Information System: Healthcare System Research Paper 2022
Verified
Added on 2022/09/28
|11
|3717
|24
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
INFORMATION SYSTEM: HEALTHCARE SYSTEM Student’s Name Institutional Affiliation City Email Abstract-The advancement in information system has seen healthcareorganizationturntohealthinformation technology(HIT)toimprovecareservicedelivery. However,withtheintroductionofdifferenthealth information technology systems healthcare organizations have become prone to cyberattacks. Cybercriminals have seen healthcare organizations as a soft landing place to stealpersonalinformation.Thispaperdiscussabout commonsecuritythreatsfacinghealthcaresystems, analysis of security requirements put in place to counter these security threats in healthcare organizations and lastly conclusionregardingsecuritysysteminhealthcare industry. Keywords-healthinformationtechnology, cybercriminals, security threats, healthcare, healthcare system and cyberattacks. I.INTRODUCTION Over the past decade or so information systems in healthcare have become increasingly advanced as well as the ever-growing variety of capabilities have resulted into thewidespreadusageofthesesystemsintheentire healthcareindustry.Generally,theusageofcertain information management level has turn out to be nearly universalamongsthealthcareamenities,providersand healthsystems.Healthinformationsystem(HIS)isa system that has been designed to accomplish healthcare data and information. This comprises systems that collect, manage,storeandconveypatient’selectronicmedical records (ERM) [4]. The health information technology is the technological field that is majorly concern with the development of health information systems. Some of the healthcare information systems include Electronic Medical Record (EMR) and Electronic Health Records (EHR) Practice Management Software(PMS),MasterPatientIndex(MPI),Remote PatientMonitoring(RPM),patientportal,andClinical Decision Support (CDS). Theintroductionofhealthinformationsystemsinthe healthcare industry tend to target data management and improveefficiency.Consequently,themajorbenefits associated with healthcare information systems include data analytics, collaborative care population health management and cost control among others [5]. In light of this statement, this paper provides a security analysis related to healthcare system. The paper focus on two security models STRIDE and DREAD by identifying the security threats related to
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
healthcare system, provide a list security requirements to counter healthcare system threats using STRIDE model. The paper then analyses the risk posed by each threat to the healthcare system using DREAD model. Lastly, the paper measures the overall risks of the healthcare system and commends the appropriate security measures to overcome these threats. II.FIVE COMMON SECURITY THREATS Due to the crucial nature of the operations that healthcare facilities undertake it puts them on the radar of attackers. Health data and information is a highly valued resource in the cybercriminal domain, hence it makes it an objective for theft. As a result of what is at stake that is the security of patients healthcare establishments are more probable to pay ransomware burdens [6]. In this regard, the prevalent healthcare security coercions include ransomware, theft of patient data, insider threats, phishing and cryptojacking. Ransomware Recentreportsindicatethatransomwareis rapidly becoming an exhortation in the healthcare industry [2]. Ransomware is a malware type which archetypally averts healthcare organizations from retrieving some parts of their systems. For instance, the malware can block out an entity together with its users from vital networks like EHRs and they cannot be in a position to access if not they pay a specified sum of money. Unfortunately, this may possibly posemajorproblemsforahealthcarefacility’sdata security. In the recent past there has been increased cases of ransomwareattackshappeningacrosstheworld.For example,in2016,HollywoodPresbyterianMedicare Center (HPMC) fall a prey to an attack which express in code its information and averted employees from gaining access to certain parts of the infirmary system. As a result of the attack, HPMC had to pay approximately $17,000 to regain access [9]. The good news is that the hospital’s information that was stored in the EHR was not misused or accessedbyunauthorizedpersons.Theactorsinthe Hollywood Presbyterian Center Hospital attack used an open source tool known as JexBoss to search over the Internet for valuable JBoss servers. In the process the attackersmanagedtoinfectHPMChealthcaresystem. Whilethereisnodefinitiveproof,somepeoplehave speculated that that the high ransom demands observed in healthcare associated cases is a show that the cyber threat actors could have been aware of who they had exactly infected.Theeffect ofransomwarewhen ahealthcare organization is not quickly recovered could be devastating Theft of patient data According to [7] healthcare data is more valuable as compared to financial data to cybercriminals. On the same note, a report by the Trend Micro Cybercrime and Other Threats faced by the Healthcare Industry shows that stolenmedicalinsuranceidentificationcardssellfor approximately five dollaron thedark web.Therefore, hackers can use the data from the ID cards as well as other medical data to gain access to healthcare organizational documents like driver licenses that sell for up to $200 accordingtothereportbyTrendMicro.Accordingly, healthcare information and data is exceedingly important compared to credit card data since they aggregates much informationinasingleplace.Thesedataincludean
