An End-to-End Security Framework for Smart Healthcare Information Sharing against Botnet-based Cyber-Attacks

Author(s):  
Megha Quamara ◽  
B. B. Gupta ◽  
Shingo Yamaguchi
Symmetry ◽  
2020 ◽  
Vol 12 (4) ◽  
pp. 664 ◽  
Author(s):  
Rajeev Kumar ◽  
Abhishek Kumar Pandey ◽  
Abdullah Baz ◽  
Hosam Alhakami ◽  
Wajdi Alhakami ◽  
...  

Growing concern about healthcare information security in the wake of alarmingly rising cyber-attacks is being given symmetrical priority by current researchers and cyber security experts. Intruders are penetrating symmetrical mechanisms of healthcare information security continuously. In the same league, the paper presents an overview on the current situation of healthcare information and presents a layered model of healthcare information management in organizations. The paper also evaluates the various factors that have a key contribution in healthcare information security breaches through a hybrid fuzzy-based symmetrical methodology of AHP-TOPSIS. Furthermore, for assessing the effect of the calculated results, the authors have tested the results on local hospital software of Varanasi. Tested results of the factors are validated through the comparison and sensitivity analysis in this study. Tabulated results of the proposed study propose a symmetrical mechanism as the most conversant technique which can be employed by the experts and researchers for preparing security guidelines and strategies.


2017 ◽  
pp. 263-278
Author(s):  
Deepak Puthal ◽  
Surya Nepal ◽  
Rajiv Ranjan ◽  
Jinjun Chen

2018 ◽  
pp. 309-324 ◽  
Author(s):  
Asmeret Bier Naugle ◽  
Austin Silva ◽  
Munaf Aamir

Even with substantial investment in cyber defense, the risk of harm from cyber attacks is significant for many organizations. Multi-organization information-sharing programs have the potential to improve cyber security at relatively low cost by allowing organizations that face similar threats to share information on vulnerabilities, attacks, and defense strategies. The dynamics of an information-sharing program are likely to depend heavily on interactions between human decision makers. This article describes a system dynamics model of an information-sharing program. The model incorporates decision-making strategies of managers and cyber defenders in each participating organization. The model was used to assess how free-riding behavior is likely to affect the success of a multi-organization information-sharing program. Results shows that free riding may make information sharing more volatile and less beneficial early on, but other factors, including cost savings and the perceived utility of shared information, are likely to create success later in the time horizon.


Author(s):  
Amtul Waheed ◽  
Jana Shafi

Smart cities are established on some smart components such as smart governances, smart economy, science and technology, smart politics, smart transportation, and smart life. Each and every smart object is interconnected through the internet, challenging the security and privacy of citizen's sensitive information. A secure framework for smart cities is the only solution for better and smart living. This can be achieved through IoT infrastructure and cloud computing. The combination of IoT and Cloud also increases the storage capacity and computational power and make services pervasive, cost-effective, and accessed from anywhere and any device. This chapter will discuss security issues and challenges of smart city along with cyber security framework and architecture of smart cities for smart infrastructures and smart applications. It also presents a general study about security mechanism for smart city applications and security protection methodology using IOT service to stand against cyber-attacks.


From the first community cybersecurity exercise the CIAS at UTSA conducted in San Antonio in 2002, information sharing has been a key element of the community cybersecurity program. Information sharing is essential in the protection and detection aspects of programs such as the NIST cyber security framework. Information sharing helps to alert other organizations to ongoing reconnaissance and attack efforts by attackers. When it comes to cybersecurity, organizations are not in competition with each other but instead are partners in a mutual defense against attackers. This has not been an easy lesson to learn, and it has taken time, but today, there are many robust information sharing programs that help various sectors and geographic regions to band together to help each other in efforts to thwart attacks against any member of the group. Information sharing is an integral part of the community cyber security maturity model and can in fact help provide a catalyst to launch an overall cybersecurity program for a community.


2011 ◽  
pp. 178-184
Author(s):  
David Parry

The World Wide Web (WWW) is a critical source of information for healthcare. Because of this, systems for allowing increased efficiency and effectiveness of information retrieval and discovery are critical. Increased intelligence in web pages will allow information sharing and discovery to become vastly more efficient .The semantic web is an umbrella term for a series of standards and technologies that will support this development.


Author(s):  
Quinn E. Lanzendorfer

Cyber-attacks happen faster and more spontaneously than traditional warfare. This cyber landscape offers new challenges to organizations due to its unique nature. Building organizations to defend against cyber terrorism and innovating offensive solutions calls for strong information sharing amongst government and military organizations, as well as industry partners. Using an innovative electronic method to collect quantitative and qualitative data from experts, this study seeks to explore the effectiveness and establishment of information sharing practices and procedures in U.S. government cybersecurity organizations. This study also considers the impact of media leaks and terrorism on information sharing practices and procedures.


Sign in / Sign up

Export Citation Format

Share Document