CSE 543: Individual Report

Improved Essays
Implications of IoT in Health-care Data Security

CSE 543 – Individual Report
Nishtha Punjabi
Computer Science (MCS),
Ira A. Fulton School of Engineering
Arizona State University,
Tempe, AZ, United States npunjab1@asu.edu Abstract— As society increasingly relies on digitally stored and accessed information, traditional information security technologies, policies, management and practices are found more and more limited in satisfying the security and assurance needs of modern information systems and applications. Incorporating new technology into the healthcare organization’s processes is risky because of the potential for patient information being disclosed. The Internet of things (IoT) is the inter-networking of physical devices, vehicles
…show more content…
All of the data doesn't require security of the highest level, due to confidentiality of healthcare data it requires highest level of information assurance and security. we have talked about that IOT in health care industry, provides options to enable remote monitoring, early prevention, and medical treatment. Encrypting information to make it secure in is difficult in field of medical IOT, since the sensor devices that collect, transfer and store medical data are not high-powered computing systems that can encrypt and decrypt medical data at ease. Difficulty in encrypting sensor data has opened up a door for hackers at various levels of data transmission. In the the report we have analyzed privacy and security issues for these IOT applications. Paper also talks about various regulations such as HIPAA which already are in place to prevent data breach due to IOT devices. Apart from technical difficulties in sensors to secure healthcare data, there are also certain loopholes in the standards like HIPAA that are designed to protect healthcare data. It also talks about how these regulations can be improved and identifies ways to enforce these regulations on IOT device …show more content…
We have done detail analysis of each and every entity in our report. The defense against attacks can occur only when the attack is known so that preventive measures can be put into motion. We have involved all the countermeasures White hat can use to prevent attack against Black hat. Recent anthem data breach affected 80 million individuals received multi-day coverage, sending shockwaves through the nervous public. This breach highlights the growing threat healthcare industry is facing. Damage done by these frauds could be life threatening to victim if erroneous information adulterate their personal healthcare records. It was hoped that 2009 Health Information Technology for Economic and Clinical health(HITECH) act would push the healthcare industry towards better security practices and will reduce breaches. HITECH'S breach reporting rules reduce information asymmetry by giving

Related Documents

  • Great Essays

    c. Data computing The IoT devices are going to handle a lot of information for better consumer experience. This information needs to be analyzed and processed in real time. If the data is not processed in an appropriate time frame, then that would lead to consumer dissatisfaction. Moreover, the issue lies in the amount of data that will be generated from the IoT devices.…

    • 1436 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Wyoming Medical Center, Los Angeles County, and Raymond James all share similar struggles with how to secure the network, computers and mobile devices. Control and security are a concern from both inside and outside of the facilities and organizations. Each organization deployed a multi-level/tier approach was needed to protect the data. The Novell ZenWorks agents are used to manage the operating systems and software that is installed on the desktops/workstations; it allows the information technology group to customize the software for installation and patch management.…

    • 302 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Companies should train their employees (not only IT employees) to be caution in the use of their credentials, and to report any suspicious email or activity in their accounts. Anthem’s officials acted quickly. They notified FBI after noticing unusual network activity. Time played an important role in this case, and the early intervention of the FBI avoided the hacking to extend much more. Anthem changed all the passwords as soon as they knew about the breach.…

    • 552 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3

    • 781 Words
    • 4 Pages

    Describe the responsibility of the medical office specialist to protect all protected health information (PHI). When it comes to protecting patient information, it’s about getting employees to understand how to best protect it and what to do if there is a data breach. Training is essential and should include not only administrative employees, like medical office specialist, but also doctors, nurses, and other clinicians throughout the organization. All employees with access to patient information need to have the understanding of how to maintain security protocols when it comes to patient care. Many clinicians tend to look at PHI breaches as simply an IT issue.…

    • 781 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Telichia Johnson HIMS 417 March 07, 2015 Summary: Redefining HIM Privacy and Security Role In the article “Redefining Health Information Management Privacy and Security Role,” the authors report on the historical role of the Health Information Management (HIM) professional in privacy and security, several evolutionary changes, and the need to extend access to patient information beyond normal patient care. In a period of constantly changing regulations and continual evolutions in technology, the Health Information Management profession’s roles and responsibilities will have to be extended to meet industry demand, and more reliance on Health Information Technology (HIT) to process and manage data and information. A more increased role…