individual’svitalbackgrounddataandfinancial information hence cybercriminals find healthcare systems prime because they contain vital information needed for identity theft. In this regard, cyber criminals are advancing their tricks regarding to how they steal health data and a good example is the pseudo-ransomware [8]. The pseudo- ransomware is a malware which steal healthcare data and information by laterally moving across the systems and installing additionalspywarethat arelateron usedto benefit the criminals. Insider threats Insider threats is among the leading data security challenges facing healthcare industry. In accordance to the recentreportreleasedbyVerizonProtectedHealth Information Data Beach, approximately 60% of all the threatsactors’responsiblebreachesamonghealthcare organizations come from insiders. The main aggravator to insider treats is for financial gains. On the same note, curiosity and fun are other perpetrators of insider breaches wherebyinsideraccessdatathatisexternaltheirjob responsibilities in search of PHI on celebrities. Healthcare organization are frequently preoccupied with protecting the integrityoftheirnetworkandcompanyfromexternal threats in addressing the actual and dangerous risk that lie within their organization-insiders [3]. Insiders comprises all individuals within the healthcare organization who have access to healthcare systems such as healthcare networks, ERMs,documents containing PHI and email accounts. Insider threats can pose an organization heavy fines for the breach of HIPAA regulations as well as the violation of patient privacy. Additionally, they could also damage the reputation of the healthcare organization. Phishing It is an attack process that is deployed in the healthcaresystemthroughemail.Generally,the communicationsseemlegitimatewhichinstructthe employee to follow a certain link to a web page where they are asked to complete certain actions that trigger a malware download. In this sense, the attacker poses as an authentic entity or person in an email to get the target to offer worthy information like credentials or click on a link which leads in a ransomware downloaded on the victim’s machine. Cryptojacking With the advent of the internet of things in the healthcare industry cyberattacks have increased. After the healthcare industry being faced with ransomware, phishing and data theft, cybercriminals are shifting their methods and currently tapping into the cryptojacking. Cryptojacking is a cybersecurity threat that thrives on the process power of a compromised device to mine cryptocurrency on behalf of the hacker [1]. Hence, cryptojacking has deleterious consequences to the functionality of a compromised device which reduces it overall lifetime. In the healthcare setting which have a variety of medical devices used for patient care, cryptojacking has become a major risk to patient safety. III.ANALYSISOFSECURITY REQUIREMENTSUSINGSTRIDE MODEL
AcronymType of threatSpoofing identityPhishing
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Tampering with dataTheft of patient dataRepudiationPhishing
Information disclosureInsiderthreat,theftof patient data Denial of serviceRansomware Elevation of privilegeCryptojacking IV.ANALYSIS OF SECURITY REQUIREMENTS IN HEALTHCARE SYSTEM Approaches to defend against insider threats in healthcare Thestandardapproachtomitigateinsiderthreatsis subdivided into four categories educate, deter, detect and investigate. Educate Healthcare employees should be educated on the permitted uses and disclosures of PHI and the risks related to behaviors such as patient data security, and privacy. Deter Healthcare organization should develop policies to reduce risks and strongly enforce these policies. Also, employees need to be clearly explained to the consequences associated with violation as well as breaching of HIPAA regulations. Detect Healthcare facilities are supposed to implement technologicalsolutionswhichallowthemtodetect breaches rapidly and ensure constant checks of access logs. Investigate Onceprobablesecurityandprivacybreachesare detected they should be investigated quickly to restrict the harmcaused.Whentherootcauseofthebreachis determined,stepsoughttobeundertakentoaverta recurrence [10]. V.WAYS TO PROTECT HEALTHCARE DATA FROM PHISHING Sincetherearenumerouswaysthroughwhich employees can receive communications instructing them regardingvisitingwebsitesthatarenotsafe,thebest strategy to protect healthcare information and data from phishing is to prevent workers from being able to visit unsafe websites. This could be attained through use of safe web filters that are configured to deny access to fake websites as well as website harboring malware. In the way, healthcare organization will block the download of file types often related to malware [11]. The web filters protect healthcare data from phishing attacks using approaches such as category filters, blacklists and keyword filters. Category filters are used to deny access to certain websitecategorieswhichtypicallyharbormalware. Therefore,systemadministratorsshouldconfigure healthcare web filters to deny access to dissimilar website categoriessuchasthosecontainingpharmaceuticals products, freeware and pornography. Blacklists is used to deny access to website that are known to be unsafe or those that mask their true identify behind a proxy server [12]. The blacklists should be updated on a regular basis to reflect the most recent-
