Contact Us | Language: čeština English
Title: | Cyber security in the healthcare sector - Current threats | ||||||||||
Author: | Kotková, Barbora | ||||||||||
Document type: | Conference paper (English) | ||||||||||
Source document: | International Multidisciplinary Scientific GeoConference Surveying Geology and Mining Ecology Management, SGEM. 2022, vol. 22, issue 2.1, p. 11-18 | ||||||||||
ISSN: | 1314-2704 (Sherpa/RoMEO, JCR) | ||||||||||
Journal Impact
This chart shows the development of journal-level impact metrics in time
|
|||||||||||
DOI: | https://doi.org/10.5593/sgem2022/2.1/s07.02 | ||||||||||
Abstract: | Information technology is a common part of human activities today. In most countries of the world, the security, health, and industrial sectors can be established here. The dependence of these sectors on information technology has been significantly strengthened by the global covid-19 pandemic and the current war in Ukraine. Data digitization has brought positives such as availability, fast transmission, and processing of necessary information. As well as negatives as constant attempts to steal, destroy or abuse them. Health care is one of the sectors where it is the target of not only enrichment attacks, but also terrorist motives - the attack causes chaos and panic among the population. The number of such attacks increased dramatically during the covid - 19 pandemic and the military conflict in Ukraine. The article is therefore intended to point out the need for constant evaluation of changing environmental influences and motivations for attacks with regard to the topicality of security. The introduction of the article contains a theoretical framework of the issue with a description of the motivation and behavior of the offender. It goes on to list the most common ways of conducting cyber-attacks. Significant attacks on hospitals in the Czech Republic and around the world are also mentioned. It focuses on their motivation, success and damage caused. Finally, the common characteristic strengths and weaknesses of the SWOT method are evaluated, followed by opportunities and threats. In the end, the current extended recommendations follow the current routine operation of security procedures with an emphasis on changes and new threats in the global environment. | ||||||||||
Full text: | https://epslibrary.at/sgem_jresearch_publication_view.php?page=view&editid1=8468 | ||||||||||
Show full item record |
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |