Cyber Security in Health: Standard Protocols for IoT and Supervisory Control Systems

Cyber Security in Health: Standard Protocols for IoT and Supervisory Control Systems

Bruno J. Santos (Instituto Federal de São Paulo, Brazil), Rachel P. Tabacow (Instituto Federal de São Paulo, Brazil), Marcelo Barboza (Instituto Federal de São Paulo, Brazil & Escola Politécnica da Universidade de São Paulo, Brazil), Tarcisio F. Leão (Instituto Federal de São Paulo, Brazil), and Eduardo G. P. Bock (Instituto Federal de São Paulo, Brazil)
Copyright: © 2022 |Pages: 17
DOI: 10.4018/978-1-6684-6311-6.ch012
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Cyber security in Healthcare is a growing concern. Since it has been a proliferation of IoT devices, data breaches from the healthcare industry are increasing the concern about how cyber security can protect data from connected medical devices. Recent years have seen numerous hacking and IT security incidents. Many healthcare organizations are facing problems to defend their networks from cybercriminals. In the current digital era, the physical world has a cyber-representation. Both the real and virtual worlds are connected in areas, such as informatics and manufacturing. Health 4.0 (H4.0) refers to a group of initiatives aiming to improve medical care for patients, hospitals, researchers, and medical device suppliers. Increasing collaboration in terms of medical equipment, artificial organs, and biosensors is a way to facilitate H4.0. As a result, cyber security budgets have increased, new technology has been purchased, and healthcare organizations are improving at blocking attacks and keeping their networks secure.
Chapter Preview
Top

Background

An increase in attacks and invasions on medical devices has caused regulators to take notice; Food and Drugs Administration (FDA) issued a safety communication in June 2013 entitled “Cybersecurity for Medical Devices and Hospital Networks”. The working group, involving representatives of the FDA, the Office of the National Coordinator for Health Information Technology, and the Federal Communications Commission, has released a report calling for increased private-sector involvement and a risk-based regulatory framework. But the problem is that they did not define the framework, and burdensome with regulation could greatly increase emerging threats. Cyberattack is a clear and present threat in healthcare; thus it is time to organize, convene, and focus in protection of patient data. Since technology has unquestionably improved healthcare, it is mandatory to ensure that the promised benefits continue to be delivered safely (Baheti & Gill, 2011).

An important related topic is Telehealth, an approach that aims to provide high quality health services to people who cannot easily access these services. When it comes to cyber threats and frequently reported health data breaches, many people may be hesitant to use Telehealth-based services. The HIPAA protocol includes comprehensive details that are not always specific to telehealth and is therefore difficult for telehealth professionals to use (Zhou et al., 2019).

Complete Chapter List

Search this Book:
Reset