Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain
Recently, an increasing number of cyber-attacks in the medical field has resulted in great losses in the health care industry, since medical information plays an essential role in human health. To introduce a comprehensive survey about possible cyber-attacks and solutions for these attacks, our pape...
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2019-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8888271/ |
_version_ | 1818665380258775040 |
---|---|
author | Abdul Razaque Fathi Amsaad Meer Jaro Khan Salim Hariri Shujing Chen Chen Siting Xingchen Ji |
author_facet | Abdul Razaque Fathi Amsaad Meer Jaro Khan Salim Hariri Shujing Chen Chen Siting Xingchen Ji |
author_sort | Abdul Razaque |
collection | DOAJ |
description | Recently, an increasing number of cyber-attacks in the medical field has resulted in great losses in the health care industry, since medical information plays an essential role in human health. To introduce a comprehensive survey about possible cyber-attacks and solutions for these attacks, our paper first presents a brief overview of the necessary background of the dataflow in the medical domain and then identifies the vulnerabilities in each stage of the dataflow. Then, according to the weaknesses identified in the medical system, a classification of cyber-attacks is presented. Additionally, the paper presents research on previous work that focuses on solving these cyber-attacks and identifies the strengths and limitations of the solutions for each attack. More importantly, for data storage assurance, our paper discusses several cybersecurity architectures for the medical domain from the existing literature. The countermeasures from previous papers and architectures that are still weak in terms of resource depletion, attack reduction, applicability, etc. are addressed. Finally, the paper discusses and recommends solutions for future work to decrease cyber-attacks in the medical field so that human health can be guaranteed. |
first_indexed | 2024-12-17T05:47:43Z |
format | Article |
id | doaj.art-cf23fed975374027b1bd87b7ac996f29 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-17T05:47:43Z |
publishDate | 2019-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-cf23fed975374027b1bd87b7ac996f292022-12-21T22:01:15ZengIEEEIEEE Access2169-35362019-01-01716877416879710.1109/ACCESS.2019.29508498888271Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical DomainAbdul Razaque0https://orcid.org/0000-0002-2163-6871Fathi Amsaad1Meer Jaro Khan2Salim Hariri3Shujing Chen4Chen Siting5Xingchen Ji6Department of Computer Engineering and Telecommunication, International Information Technology University, Almaty, KazakhstanDepartment of Computing Sciences and Computer Engineering, The University of Southern Mississippi, Hattiesburg, MS, USADepartment of Business Management and Information, International Islamic University Islamabad, Islamabad, PakistanDepartment of Electrical and Computer Engineering, The University of Arizona, Tucson, AZ, USADepartment of Computer Science, Nanjing Campus, New York Institute of Technology, Nanjing, ChinaDepartment of Computer Science, Nanjing Campus, New York Institute of Technology, Nanjing, ChinaDepartment of Computer Science, Nanjing Campus, New York Institute of Technology, Nanjing, ChinaRecently, an increasing number of cyber-attacks in the medical field has resulted in great losses in the health care industry, since medical information plays an essential role in human health. To introduce a comprehensive survey about possible cyber-attacks and solutions for these attacks, our paper first presents a brief overview of the necessary background of the dataflow in the medical domain and then identifies the vulnerabilities in each stage of the dataflow. Then, according to the weaknesses identified in the medical system, a classification of cyber-attacks is presented. Additionally, the paper presents research on previous work that focuses on solving these cyber-attacks and identifies the strengths and limitations of the solutions for each attack. More importantly, for data storage assurance, our paper discusses several cybersecurity architectures for the medical domain from the existing literature. The countermeasures from previous papers and architectures that are still weak in terms of resource depletion, attack reduction, applicability, etc. are addressed. Finally, the paper discusses and recommends solutions for future work to decrease cyber-attacks in the medical field so that human health can be guaranteed.https://ieeexplore.ieee.org/document/8888271/Dataflowmedical fieldcyber-attacksarchitecturescybersecuritythreats |
spellingShingle | Abdul Razaque Fathi Amsaad Meer Jaro Khan Salim Hariri Shujing Chen Chen Siting Xingchen Ji Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain IEEE Access Dataflow medical field cyber-attacks architectures cybersecurity threats |
title | Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain |
title_full | Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain |
title_fullStr | Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain |
title_full_unstemmed | Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain |
title_short | Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain |
title_sort | survey cybersecurity vulnerabilities attacks and solutions in the medical domain |
topic | Dataflow medical field cyber-attacks architectures cybersecurity threats |
url | https://ieeexplore.ieee.org/document/8888271/ |
work_keys_str_mv | AT abdulrazaque surveycybersecurityvulnerabilitiesattacksandsolutionsinthemedicaldomain AT fathiamsaad surveycybersecurityvulnerabilitiesattacksandsolutionsinthemedicaldomain AT meerjarokhan surveycybersecurityvulnerabilitiesattacksandsolutionsinthemedicaldomain AT salimhariri surveycybersecurityvulnerabilitiesattacksandsolutionsinthemedicaldomain AT shujingchen surveycybersecurityvulnerabilitiesattacksandsolutionsinthemedicaldomain AT chensiting surveycybersecurityvulnerabilitiesattacksandsolutionsinthemedicaldomain AT xingchenji surveycybersecurityvulnerabilitiesattacksandsolutionsinthemedicaldomain |