reported phishing attacks experienced in the healthcare sector as well as additional threats to online security. Keyword filters This enables the system administrator to fine-tune web filtering parameters to regulate access to websites that contain particular file type of words. Accordingly,thesemechanismsworkinunisonto safeguard healthcare data from phishing and to prevent other website borne threats. VI.STEPS TO PREVENT THEFT OF PATIENT DATA Reduceriskconnectedwithpersonalpatient information: When it comes to identity theft the storage and use of patient’s social security numbers is the primary source of vulnerability. Data entry errors and breaches means that a patient’s data is likely to fall into the wrong hands hence compromising both the patient as well as the healthcarefacility.Inthisregard,hospitalstaffare supposed to take care not to discuss patient information on public, with family or friends. For physical form such as patient records and charts should be safely used and stored [13]. Secure methods should be used to storing patient health information: Each health organization should take the necessary precautions measures to ensure the safety and security of patient information.Healthcare organization should invest in the right health information technology such as the use of unique health safety identifier (UHSI) to reinforce data and information security. Assemble and use an advisory committee: It is of great advantage for any healthcare environment to establish a diverse team of leaders to come together to constantly review and assess security issues as well as vulnerabilities. This helps to raise awareness and discussing perceived risks that allow hospital management to be well-informed on matter to do with decision-making and implementing effortstominimizerisksandsafeguardsensitive information. The advisory committee aid to prevent against identitytheftinadditiontotheselectedteamof professionals helping to addressing issues in prompt and adequate manner. The use of inventory system that track all processesandsystemswhichcontributetosecurity breachescould enablethe health facilityidentify their weaknessestomakeimprovementsontheirsecurity systems [14]. When an issue is discovered the advisory committee will be bettered prepared to prioritize areas of concern and make necessary improvements required. Educate patient regarding medical identity theft: Researchhasshownthatmostcasesoffraudcabe prevented or stopped early if patients pay closer attention to theirrecordsandstatementstopinpointsuspicious practices. Healthcare facilities can help to reduce such cases by teaching patients on what they should take caution not to share sensitive medical details such as insurance cards. Additionally, hospitals should make it simple for patients to gain access to their medical documents. Educate staff on security threats and warning signs: Not all data breachesaremaliciousandhumanerrorisamajor component ranging from accidentally publishing patient data on public websites to mailing personal data to the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
wrong patients.Trainingemployeesabout thepossible pitfalls could help in protecting private patient information. Best practices to prevent cryptojacking healthcare cybersecurity Identify and monitor all linked medical devices: The healthcare administrator should make sure that each connected medical device is monitored in real-time to allow for constant probe for vulnerabilities which could signal the device has been compromised [17]. Segmentconnectedmedicaldevices:Well- segmented linked medical devices according to risk profile and vulnerabilities could help reduce hackers’ entrée into thehealthcaresystemintheeventofacyberattack. Healthcareorganizationcanalleviatesuchrisksby establishing isolated network for linked devices, which is simple and can be achieved using firewall and VLANs technology [15]. Ensuringregularsoftwareupdate:Periodical software updates are essential to warding off something that could easily be thwarted cyberattacks. Each linked medical device should be updated regularly for software patchingandfirmwareupdatestominimizemedical devices from exploitation. Establish cybersecurity framework and incident response plan: Healthcare systems require comprehensive cybersecurity plan that include incident response procedure which can be deployed at a moment’s notice that involves all key stakeholders in all departments within the healthcare facility. VII.WAYSTOPREVENTRANSOMWARE ATTACKS Thebestapproachtopreventransomwarefrom succeeding is by healthcare organization training their staff about cyber hygiene. Cyber hygiene is thinking prior to making a click on a computer and avoiding surfing the internet