    • 371 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Data security in the healthcare sector must be persistent and sufficient in ensuring the privacy and protection of patient’s information. The developing threat postured by malicious coding, such as viruses and worms, and unethical hackers can by reduced by the utilization of government standardize security controls. For instance, the Health Insurance Portability and Accountability Act has established security necessities regulations to ensure the protection of health information. However, organization must address the potential risk existing an internal and external networks to tackle threats effectively. Developing an effective network infrastructure by using resource hardware components as switches and routers to boost network security can reduces business operations interruption from attacks.…

    • 782 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    HIPAA Violations

    • 355 Words
    • 2 Pages

    In order to achieve interoperability there are basic security standards that must be accounted for to ensure safe and secure exchange. Without adequate safe measures in place, personal health records cannot be safely transmitted electronically. Exchanging private health information electronically between medical partners comes with inherent risk however. Those risks include violation of HIPAA regulations and threats, vulnerabilities and malware that threaten electronic health records (EHR) or mainframe servers.…

    • 355 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The Challenge of Being HIPAA The Health Care industry has been undergoing enormous changes in every aspect. The rapid development of electronic medical records has demanded greater safety protocols and modification of privacy rules governing the use and disposition of patient medical information. The development of HIPPA Privacy Rule has established national standards to protect medical records and other health information. According to HHS.gov “The Hippa Privacy Rule has established appropriate safeguards to protect the privacy of personal health information, and sets limits and conditions on the uses and disclosures of such information without patient authorization” (HHS, 2017).…

    • 638 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Healthcare is an important organization that is a private sector which is an essential part to preventing one’s personal files from social access of being exposed. In the recent 2000’s, the HIPAA law has been developed and created in order to prevent legally any health organizations from leaking or giving out any information to persons or individuals without a patient’s consent. All healthcare organizations are legally obligated to have all patients to fill out a HIPAA form and store it in their charts. One can prove that their information was violated based on if their spouse or employer was given information regarding their records without consent. A formal consent or document should be filled out stated that their spouse or employer is not…

    • 222 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Regarding Omnibus, this rule modifies the HIPAA Privacy, Security, and Enforcement regulations (Rodriguez, 2013). Some of the modifications include strengthening the limitations and disclosure of protected health information, allowing individuals’ to receive their health information electronically, and factors concerning a reportable breach and how that to determine a breach occurred. Omnibus serves as a rule that updates and modify the valid points made in other HIPAA rules that will fill in the missing information that was not clarified in the other rules. By implementing a risk assessment and risk analysis on the electronic health information, this will determine from different dimensions of risk that may occur in the processes and procedures of handling electronic health information. When a risk assessment is performed, this will determine in which areas need to have a stronger security factor implemented to prevent a data breach from occurring involving electronic health information.…

    • 1427 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    The Health Insurance Probability and Accountability Act (HIPAA) was enacted by Congress in 1996 in response to the infancy of health information technology and the modern flow of health information. The initial focus of the HIPAA was to protect health insurance coverage for workers and their families if they were to lose or change their jobs (Bowers, 2001) but, as technology continued to advance laws were also developed to protect patient information as it passed through a full spectrum of patient care. HIPAA rules was the first effort to standardize the flow of data by, “encouraging electronic transactions as a primary means to conduct business in an effort to also reduce cost and improve efficiency” (Bowers, 2001). HIPAA Privacy Rule…

    • 718 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Included in this education should be informatics ethics. This will ensure that healthcare providers, nurses, and consumers are protecting sensitive information related to their health…

    • 1117 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    The dynamic regulatory environment in healthcare can be overwhelming. The protection of information is rooted in national privacy and security laws. Those laws typically match international governing directives, although most countries do not have healthcare-specific laws like the United States. Where U.S. law and international laws differ and healthcare information must be shared, agreements such as Safe Harbor have been enacted to help bridge the differences. However, on a day-to-day basis, most of us rely on local, internal policies and procedures to govern our use of protected health information.…

    • 109 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    According to Darzi (2014), the introduction of records sharing schemes is already transforming the medical landscape by reducing errors and improving care. Electronic health records are crucial because ACO’s mange the health of the patient, thus requiring patient care records on every patient in the system. Health information technology provides clinicians with accurate and complete information about a patient’s health and reduces the amount of paperwork for patient and physicians. Additionally, electronic records are an essential part of data recording for the physicians to see the past history of each patient. This would allow the health care staff to take data from all the sources and use it specifically to track and manage the patients.…

    • 976 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    How is the role of government likely to change? The role of the government will increase by supporting advance technology innovation across an extensive range of healthcare specialties. Sponsors of public and private healthcare segments will champion efforts to accelerate innovation and sustain advances in medical technology. As healthcare cost increase, federal funding should also increase for innovating healthcare IT infrastructure and promote science and research for more innovation.…

    • 1084 Words
    • 5 Pages
    Improved Essays