logo

Vulnerability Assessment for a Hospital Set-up

   

Added on  2022-10-17

2 Pages580 Words300 Views
Welcome to Vulnerability Assessment
[00:00:30]: Hi I am (Student name). We are all aware that vulnerability assessment is a central
component when designing a security program or plan for any organization. I want to take you
through vulnerability analysis and execution plan for a hospital set-up.
[00:00:45]: According to Becker hospital, data breaches across healthcare facilities is
approximately 6.5 million dollars annually. In 2016, at least one health facility was breached
which affected over 27 million patient records.
[00:00:20]: There are three ways in which a hacker can breach network security for a hospital
set-up. These are through malware, human error, and weak passwords
[00:01:45]: Through malware hacker uses ransom ware and viruses to shutdown hospital servers
and the entire network. Hackers uses this way to steal patient records for sale. Example was the
hacker who goes by the name thedarkoverlord who stole patients’ records using malware attack.
The hacker then broke down the data into databases with prices ranging from 151 to 643 bit
coins this amounts to around 96,000 US dollars to 411, 000 US dollars. Hackers also utilizes
other types of malwares which are worms, back door, and spyware, capture store data, and RAM
scrapper
[00:00:20]: Hackers utilizes human errors created by health professionals to steal health records.
The most common types of human errors are miss-delivery which is at 38.2 percent.
[00:01:00]: some health professionals uses insecure passwords such as their names, and pets to
login to medical records system. In secure passwords enables a hacker to gain unauthorized
access to a protected network. Here a hacker uses brute force type of attacker to gain the
passwords thus able to login to the system to get medical data

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Vulnerability Assessment 2022
|6
|1205
|12

JP Morgan Data Breach
|5
|722
|96

Risks and Mitigation in Implementing Electronic Health Record
|7
|2738
|191

Healthcare Data Security
|8
|1648
|70

Information Security | EDMODO Assignment - Desklib
|9
|2528
|187

IOT In Healthcare | Assignment
|4
|835
|26