Topic > Discussion on Cyber ​​Security in Healthcare System and Other Organizations

Index IntroductionIssues in Cyber ​​Security System in Healthcare An Analysis of the Benefits of Implementing Fog Computing System in IoTPrevention of Cyber ​​Attacks in Healthcare SystemDiscussionIntroduction May 12, 2017 a ransomware called "WannaCry" has broken out on the Internet. This ransomware attacked Microsoft Windows systems embedded in hundreds of thousands of computers from more than 100 different countries (Jesse, 2017). An extremely significant number of important files and information were encrypted, and users were asked for money in the form of Bitcoin to decrypt the data, otherwise the hard drive would be formatted and the data would be lost. Hospitals in some countries, such as Britain, which was the worst hit, were attacked as computers containing huge amounts of important patient information were blocked and doctors were threatened with payments to recover the data. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get Original Essay WannaCry has attacked over 60 national hospital systems in Britain and thousands of patients have been affected by having appointments canceled or receiving delayed treatment (Martin, Ghafur, Kinross, Hankin, Darzi, 2018). The attack also had a huge influence on other sectors such as finance, IT, education and manufacturing as computers were locked and access to data was controlled. This document will mainly discuss the issues facing the healthcare system; new technology would protect the healthcare system from attacks; and tips for preventing cyber attacks in the healthcare system. Problems in healthcare cybersecurity system Cybersecurity problems are accompanied by the development of the Internet. In the Internet age we must appreciate the benefits resulting from the explosion of information and social convenience. On the other hand, we have to bear the risk of information leakage. In the internal management of hospitals, information construction has become an irreversible development trend. Therefore, if hospitals want to use the Internet to improve management efficiency and optimize medical and healthcare services, they should address security issues in building network systems. It is necessary to implement rigorous and feasible management measures to prevent network security risks, so that medical information and management information can better serve patients and ensure the effective operation of hospitals. Healthcare faces an even larger portion of cybersecurity issues than any other industry. The outdated system and weaknesses make it the easiest to attack by hackers. According to Guy and his colleagues, the main reason why healthcare is an "attractive target" is the large amount of valuable data. There are several common types of cyberattacks in the healthcare system: data theft for profit (identity theft, personal information theft for profit), data theft for impact (public exposure of celebrity medical care ), ransomware (inserting malware into the system and demanding money for decryption), data corruption (tampering with medical records for financial gain), denial of service attacks (sending unnecessary requests to block the network), email compromise company electronics (pretending to be doctors and initiating false communications) and unaware insider (unintentional actions caused by staffusing an outdated system) (Guy, Paul, Chris, Ara, James 2017). When Software Company, like Microsoft, releases a security patch on their operating systems, there will be software vulnerabilities that it exposes to the public. Hackers will actively notice these vulnerabilities and start hacking the flawed system to earn money. Microsoft releases security patches for its latest Windows system for free, however, for users using older Windows systems, it may cost a huge amount of money to update these patches (Tobias, 2017). Most originations would like to avoid network or system management costs like this, so they have decided not to purchase and install the patch. Hackers will easily discover these flawed systems and initiate criminal activities. New technology that protects healthcare from cyber attacks Healthcare is always one of the most important issues that people deal with. It is very challenging to design an IoT-based system because the sensor that collects patient information, as big data, must be very efficient. Additionally, some sensors have relatively low processing speed, memory, transmission speed, and power. In some cases, real data analysis should be performed. In this article, regardless of the transmission speed and power consumption of devices, the issue of cybersecurity will be discussed. Cloud storage, such as iCloud, OneDrive, and Google Drive, has been widely accepted by people due to its storage space, ease of access, and price. Most of the healthcare system stores their data in cloud storage. Almost everyone with access to the Internet has GB to TB of cloud storage. People tend to save their private data in the cloud to be able to access it whenever they need it. However, there are advantages and disadvantages. As cyber threats grow with the development of cloud technology, it may no longer be safe to store personal or confidential data in the cloud. According to Tian, ​​there are various types of cyber threats in cloud storage service, such as data loss, malicious modification, cloud server crash, etc. There are some serious cyber incidents. For example, the Apple iCloud data leak incident in 2016. The leak affected approximately 64 million accounts. (Tian, ​​2018). Cloud computing service can no longer meet users' need for greater cybersecurity. So fog computing, also called edge computing, appears in people's eyes as a more intelligent computing model. In cloud storage service, the user uploads their file directly to the cloud. Then the Cloud Server Provider (CSP) will take the responsibility of the users to control the data. Therefore, users do not actually control the physical storage of their data, which results in a barrier between data ownership and management. In this case, the possibility of data loss increases. Currently, the number of devices such as Apple Watch, Garmin, Fitbit, etc., that collect data, as well as the amount of data processed, is growing exponentially. Typically, public cloud computing provides computing space to process this data through a remote server. However, it takes time to upload the captured data to a remote server for analysis and then the results are transmitted back to the original location. This slows down the process which requires an immediate response from professionals, especially in the healthcare aspect. Furthermore, when the Internet connection is unreliable, relying on the remote server becomes the crux ofproblem. And in other cases, data that does not require immediate response is mostly