2023
DOI: 10.1145/3571156
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Review of the State-of-the-Art on Security and Privacy Issues in Healthcare

Abstract: Currently, healthcare is critical environment in our society which attracts attention to malicious activities and has caused an important number of damaging attacks. In parallel, the recent advancements in technologies, computing systems, and wireless communications are changing healthcare environment by adding different improvements and complexity to it. This article reviews the current state of the literature and provides a holistic view of cybersecurity in healthcare. With this purpose in mind, the article … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(26 citation statements)
references
References 113 publications
0
16
0
Order By: Relevance
“…Security and privacy-aware SRA for EHR should encapsulate design principles and security and privacy guidelines, including explicit guidelines described in [39]. These principles will govern the overall approach to system security, incorporating concepts such as defense-in-depth, least privilege, and secure by default.…”
Section: Review Of Conceptsmentioning
confidence: 99%
“…Security and privacy-aware SRA for EHR should encapsulate design principles and security and privacy guidelines, including explicit guidelines described in [39]. These principles will govern the overall approach to system security, incorporating concepts such as defense-in-depth, least privilege, and secure by default.…”
Section: Review Of Conceptsmentioning
confidence: 99%
“…We aggregate the results of the security threats to IoTHDs [123][124][125][126] following the STRIDE method [24,96] in Table 2.…”
Section: Iothd Security Threatsmentioning
confidence: 99%
“…In addition, users of WBANs should be educated about the importance of security practices and potential risks. This includes promoting strong password management, recognizing phishing attempts, and providing guidelines on secure usage and handling of WBAN devices [149]- [153].…”
Section: Figure 4 Wban Security Mechanismsmentioning
confidence: 99%