Cyberterrorism In Healthcare

Improved Essays
Background

The expansion of the Internet and availability of information online has lead to an equivalent expansion in cyber crime, or cyber terrorism. In fact, in 2013 the Office of Cyber Security and Information Assurance reported that “93% of large corporations and 87% of small business reported some form of cyber breach in 2012” (Brewer, 2014). Also, President Obama labeled cyberthreats as an incredibly serious economic and national security challenge (Artlisch and Edelman, 2014).

Cyber crime presents itself as an arduous task to solve given the dynamics of cyber space. Even though cyber security and culture began to take form around the same time as cyber crime, cyber crime is advancing much quicker, which creates a multitude of problems because as cyber space expands, it creates more open areas from cyber criminals to penetrate (Spaleivc, 2014). Currently, the idea of “cyberterrorism” is one that the healthcare sector fails to understand (Harries and Yellowlees, 2013).
…show more content…
However, healthcare presents itself as a prime target for attacks. In the United States alone, the industry accounted for 17% of GDP in 2009, or $2.5 trillion, and the distribution and use of information systems is extensive (Harries and Yellowlees, 2013). In studies by the Ponenom Institute in 2012 and 2013, 90% of healthcare organizations saw their patients ' data exposed or stolen in some form (Conn, 2015).

This report serves to examine the challenges of generating resilient cyber security strategies and to provide recommendations for how major healthcare corporations can effectively mitigate cyber attacks and keep their information safe.

Problems with Cyber Security in Healthcare Lack of Information about Cyber Security Analysts recognize a system 's susceptibility to security breaches and managers can identify the prospective implications of a cyber attack, but not much methodology exists to quantify both indirect and direct costs (Pfleeger and Rue, 2008). Also, because cyber security challenges are extremely technical in nature, companies often possess personnel who lack the proficiency to simultaneously monitor the security system and comprehend it (Spaleivc, 2014). Corporations experience great difficulties in keeping up with the chaotic rate of evolving software because hackers already have their next set of attacks ready previous to system updates that were designed to repair it from prior attacks (Rungta, Raman, Kohlenber, Li, Dave, Kime 2004). Evidence exists to hint that even companies that have tried to identify and thwart attacks have “fallen victim to significant security breach incidents” (Pfleeger and Rue, 2008). Countermeasures that are effective today can be ineffective tomorrow, which creates a need for a swift and efficient method to shed light on the effectiveness of counter measure decisions (Garvey, Moynihan, Servi, 2012). The necessary information needed to improve cyber security has not been completely realized. Prioritizing Other Issues Over Cybersecurity In one survey, 71% of senior IT executives expressed that cyber terrorism is “on the rise” and that this trend “posed a very serious threat to America 's infrastructure” (Harries and Yellowlees, 2013). However, these numbers do not correlate with large investments. After the 9/11 terrorist attacks, many large-scale investments took place in beefing up healthcare security (Harries and Yellowlees, 2013). But despite this expansion in IT budgets, “only a fraction of it is allocated to securing systems within the healthcare industry, so it is to be expected that information systems are vulnerable to attack” (Artlisch and Edelman, 2014). According to industry experts, healthcare organizations on average spend 3% of their IT
…show more content…
However, managers need to gain insight on cybersecurity evaluation and use various models to triangulate and decide on the best investment strategy (Pfleeger and Rue, 2008). Using cost-benefit analysis can decrease some uncertainty in cyber security investments and lead to better returns on investment.

For example, the Table Top Approach can dramatically assist companies in their valuation of cyber security investments. This approach uses a matrix layout to compare cyber-event effects in monetized and non-monetized expenditures in order to develop measures of return that compare competing countermeasure investments that protect against various cyber event types (Trojans, malware, SQL injections, etc.) vs. actions taken against them such as prevention, detection, or quarantining (Garvey, Moynihan, Servi, 2012). After completing the table, the approach employs “advanced search algorithms to derive ideal sets of costs benefit investments” that measure cost-benefit return, “net cost savings per dollar invested”, and “net percent reduction

Related Documents

  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Any organization, including ABC healthcare Information technology (IT) infrastructures are exceedingly powerless against potential assaults or harm caused from internal and external threats. Meeting standardize compliance requirements developed by the Sarbanes-Oxley (SOX) Act and the Health Insurance Portability and Accountability Act (HIPAA) is critical to reduce potentials assaults to guarantee their infrastructures are secure to the best degree possible by substituting data frameworks regulations. Technical security recommendations to improve ABC Healthcare information security can enhance their information security without significantly increasing management or cause difficulty in the organization. Healthcare industries store and have…

    • 782 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    DESPITE HIPPA’S HITECH ACT, CYBERATTACKS CONTINUE TO RISE HIPPA’s HITECH Act and the Omnibus rule were enacted to prevent data breaches in healthcare; however, healthcare data breaches are on the rise. Since its enactment in 1996, several provisions have been incorporated into the original Health Information Profitability and Accountability Act (HIPAA), one of which is the Health Information Technology for Economic and Clinical Health Act (HITECH): In 2009, The U.S. Department of Health and Human Services (HHS) enacted the American Recovery and Reinvestment Act, which includes the HITECH Act. On March 26,2013, HHS enacted a final Omnibus rule to implement several provisions of the HITECH Act. These provisions aim to strengthen the confidentiality…

