Defining Cybersecurity in Healthcare DOI
Dilli Prasad Sharma, Arash Habibi Lashkari, Mona Parizadeh

et al.

Progress in IS, Journal Year: 2024, Volume and Issue: unknown, P. 35 - 54

Published: Jan. 1, 2024

Language: Английский

Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends DOI Creative Commons
Mohd Javaid, Abid Haleem, Ravi Pratap Singh

et al.

Cyber Security and Applications, Journal Year: 2023, Volume and Issue: 1, P. 100016 - 100016

Published: March 11, 2023

Healthcare information security is becoming a significant responsibility for all healthcare organisations and individuals. Innovative medical equipment apps are vital to patient care, yet they often the target of hackers. Moreover, attackers silently working against data. Once hacker has gained access network, might install ransomware lock down essential services or encrypt files until specified ransom paid. Businesses frequently compelled pay ransom, hoping money eventually recovered since sector time-sensitive. Although less common, network-connected devices can be taken over used distribute incorrect medications alter machine's functionality. So, there need implement cyber in protect information. In comparison other industries, duties industry particularly broad new. This especially true given that data accumulated accessed from various destinations. Data on specific gathered sources, including hospital lab records, insurance fitness apps, trackers gadgets, health portals, many more. It easily protected by using cybersecurity technology. paper briefs about its healthcare. Several tools, traits roles Sector studied. Finally, we identified studied applications For hackers, patient's aggregated regarded as goldmine, providing them with detailed biography an individual, basic information, trends, family history, financial details. The importance emerges numerous endpoints, which weak spots management system also open up infringement infrastructure.

Language: Английский

Citations

115

Deep learning-based intrusion detection approach for securing industrial Internet of Things DOI Creative Commons

Sahar Soliman,

Wed Oudah,

Ahamed Aljuhani

et al.

Alexandria Engineering Journal, Journal Year: 2023, Volume and Issue: 81, P. 371 - 383

Published: Sept. 19, 2023

The widespread deployment of the Internet Things (IoT) into critical sectors such as industrial and manufacturing has resulted in Industrial (IIoT). IIoT consists sensors, actuators, smart devices that communicate with one another to optimize processes. Although provides various benefits both service providers consumers, security privacy remain a big challenge. An intrusion detection system (IDS) been utilized mitigate cyberattacks connected network. However, many existing solutions for IDS suffer from lack comprehensiveness types attack network is exposed to, high feature dimension, models built on out-of-date datasets, focus problem imbalanced datasets. To address aforementioned issues, we propose an intelligent identifying IoT networks. proposed model uses singular value decomposition (SVD) technique reduce data features improve results. We use synthetic minority over-sampling (SMOTE) avoid over-fitting under-fitting issues result biased classification. Several machine learning deep algorithms have implemented classify binary multi-class evaluate efficacy ToN_IoT dataset. approach achieved accuracy rate 99.99% reduced error 0.001% classification, 99.98% 0.016%

Language: Английский

Citations

57

The New Frontier of Cybersecurity: Emerging Threats and Innovations DOI
Daksh Dave,

Gauransh Sawhney,

Pushkar Aggarwal

et al.

Published: Nov. 8, 2023

In today's digitally interconnected world, cybersecurity threats have reached unprecedented levels, presenting a pressing concern for individuals, organizations, and governments. This study employs qualitative research approach to comprehensively examine the diverse of their impacts across various sectors. Four primary categories are identified analyzed, encompassing malware attacks, social engineering network vulnerabilities, data breaches. The delves into consequences these on society at large. findings reveal range key emerging in cybersecurity, including advanced persistent threats, ransomware Internet Things (IoT) exploits. Consequently, it is evident that pose substantial risks both organizations individuals. sophistication diversity necessitate multi-layered cybersecurity. should include robust security measures, comprehensive employee training, regular audits. implications extensive, with potential such as financial loss, reputational damage, compromised personal information. emphasizes importance implementing effective measures mitigate threats. It highlights significance using strong passwords, encryption methods, regularly updating software bolster cyber defenses.

Language: Английский

Citations

11

The Impact of Blockchain Technology Effectiveness in Indonesia's Learning System DOI Open Access
Muhammad Hakiki, Radinal Fadli, Arisman Sabir

et al.

International Journal of Online and Biomedical Engineering (iJOE), Journal Year: 2024, Volume and Issue: 20(07), P. 4 - 17

Published: May 6, 2024

This research investigates the integration of blockchain technology in vocational education Indonesia, evaluating its impact on database system learning outcomes. Involving 86 Indonesian students, this study aims to assess effectiveness improving students’ understanding, skills, and academic performance. Using a quasi-experimental design, findings showed significant improvement outcomes, as evidenced by analysis pre-test post-test scores. The measure with substantial increase approximately 46.50%, emphasizes positive influence student achievement systems course. will contribute valuable information educational institutions, policy makers, educators who wish incorporate new technologies such into their systems. implication is provide recommendations optimizing technology, which significantly affects outcomes realized through facilitating fast efficient access materials, fostering more interactive engaging environment, enhancing understanding industry practices. not only improves quality but also equips students for successful career technology.

