided by the company and makes and tries to keep its crucial information safe from the hackers, malicious users and other intruders from getting and making use of private company's networks, computers and services. Security issues It has been evaluated that the most unique feature and exclusive application of e-health comprises of better storing and recording of data on cloud environment which facilitates more easy and simper retrieving of needed information about patient history and other crucial information. Despite having the advantages of effective storing and retrieving of data many security and privacy challenges and issues are also associated with application of e-health which deserve more attention and full scale utilisation [Jahan, Chowdhury and Islam, 2017]. In many cases, Cryptographic and non-cryptographic approaches are used and adopted by organisation to ensure preservation of security and privacy threats for health data preset and stored in the cloud computing. Apart from this, risk of hacking and theft of e-health data is also high which might be because of Security issues related to network security or system used by organisation. The main security threats and issues related with storing of data in could environment and allocation of e- helath is discussed and evaluated as below: Issuesofcodeinjectionanddatabreach-Themainsecurityissuesfacedduring application of e-health was related with exploitation of vulnerabilities in application inserted by the hackers to leadmalicious code in application. These vulnerability is found in form of text input fields like username which is known as SQL injection attack which effects operating system command and dynamic evaluation attack. This type of code injection attack and issues 2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
leads to stolen and theft of credentials, loss of control over sever and network along with destroyeddata.Furthers,compromisedcredentialsovernetworkandsoftwaremiss- configuration would also cost and resulted in form of data breaches which is associated with leak and theft of relevant and crucial information which is the biggest security issues and threat faced by application of e-health [Edemacu, Jang and Kim, 2020]. Malware injection through distributed denial of service attack-Most of the e-health organisation are unaware with the security issues lead by malware which comprises and lead to email scam as main vector of malware attack. This security threats can be lead by a range of resources which are needed to prevented from infection as an infected system or malware could completely scrubbed the network system and used application which means identification of hidden codes and self replication of software which can hamper or hazard for network system during application of e-health system and lead to big security issues [Giaffreda, Capra and Antonelli, 2016]. Apart from this, malware attack is sometime also associated with distributed denial of services attack which generally involves and include a group of computers which are being harnessed and connected together by a hacker to flood the target and breach the information through becoming a part of general traffic of network which resulted in form of theft of secretes code and information. Issue of Phishing and hacking- One of the most common security issues faced by health industry or any there network is associated with phishing scam which is a common form of cyber attack. Under process and issues of phishing a hacker or malicious user make use of fraudulent emails or texts or any other copy cat websites to get access to the valuable personal information which might comprises of account numbers, Social Security numbers, or your login IDs and passwords of patients and doctors. Phishingas a security issues leads to false sense of security by spoofing any familiar or trusted logos and established and legitimised companies through which they can pretend to be the friend or family member to hack or theft crucial or relevant information over system network. Bessie this, Hacking of information is also a big issue and security threatfaced by e-health which isassociatedwith the activitieslead to seek to compromise and lead malware in digital devices with the main motto and aim of leaking or theft of crucial information over network [Tai, Chang and Lo, 2019]. Issues of broken network and authentication-This security issues is associated with various pitfalls like URL might consist of an information of session ID and leak of which could 3
refer header to someone else which lead to theft of data or breach of security. The another reason for broken authentication or break of security network might comprises of lack of encrypted password eitherat storage or in transit which again leads to security issues and vulnerability of crucial data. Apart from this, session hijacking along with session fixation which lead to timeouts and not implemented properly which is again a main cause and reason behindIssues of broken network and authentication which hampers and effect the flow of e-health data and leads to security issues in network system which might result in breach of information. Security solution As many security issues associated with malware and Issues of broken network and authentication is faced by organisation which lead to risk of hacking and theft of e-health data which could be risk and hazardous for a firm especially in health care industry as information about patients and there personal data are at high risk of theft and hacking (Mamun and Rana, 2017). Therefore, effective security and enhanced network security is needed before application of e-heath to ensure safety and maintain protection and privacy of data over system network and in cloud environment. Some of these security solution which can be adopted for protection of e- health data are discussed and evaluated as below: Use of Firewall-Use of firewall is most viable security device to protect or safeguard a network from security issues through filtering traffic in network and also leads to blocking of outsiders to ensure check of unauthorised and malicious