still analyzed, processed and stored in the cloud to perform historical analysis and big data analytics. Therefore, the proposed use of fog computing differs from cloud computing. Although there are also private clouds that reside in companies' data centers and are not shared with others, these usually provide more compute-intensive services for several devices or even the company's entire IT infrastructure, but at the same time private clouds can still have higher latency than fog computing. Furthermore, especially small and medium-sized companies may not have the capabilities to manage their own private clouds. Fog computing allows them to create IT resources to automate and control production without using their own cloud or transmitting large amounts of data to public clouds. (Cristiano, 2018). In 2011, it was proposed by Cisco that fog computing could become the next technology in IoT. Fog computing is not a server but consists of various functionalitiescomputers or sensors. It is widely accepted in household appliances, manufactured goods, vehicles or even street lamps. Fog computing is as vivid as cloud computing which lies between personal computing and cloud computing. Computing resources are provided at the edge of the network. Compared to cloud computing, fog computing is more decentralized. Data is processed locally in large quantities. The analysis is performed on-site and completely portable. It is a decentralized computing infrastructure where data, processing, storage and applications are distributed in the most logical way between data sources and the cloud, which is the most efficient place. Fog computations have several distinct characteristics: low latency, location awareness, broad geographic distribution, mobility-adapted applications, and support for multiple edge nodes. These features make the deployment of mobile services more convenient and accommodate a wider range of node accesses. An Analysis of the Benefits of Deploying Fog Computing System in IoT Reduced Latency To reduce the physical distance between the data collection device and the processor, latency time and potential response can be reduced compared to a device-to-cloud architecture . To mitigate computational tasks for the device-only architecture, the latency time can also be reduced. The motivation may also be to keep latency predictable. Privacy To reduce data propagation, data can be analyzed on a local gateway but not on a data center outside the control of users. Therefore, user privacy protection can be improved compared to the device-cloud architecture. Energy Efficiency There are several ways to improve energy efficiency within sensor devices on the fog platform. As the length of sleep cycles of sensor devices increases, the gateway may be responsible for any requests or updates and then the sensor is woken up to process the request. Additionally, heavy computations and some other services can be offloaded by battery-powered nodes. Bandwidth Compared to a device-to-cloud architecture, the amount of data that needs to be sent to the data center can be reduced with fog computing. First the raw data needs to be filtered, analyzed, preprocessed or compressed so that not all data has to be sent to the center. Second, local nodes can also perform some analysis from devices with cached data. ScalabilityFrom more centralized resources, local computing can reduce the workload and can be spent according tonecessity so that fog computing can improve the scalability of a system. ReliabilityFog computing can increase the reliability of the system either to achieve redundancy by letting some nodes in the network provide the same functionality or to perform computations closer to the sensor nodes so that they are not as dependent on the network connection. However, security is another important reason why companies look for fog calculations. Application data, such as healthcare and point-of-sale transactions, are prime sensitive targets for cybercrime analysis and targeting of identity thieves. However, fog computing can make such data strictly protected. According to the OpenFog consortium, the fog system is responsible for protecting information communication between the IoT device and the cloud, ensuring security for real-time applications. Fog can also be used to securely store devices indoors, away from vulnerable public networks. . Secure storage of data backups can be achieved by implementing reliable backup services, such as storage services provided by Mozy, which allow businesses to schedule automated backups with military-grade cryptographic protection. Various systems are implemented to detect and prevent malicious cyber attacks on the for platform. Privacy protection can minimize data communication with fog nodes to reduce risk in order to preserve personal and critical data during communication. Privileged data mitigation combines behavioral profiling and decoy approaches to mitigate security threats. Policy-based secure resource management improves secure interaction, sharing, and interoperability between resources required by users. Authentication in the fog platform will allow the fog platform and the end user to avoid attacks with the help of a public key infrastructure, Diffien-Hellman key exchange, intrusion detection techniques and monitoring of changed input values . Furthermore, using the advanced encryption standard (AES) as the encryption algorithm is suitable for the fog platform. (Khan, S., 2017) Many other efforts have also been made to improve the issue of security and privacy in the environment. More secure and efficient protocols are implemented to reduce power consumption without sacrificing performance. With fog computing, a lightweight encryption algorithm can be introduced between fog and devices to improve the efficiency of the communication process. Fog computing also offers various opportunities to detect unusual behavior and attacks with a signature or anomaly-based system. In the application of healthcare IoT, security is one of the most important aspects. Therefore, it is possible to provide a high level of security using operating system level techniques on gateways such as IPtable which is basically a table of rules according to which permissions are granted to some ports while other ports are blocked to prevent unwanted traffic. (Rahmani, AM 2018) Preventing Cyber ​​Attacks in Healthcare System There are so many aspects why a healthcare system could be attacked by hackers. But there are still many ways to prevent cyberattacks like WannaCry from happening again. First and foremost, organizations need to make network security a very employee-focused topic. Well-trained employees and managers will help the organization discover potential threats in time. With special cybersecurity training and education, employees will have their anti-spam methods in place right away.