The healthcare sector is an appealing target to attackers due to the high value of patient data on the black market. Patient data can be profitable to illegal actors either through direct sale or extortion by ransom. Additionally, employees present a persistent threat as they are able to access the data of almost any patient without reprimand. Without proactive monitoring of audit records, data breaches go undetected and employee behaviour is not deterred. In 2016, 450 data breaches occurred affecting more than 27 million patient records. 26.8% of these breaches were due to hacking and ransomware. In May 2017, a global ransomware campaign adversely affected approximately 48 UK hospitals. Response to this attack, named WannaCry, resulted in ...
The widespread adoption of Electronic Health Records (EHR) increases the requirement for sufficient ...
The growing number and size of clinical medical records (CMRs) represents new opportunities for find...
To allow e-health records to be exploited for research without individual-level consent, The 2015 ...
Access to Electronic Patient Record (EPR) data is audited heavily within healthcare infrastructures....
This research concerns the detection of abnormal data usage and unauthorised access in large-scale c...
© 2017 Association for Computing Machinery. In May 2017, a global ransomware campaign adversely affe...
Hospital critical infrastructures have a distinct threat vector, due to (i) a dependence on legacy s...
The theft of medical data, which is intrinsically valuable, can lead to loss of patient privacy and ...
This research concerns the detection of unauthorised access within hospital networks through the rea...
This research concerns the detection of unauthorised access within hospital networks through the rea...
Electronic health (e-health) system use is growing, which has improved healthcare services significa...
Recent US government initiatives have led to wide adoption of Electronic Health Records (EHRs). More...
Ransomware, software that requires users to pay a ransom in order to access their digitally-stored i...
Establishing a nationwide Electronic Health Record system has become a primary objective for many co...
Healthcare is among the industries most vulnerable to cyberattacks. As it continues to evolve rapidl...
The widespread adoption of Electronic Health Records (EHR) increases the requirement for sufficient ...
The growing number and size of clinical medical records (CMRs) represents new opportunities for find...
To allow e-health records to be exploited for research without individual-level consent, The 2015 ...
Access to Electronic Patient Record (EPR) data is audited heavily within healthcare infrastructures....
This research concerns the detection of abnormal data usage and unauthorised access in large-scale c...
© 2017 Association for Computing Machinery. In May 2017, a global ransomware campaign adversely affe...
Hospital critical infrastructures have a distinct threat vector, due to (i) a dependence on legacy s...
The theft of medical data, which is intrinsically valuable, can lead to loss of patient privacy and ...
This research concerns the detection of unauthorised access within hospital networks through the rea...
This research concerns the detection of unauthorised access within hospital networks through the rea...
Electronic health (e-health) system use is growing, which has improved healthcare services significa...
Recent US government initiatives have led to wide adoption of Electronic Health Records (EHRs). More...
Ransomware, software that requires users to pay a ransom in order to access their digitally-stored i...
Establishing a nationwide Electronic Health Record system has become a primary objective for many co...
Healthcare is among the industries most vulnerable to cyberattacks. As it continues to evolve rapidl...
The widespread adoption of Electronic Health Records (EHR) increases the requirement for sufficient ...
The growing number and size of clinical medical records (CMRs) represents new opportunities for find...
To allow e-health records to be exploited for research without individual-level consent, The 2015 ...