Language: Английский

Citations

4

Development of Internet of Things Trainer Kit as a Learning Media for Digital Circuit Subjects in Higher Education DOI Open Access
Waradzi Mustakim, Hansi Effendi, Aswardi Aswardi

et al.

International Journal of Online and Biomedical Engineering (iJOE), Journal Year: 2024, Volume and Issue: 20(09), P. 4 - 16

Published: June 20, 2024

This research and development project aimed to create learning materials in the form of an Internet Things (IoT) trainer kit specifically designed for Digital Circuit course. The goal was enhance student motivation outcomes by facilitating a comprehensive understanding subject matter. methodology employed (R&D) utilizing Instructional Development Institute (IDI) model, which consists define, develop, evaluate stages. Primary data were gathered from experts instrumentation, media, materials, as well feedback lecturers students. findings revealed high level validity IoT media. Media assigned value 0.93, while material provided 0.86. practicality media confirmed favorable responses lecturers, indicating score 87.31%. Additionally, students’ after trial reflected rating 83.25%. Regarding effectiveness, demonstrated success improving outcomes, with gain 77.25%, affirming its effectiveness. In conclusion, Learning is considered valid, practical, effective teaching digital circuits within Electrical Engineering Study Program at Muhammadiyah University West Sumatra. Its utilization expected boost engagement, creativity, potentially overall quality education.

Language: Английский

Citations

3

An Ethereum Private Network for Data Management in Blockchain of Things Ecosystem DOI Open Access
Abdallah Al-Zoubi, Tariq Saadeddin,

Mamoun Aldmour

et al.

International Journal of Online and Biomedical Engineering (iJOE), Journal Year: 2023, Volume and Issue: 19(01), P. 38 - 58

Published: Jan. 17, 2023

The advent of blockchain technology in the development and design smart internet things (IoT) systems offers opportunity to secure transfer data flow, preserve its integrity, provide transparent mechanisms for management. Blockchain has actually attracted applications vital fields because it provides many advantages over centralized database such as traceability, confidentiality, availability trust. A private network most peer-restricted environment big specifically IoT ecosystems. An integrated blockchain-IoT ecosystem which three Raspberry Pi 4 nodes communicate interact a closed loop control via an Ethereum platform efficiently emulated is piloted. proposed (BCoT) adds new layer physical, application layers typical architecture. concept fully decentralized BCoT may find several that call removal single-point failure ensures integrity transparency.

Language: Английский

Citations

4

A Weighting Model of Cybersecurity Parameters Used for Service Placement DOI Open Access
Luan Gashi, Artan Luma, Marika Apostolova

et al.

International Journal of Online and Biomedical Engineering (iJOE), Journal Year: 2023, Volume and Issue: 19(07), P. 88 - 98

Published: June 13, 2023

Most cybersecurity frameworks are based on three major components such as confidentiality, integrity, and availability. All these have their parameters that used to secure network nodes. But finding the most cyber node in a needs measurement method. The aim of paper is offer model can be find nodes considering parameters. This achieved by modelling numeric values respective weights for applied simulated environment where random standing given 30 wireless an example. Then weighted processed with Python programming language giving according needed components. recommend right deploy services securely while avoiding potential vulnerabilities cyber-attacks.

Language: Английский

Citations

2

Mitigating IoT Cyber Security Threats DOI

Olivia Snyder

SSRN Electronic Journal, Journal Year: 2024, Volume and Issue: unknown

Published: Jan. 1, 2024

The Internet of Things, or IoT, may be thought as a network devices that are built with technological components enabling connection to the Internet. While these have positive impacts, they also bring potential security risks possible exploit for malicious cyber actor achieve harm (Ande et al. 2020). Since IoTs vulnerable devices, act additional weak endpoints, which would threaten connected well (2020). Cyber professionals need aware risks, and able mitigate any threats. Research questions should answered by pursuing this topic damage compromise through an IoT occur, whether current risk models adequately consider present threat landscape, effectiveness once employed. research methodology uses quantitative methods follows survey design gathering existing data. This data falls under scope surveying issues wearable smart home cars, followed common threats architectural layers. In doing so, gathered assist in evaluating assessing their relevance environment.

Language: Английский

Citations

0

Defining Cybersecurity in Healthcare DOI
Dilli Prasad Sharma, Arash Habibi Lashkari, Mona Parizadeh

et al.

Progress in IS, Journal Year: 2024, Volume and Issue: unknown, P. 35 - 54

Published: Jan. 1, 2024

Language: Английский

Citations

0