2020
DOI: 10.3390/su12177002
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Risk in Health Facilities: A Systematic Literature Review

Abstract: The current world challenges include issues such as infectious disease pandemics, environmental health risks, food safety, and crime prevention. Through this article, a special emphasis is given to one of the main challenges in the healthcare sector during the COVID-19 pandemic, the cyber risk. Since the beginning of the Covid-19 pandemic, the World Health Organization has detected a dramatic increase in the number of cyber-attacks. For instance, in Italy the COVID-19 emergency has heavily affected cybersecuri… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(28 citation statements)
references
References 89 publications
0
28
0
Order By: Relevance
“…In practice, it is not possible to build a completely secure system. Sundaram [9] explains that the internet is changing methods of computing rapidly, and possibilities and opportunities for malicious intrusions are very high and can cause high risk. Security mechanisms of a system are designed to prevent unauthorized access to system resources and data, however complete protection is unrealistic in this fast-paced cyber world users are in.…”
Section: Data and Informationmentioning
confidence: 99%
“…In practice, it is not possible to build a completely secure system. Sundaram [9] explains that the internet is changing methods of computing rapidly, and possibilities and opportunities for malicious intrusions are very high and can cause high risk. Security mechanisms of a system are designed to prevent unauthorized access to system resources and data, however complete protection is unrealistic in this fast-paced cyber world users are in.…”
Section: Data and Informationmentioning
confidence: 99%
“…These systems are vulnerable to a large variety of threats such as malware, ransomware, etc [ 20 , 21 ]. Overall, the health care industry significantly lags behind other industries in terms of cybersecurity and coupled with a lack of digital literacy among staff mostly working from home, makes it a prominent target [ 15 , 22 ].…”
Section: Resultsmentioning
confidence: 99%
“…Offner et al [ 14 ] reviewed cyber threats and mitigation strategies among Australian health care organizations. Sardi et al [ 15 ] performed a systematic review of cyber risk in health facilities. However, there is limited research on an in-depth review and analysis of key cybersecurity challenges and solutions, specifically in the health sector, in the context of a pandemic situation such as COVID-19.…”
Section: Introductionmentioning
confidence: 99%
“…Cybersecurity risk, also known as information technology risk, is the new management challenge of the third millennium; it affects the information and technology assets of organizations. On one hand, cybersecurity risk is defined in [6] as "operational risks to information and technology assets that have consequences affecting the confidentiality, availability, or integrity of information or information systems". In particular, a cybersecurity threat is a potential attack that exploits a vulnerability of the system to cause damage, whilst a threat scenario is a flow of events or attacks containing interactions between a malicious actor and a system to cause damage.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, privacy risk assessment as indicated in [7] aims to "analyze and quantify the privacy risks associated with new systems". Accordingly, considerable research has been devoted to eliciting and analyzing cybersecurity and privacy risk assessment [6][7][8][9][10]. However, the applicability of these approaches in the context of cybersecurity and privacy risk assessment modeling for POC systems in healthcare ecosystems shows limitations with respect to (i) their support for explicitly specifying various types of cybersecurity threats, (ii) the definition of threat scenarios and (iii) the specification of mitigation and preventing actions (e.g., cyber hygiene) for these threats.…”
Section: Introductionmentioning
confidence: 99%