for personal reasons such as Facebook, and Google usingaworkstationcomputer[18].Also,healthcare facilities should establish strong backup which should be tested to ensure that they are capable of restoring processes and not depend on external support. Risk rating using DREAD Model ThreatRisk rating DamageRansomware, insider threat 3 ReproducibilityPhishingand cryptojacking 3 ExploitabilityTheftofpatient data 3 Affected usersRansomware2 DiscoverabilityInsider threat1 In general healthcare organization should ensure theiremployeesareproperlytrainedinregardsto healthcarecybersecurityprotocols.Thisallowthemto know all the proper measures to undertake and enforce these measures to secure the entire organization [16]. In addition,healthcarefacilitiesshouldcontrolaccessto protected patient data, hence the security team of hospitals
should carefully regulate access to patient records by only permitting authorized people to access these details through auditing the system to verify identify of who access what andatwhattime.Furthermore,employeeswhose contracted has been terminated their access to the system shouldberemovedtoavoidproblemsintheirbidto revenge. VIII.CONCLUSION In summery healthcare system is faced by numerous securityrisksbothfrominsideandexternalthe organization.Cybercriminalsaretargetinghealthcare organizationsmorethananyothersectorbecause healthcare facilities contain highly confidential personal information which is highly lucrative to them. Therefore, healthcareshouldestablishhighlysecurehealth information technology systems and secure them through firewalls and regular update to avoid falling victims of cyberattacks.Theyshouldimplementlayeredsecurity protocols so that even when an attacker break through one layer they can still not manage to access the protect data. Layeredsecurityprotocolsallowidentificationofthe attacker before it is too late. REFERENCES [1] Abomhara M. Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility. 2015 Jan 31; 4(1):65-88. [2] Al-Janabi S, Al-Shourbaji I, Shojafar M, Shamshirband S. Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications. Egyptian Informatics Journal. 2017 Jul 1; 18(2):113-22. [3] Luna R, Rhine E, Myhra M, Sullivan R, Kruse CS. Cyber threats to health information systems: A systematic review. Technology and Health Care. 2016 Jan 1; 24(1):1- 9. [4] Luo E, Bhuiyan MZ, Wang G, Rahman MA, Wu J, Atiquzzaman M. Privacyprotector: Privacy-protected patient data collection in IoT-based healthcare systems. IEEE Communications Magazine. 2018 Feb 13; 56 (2):163- 8. [5] Easttom C, Butler W. A Modified McCumber Cube as a Basis for a Taxonomy of Cyber Attacks. In2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC) 2019 Jan 7 (pp. 0943-0949). IEEE. [6] Razzaq MA, Gill SH, Qureshi MA, Ullah S. Security issues in the Internet of Things (IoT): A comprehensive study. International Journal of Advanced Computer Science and Applications. 2017 Jun 1; 8 (6):383. [7] Walker-Roberts S, Hammoudeh M, Dehghantanha A. A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure. IEEE Access. 2018 Mar 20; 6:25167-77. [8] Zhou W, Jia Y, Peng A, Zhang Y, Liu P. The effect of iot new features on security and privacy: New threats, existing solutions, and challenges yet to be solved. IEEE Internet of Things Journal. 2018 Jun 15; 6(2):1606-16.
[9] Guillén-Gámez FD, García-Magariño I, Bravo-Agapito J, Lacuesta R, Lloret J. A proposal to improve the authentication process in m-health environments. IEEE Access. 2017 Sep 18; 5:22530-44. [10] Meng W, Li W, Xiang Y, Choo KK. A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks. Journal of Network and Computer Applications. 2017 Jan 15;78:162- 9. [11] Walker-Roberts S, Hammoudeh M, Dehghantanha A. A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure. IEEE Access. 2018 Mar 20;6:25167-77. [12] Hatwood C, Alexander S, Imsand E. Nurse Researchers Move to the Cloud: Protecting Sensitive Data in Cloud-Based Storage Environments. Clinical Nurse Specialist. 2019 Jul 1;33(4):164-6. [13] Krishnan R, Rainwater R, FitzGerald D, inventors; Aetna Inc, assignee. Risk based medical identity theft prevention. United States patent application US 15/651,577. 2018 Jan 18. [14] Kennelty KA, Jensen LL, Gehring M, Gilmore- Bykovskyi A, Roiland RA, Kordahl R, Kind AJ. Preventing Opioid Prescription Theft and Ensuring SeCure Transfer of Personal Health Information (PROTECT PHI) when Patients Transition from the Hospital to a Nursing Home. Journal of the American Geriatrics Society. 2016 Sep;64(9):e23. [15] Le DN, Kumar R, Mishra BK, Chatterjee JM, Khari M, editors. Cyber Security in Parallel and Distributed Computing: Concepts, Techniques, Applications and Case Studies. John Wiley & Sons; 2019 Mar 21. [16]Butt UJ, Abbod M, Lors A, Jahankhani H, Jamal A, Kumar A. Ransomware Threat and its Impact on SCADA. In2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3) 2019 Jan 16 (pp. 205-212). IEEE. [17] Kethineni S, Cao Y. The Rise in Popularity of Cryptocurrency and Associated Criminal Activity. International Criminal Justice Review. 2019:1057567719827051. [18] Valentino-DeVries J, Singer N, Keller MH, Krolik A. Your apps know where you were last night, and they’re not keeping it secret. New York Times. 2018 Dec 10;10.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser