Acta Scientific Computer Sciences

Mini Review Volume 6 Issue 2

The Design of a Security Assessment and Testing Strategic Plan for a Large Medical Center

Cheryl Ann Alexander1* and Lidong Wang2

1Institute for IT innovation and Smart Health, Mississippi, USA
2Institute for Systems Engineering Research, Mississippi State University, Mississippi, USA

*Corresponding Author: Cheryl Ann Alexander, Institute for IT innovation and Smart Health, Mississippi, USA.

Received: January 12, 2024; Published: January 30, 2024

Abstract

Healthcare facilities are highly susceptible to cyberattacks. With the increasingly digitalized healthcare enterprises, identity theft, medical records theft, and malware including Ransomware are just a few of the cybercrimes that have plagued medical centers over the last few decades. A security assessment and security testing include a security audit, assessment level, and vulnerability assessment to secure the health data that belongs to the medical center and patients of the medical center. Thieves are highly confident that using cybercrimes to steal medical data is lucrative because medical data is more valuable than a patient’s social security number. Third parties can use confidential patient data to determine a patient’s eligibility for insurance, hackers can use Ransomware to secure patient data for theft and the medical center would have to give the cybercriminals a hefty sum to release patient data. Assessment reporting is critical for the administrators, financial staff, IT staff, etc. to understand the depth of security assessments. This paper examines all these concepts and how to ensure that data is protected.

Keywords: Cybersecurity; Security Assessment; Security Testing; Security Audit; Assessment Level; Vulnerability Assessment; Assessment Reporting

References

  1. Stowman AM., et al. “Anatomy of a cyberattack: Part 1: Managing an anatomic pathology laboratory during 25 days of downtime”. American Journal of Clinical Pathology4 (2022): 510-517.
  2. Javaid M., et al. “Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends”. Cyber Security and Applications (2023): 100016.
  3. Bhuyan S S., et al. “Transforming healthcare cybersecurity from reactive to proactive: current status and future recommendations”. Journal of Medical Systems 44 (2020): 1-9.
  4. Li Y., et al. “Healthcare Data Quality Assessment for Cybersecurity Intelligence”. IEEE Transactions on Industrial Informatics (2022).
  5. Lai J., et al. “Edge intelligent collaborative privacy protection solution for smart medical”. Cyber Security and Applications 1 (2023): 100010.
  6. Abernethy A., et al. “The promise of digital health: then, now, and the Future”. National Academy of Medicine (NAM) perspectives, June 27 (2022): 1-24.
  7. Radanliev P and De Roure D. “Advancing the cybersecurity of the healthcare system with self-optimising and self-adaptative artificial intelligence (part 2)”. Health and Technology5 (2022): 923-929.
  8. Warsinske J., et al. “The Official (ISC) 2 Guide to the CISSP CBK Reference”. John Wiley and Sons (2019).
  9. Joint Task Force Transformation Initiative. Assessing security and privacy controls in federal information systems and organizations: building effective assessment plans (No. NIST Special Publication (SP) 800-53A Rev. 4 (Withdrawn)). National Institute of Standards and Technology (2014).

Citation

Citation: Cheryl Ann Alexander and Lidong Wang. “The Design of a Security Assessment and Testing Strategic Plan for a Large Medical Center".Acta Scientific Computer Sciences 6.2 (2024): 09-11.

Copyright

Copyright: © 2024 Cheryl Ann Alexander and Lidong Wang. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.




Metrics

Acceptance rate35%
Acceptance to publication20-30 days

Indexed In




News and Events


  • Certification for Review
    Acta Scientific certifies the Editors/reviewers for their review done towards the assigned articles of the respective journals.
  • Submission Timeline for Upcoming Issue
    The last date for submission of articles for regular Issues is December 25, 2024.
  • Publication Certificate
    Authors will be issued a "Publication Certificate" as a mark of appreciation for publishing their work.
  • Best Article of the Issue
    The Editors will elect one Best Article after each issue release. The authors of this article will be provided with a certificate of "Best Article of the Issue"

Contact US