    • 807 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Problem Statement: Patient data security is an ongoing and evolving problem in healthcare. According to the US Census Bureau, US Department of Health and Human Services, “143 million patients’ records have been compromised over the past five years…” (Zeadally, Isaac, & Baig, 2016). A patient’s medical record information is a highly sought after commodity among hackers, cyber criminals, and identity thieves because it contains “personal, insurance, and financial information”. They are able to sell this information for “up to $251 per record” as opposed to stolen credit card numbers, which they are only able to sell for “33 cents per number”.…

    • 1371 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    I agree that the comparison of the cybersecurity to the healthcare system is a great analogy, although not perfect. Professor provided examples where a cybersecurity breach and healthcare system are similar and could be treated in a similar way to stop or prevent a different outbreak. Even though most cyber-attacks are minor, there will time when all the information gathered from those small attacks that could be formulated into recipe of a major attack. Also, you pointed out that it is important to realize that it is impossible to prevent all and any cyberattacks, and that they evolve at a fast rate.…

    • 157 Words
    • 1 Pages
    Improved Essays
  • Superior Essays

    Cyber deterrence has been thrown out in the public, governmental, and military sectors for the better part of the first half of the decade, stretching into discussions currently in organizations like NATO, and governments worldwide. The theory is simple: “deter someone from doing something out of fear of repercussion or retaliation.” Theory and concept however, are very different premises and conclusions. Everyone in the information warfare area knows that attribution is a slippery slope, and with the quick typing of a few characters on a keyboard, an attacker can choose to be anyone they want to appear to be. Officials pounding any “attribution” on any pulpit, continue to learn nothing, and attackers will continue with their cyber-shenanigans.…

    • 1639 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Technology is an important factor in today’s society especially in our healthcare system. The advancement in technology is on the rise and it is always changing and updating. The healthcare system is making their way to convert all their medical records electronically; although this can be a good transition, it can also pose a problem. Electronic health records have not been perfected and there are still risks for breaches and potentially a big possibility of disclosing patient’s important medical and personal records. On September 8, 2011, Nemours, a Children’s Health System reported missing three unencrypted computer backup tapes that were locked and stored in a cabinet in the Nemours Health System facility in Delaware.…

    • 796 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    I don’t think my health care data should belong to someone in particular, but I don’t like my data is hacked and sold for $50. I am surprised that more than 100 million Americans have had their electronic medical records hacked. In addition, the data accessed by the hackers can lead to serious consequences, for instance a patient getting the wrong…

    • 218 Words
    • 1 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    Moreover, cybersecurity is a critical feature that enables people to have confidentiality and derive strength from the fact that their crucial information stored in organizations and offices is safe. When it comes to security issues, security facilities and data is protected from access by intruders in the form of enemies, by use of cybersecurity…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Superior Essays

    Lawmakers could not possibly anticipate how cyber-technology would develop. In the last three decades, it has played such a pivotal role in expanding how we communicate and share information on a global scale – a world of smart phones and Internet-of-Things (IoT) devices. But computers and the internet are also used for illegitimate purposes. The government must have adequate enforcement measures in place for maintaining cyber-security.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Essay On Health Care Fraud

    • 1277 Words
    • 6 Pages

    Health Care Fraud A health services management issue that caught my interest is “Health Care Fraud”. Health care fraud is an unethical intentional misrepresentation, deception, or intentional act of deceit for the purpose of receiving huge profits. Furthermore, it is a total disregard that goes against and is inconsistent with good business and /or medical practices. Healthcare fraud has become a national problem that affects all of us directly or indirectly. It is mainly perpetrated by fraudsters, scammers, organized criminal gangs and even dishonest doctors, nurses and other licensed medical professionals who allegedly rip-off billions of dollars each year from the Federal and State governments, from American taxpayers and some of our most…

    • 1277 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Back in 2008 when President Obama was elected as president, he made it a priority to bring awareness cyber security being one the nation’s most important challenges. Even though he signed the Cybersecurity Act of 2015, he still believes that there is a lot more than needs to be done to secure our nation and the American people. Today, the President is directing his Administration to implement “a Cybersecurity National Action Plan (CNAP) that takes near-term actions and puts in place a long-term strategy to enhance cybersecurity awareness and protections, protect privacy, maintain public safety as well as economic and national security, and empower Americans to take better control of their digital security” (The White House, 2016). The Cybersecurity National Action Plan will also cover several other laws and regulations to help private industries fight off cyber-attacks with the help from the…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Great Essays

    At the user level cyber-attacks begin according to Eddolls (2016) Therefore, it stands to reason why cyber security awareness is the front line defense in any security infrastructure. What the literature review here does is demonstrates that while security infrastructures exist, it is that there are serious problems that only heightened awareness mitigates. Qualitative case studies on the topic of cyber security highlight the need for further research in the area of cyber security awareness as attacks occur more frequently in our world. Case studies reviewed demonstrate how widespread the problem is, and the impact cyber attacks bring to businesses across the globe.…

    • 2302 Words
    • 10 Pages
    Great Essays