users from gaining unauthorised access to the private and crucial information stored over the network [6 Proven Ways to Secure a Computer Network, 2019].Firewall is mainly having a two major computer operating system which has built in a firewall to monitor both incoming and outgoing of information on network traffic and on the basis of this scanning and set rules it permits and block data on the basis of their authorisation. Thus, use of firewall establish a barrier between authorised and unauthorised network to safe guard crucial e-health information and data from malicious traffic and security threats like viruses and hackers. Thus, while application of e-health services the health care industry needs to make sure that the firewall is should be enabled before they go online or make use of cloud networking. Further, to protect crucial e-health information and data use of some hardware firewall like Cisco, Sophos or Fortinet is also suggested as security solution to protect data from breach of network and hacking. 4
Installation of anti-virus software- A major role is played by anti-virus software in protecting a computer system and network by detecting and stopping real-times threats and security issues to keep online data safe and secure. Viruses like keyloggers and Trojans are commonly found in an online network that can only be removed or minimized by making use of anefficientanti-virussystemsuchasPandaCloudAntivirus,Bitdefender,Avastor Malwarebytes which helps in immunizing a computer network from unauthorised codes and software that are threat for operating system and leads to many security issues [William, 2017]. Thus, adoption and initialisation of an efficient anti- virus system is a vital security solution for health care industry to protect its e-health data from virus and hacking and at the same time the new and advanced anti-virus software are also providing feature of automatic updates thus, protecting network from new virus and security threats. Use of strong password and two factor authentication along with encryption of data- the anther way to keep online data safe is making use of strong password that is difficult to de-code by hackers thus, prevent and protect data from being stolen or hacked. Beside this, two factor authentication leads to double security for e-health data by the way of leading a numerical code in addition to password before every logging thus, provided more safety to information from outside world. Along with this, use of encryption is also helpful and vital security solution for health care industry to prevent hackers from accessing and making unauthorised use of online data and information through storing it in encrypted and code from thus, protect in online data from all kind of security issues and threat[Lokshina and Lanting, 2018]. CONCLUSION On the basis of above assignment a conclusion can be drawn that advancement and improvement in computer technology leads to computing in many new areas which comprises of e-health also to ensure more efficient services and facilities. In has been also evaluated that apart from many benefits some security issues and threat associated with breach of data and network along with Malware injection, Issue of Phishing and hacking together with Issues of broken network and authentication is also faced. At last, a summarisation could also be made that many security solution line use of firewall, installation of anti-virus software and use of encrypted data to safe guard e-health information from threats of hacking and other security issues. 5
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
REFERENCES Books and journal K. Edemacu, B. Jang and J. W. Kim, “Collaborative eHealth Privacy and Security: An Access Control with Attribute Revocation based on OBDD Access Structure”.IEEE Journal of Biomedical and Health Informatics. 2020. N. Gerson, and F. B. Shava, “A Review of Security System Assessment Tools Suitable for eHealth in Namibia”. InInternational Conference on Cyber Warfare and Security(pp. 569-XIV). Academic Conferences International Limited. 2020. R. Giaffreda, L. Capra and F. Antonelli,. A pragmatic approach to solving IoT interoperability and security problems in an eHealth context. In2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).2016, December. (pp. 547-552). ieee. Ida, I.B., Jemai, A. and Loukil, A., 2016, December. “A survey on security of IoT in the context of eHealth and clouds”. In2016 11th International Design & Test Symposium (IDT)(pp. 25-30). IEEE.' S. Jahan, M. Chowdhury and R. Islam, “Robust fingerprint verification for enhancing security in healthcare system”. In2017 International Conference on Image and Vision Computing New Zealand (IVCNZ)(pp. 1-5). IEEE. 2017, December. I. V. Lokshina and C. J. Lanting, “Qualitative evaluation of IoT-driven eHealth: KM, business models,deploymentandevolution”.InternationalJournalofInterdisciplinary Telecommunications and Networking (IJITN). 2018.10(4). pp.26-45. Q. Mamun and M. Rana, “A robust authentication model using multi-channel communication for ehealth systems to enhance privacy and security”. In2017 8th IEEE Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)(pp. 255- 260). 2017, October. IEEE. A. Sahi, D. Lai and Y. Li, “Security and privacy preserving approaches in the eHealth clouds with disaster recovery plan”.Computers in biology and medicine. 2016.78. pp.1-8. W.L. Tai, Y. F. Chang and Y. L. Lo, “An anonymity, availability and security-ensured authentication model of the IoT control system for reliable and anonymous eHealth services.Journal of Medical and Biological Engineering”. 2019.39(4). pp.443-455. C. William, “22 Privacy and Security: Privacy of Personal eHealth Data in Low-and Middle- Income Countries.Global Health Informatics: Principles of EHealth and MHealth to Improve Quality of Care”, 2017. p.269. Online: “6ProvenWaystoSecureaComputerNetwork”.2019.[Online]AvailableThrough:< https://www.gflesch.com/elevity-it-blog/ways-to-secure-a-computer-network >. “Securityand Privacyin eHealth:Isit possible?”.2020.[Online]AvailableThrough:< https://ieeexplore.ieee.org/document/6720676 >. 6