Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Real - World Case 7 . 1 Remember, databases are used for a variety of reasons and contain large amounts of secondary data. One significant

Real-World Case 7.1 Remember, databases are used for a variety of reasons and contain large amounts of secondary data. One significant issue that healthcare professionals face is ensuring the data are kept safe and secure. The digitization of healthcare data has created many benefits, but it has also created challenges. A research report from IntSights, Chronic (Cyber) Pain: Exposed and Misconfigured Databases in the Healthcare Industry, reveals how hackers are obtaining personally identified information from exposed databases. It is not only old or outdated databases that get breached, some newly established platforms are vulnerable due to misconfiguration or open access. The researchers found that hackers were able to access sensitive data in databases through such simple methods as Google searches (Landi 2018).Most cybercriminals usually attack for money, but since hospitals dont hold currency, these attackers target the industry for one of three reasons:1.State-sponsored APTs Targeting Critical Infrastructure: An attempt to infiltrate a network to test tools and techniques to set the stage for larger, future hacks, or to obtain information on a specific individuals medical condition.2.Attackers Seeking Personal Data: Attackers seek personal data to use in multiple ways such as sell electronic protected health information, blackmail individuals, or use it as a basis for future fraud like phishing or scam calls.3.Attackers Taking Control of Medical Devices for Ransom: Attackers target medial IT equipment to spread malware that exploits specific vulnerabilities and demands a ransom to release the infected devices (Ainhoren 2018).Many healthcare organizations are working diligently to protect themselves from cyber-attacks and threats. It is important to constantly evaluate for gaps in the IT infrastructure and implement strategies such as assessing what needs to be secured, mastering identity and mobile device management, testing and re-testing tools, detecting and continuously monitoring threats, and training employees (Davis 2017).While secondary data such as databases makes it a powerful tool for data collection, it is important for healthcare professionals to be aware of the threats and challenges presented which include privacy, security, data quality, and more.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Management With Website Development Applications

Authors: Greg Riccardi

1st Edition

0201743876, 978-0201743876

More Books

Students also viewed these Databases questions