Cheryl Ann Alexander1* and Lidong Wang2
1Institute for IT innovation and Smart Health, Mississippi, USA
2Institute for Systems Engineering Research, Mississippi State University,
Mississippi, USA
*Corresponding Author: Cheryl Ann Alexander, Institute for IT innovation and Smart Health, Mississippi, USA.
Received: January 12, 2024; Published: January 30, 2024
Healthcare facilities are highly susceptible to cyberattacks. With the increasingly digitalized healthcare enterprises, identity theft, medical records theft, and malware including Ransomware are just a few of the cybercrimes that have plagued medical centers over the last few decades. A security assessment and security testing include a security audit, assessment level, and vulnerability assessment to secure the health data that belongs to the medical center and patients of the medical center. Thieves are highly confident that using cybercrimes to steal medical data is lucrative because medical data is more valuable than a patient’s social security number. Third parties can use confidential patient data to determine a patient’s eligibility for insurance, hackers can use Ransomware to secure patient data for theft and the medical center would have to give the cybercriminals a hefty sum to release patient data. Assessment reporting is critical for the administrators, financial staff, IT staff, etc. to understand the depth of security assessments. This paper examines all these concepts and how to ensure that data is protected.
Keywords: Cybersecurity; Security Assessment; Security Testing; Security Audit; Assessment Level; Vulnerability Assessment; Assessment Reporting
Citation: Cheryl Ann Alexander and Lidong Wang. “The Design of a Security Assessment and Testing Strategic Plan for a Large Medical Center".Acta Scientific Computer Sciences 6.2 (2024): 09-11.
Copyright: © 2024 Cheryl Ann Alexander and Lidong Wang. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.