SECURITY THREATS & RISK IN HEALTHCARE gain access to employee information to get access to patient information. If encrypted emails are not used to share patient information or financipart 25139 WORDS

SECURITY THREATS & RISK IN HEALTHCARE gain access to employee information to get access to patient information. If encrypted emails are not used to share patient information or financipart 25139 WORDS

$0.69
Add To Cart

SECURITY THREATS & RISK IN HEALTHCARE part 2

5139 WORDS

 

gain access to employee information to get access to patient information. If encrypted emails are not used to share patient information or financial information via email, then it will be easy for the hacker to steal sensitive information that is not supposed to be shared with the public. Some precautions that personnel must take are to ensure that the website is secured and official before using their login or password. Additionally, a phishing attack can start with something as simple as an email being sent. Within the e-mail, the cybercriminal might ask the computer user to provide or update their information by following an URL link in the e-mail ( Mohammad, Thabtah, & McCluskey, 2015).

 

Denial of Service (DoS).

 

The Denial of Service (DoS) attack flood computer systems with data packets. The cybercriminals’ goal is to use specialized software to overload the computer system so that they can gain access to specific information. A DoS attack is difficult to mitigate being that multiple attacks can occur concurrently. The cybercriminal uses Botnets to scan the computer system and then the hacker takes full control of the computer system. Healthcare providers can reduce DoS attacks by ensuring that the firewall is up-to-date and turned on. Personnel can help take precaution by staying away from unknown websites and refraining from opening emails from unknown individuals (Turban, 2012).

 

Backdoor.

 

 Backdoor is a tactic used to install keylogging software. With the keylogging software, cybercriminals can monitor the activity of the computer user and eventually take control of the computer system. With this software, hackers are able to illegally access your computer system. The backdoor tactic is also used to tamper with computer files, steal information, and install unwanted software on the computer system. Once again, opening an email from an unknown person is another way that this tactic is used to install malicious software  (Chen, et al., 2012, p. 2).

 

Spoofing.