A Systematization of Cybersecurity Regulations, Standards and Guidelines
for the Healthcare Sector
- URL: http://arxiv.org/abs/2304.14955v1
- Date: Fri, 28 Apr 2023 16:19:21 GMT
- Title: A Systematization of Cybersecurity Regulations, Standards and Guidelines
for the Healthcare Sector
- Authors: Maria Patrizia Carello, Alberto Marchetti Spaccamela, Leonardo
Querzoni, Marco Angelini
- Abstract summary: This paper contributes a systematization of the significant cybersecurity documents relevant to the healthcare sector.
We collected the 49 most significant documents and used the NIST cybersecurity framework to categorize key information.
- Score: 5.121113572240309
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: The growing adoption of IT solutions in the healthcare sector is leading to a
steady increase in the number of cybersecurity incidents. As a result,
organizations worldwide have introduced regulations, standards, and best
practices to address cybersecurity and data protection issues in this sector.
However, the application of this large corpus of documents presents operational
difficulties, and operators continue to lag behind in resilience to cyber
attacks. This paper contributes a systematization of the significant
cybersecurity documents relevant to the healthcare sector. We collected the 49
most significant documents and used the NIST cybersecurity framework to
categorize key information and support the implementation of cybersecurity
measures.
Related papers
- Integrating Cybersecurity Frameworks into IT Security: A Comprehensive Analysis of Threat Mitigation Strategies and Adaptive Technologies [0.0]
The cybersecurity threat landscape is constantly actively making it imperative to develop sound frameworks to protect the IT structures.
This paper aims to discuss the application of cybersecurity frameworks into the IT security with focus placed on the role of such frameworks in addressing the changing nature of cybersecurity threats.
The discussion also singles out such technologies as Artificial Intelligence (AI) and Machine Learning (ML) as the core for real-time threat detection and response mechanisms.
arXiv Detail & Related papers (2025-02-02T03:38:48Z) - Cybersecurity and Frequent Cyber Attacks on IoT Devices in Healthcare: Issues and Solutions [0.0]
Internet of Things (IoT) devices in healthcare have revolutionized patient care, offering improved monitoring, diagnostics, and treatment.
However, the proliferation of these devices has also introduced significant cybersecurity challenges.
This paper reviews the current landscape of cybersecurity threats targeting IoT devices in healthcare, discusses the underlying issues contributing to these vulnerabilities, and explores potential solutions.
arXiv Detail & Related papers (2025-01-20T03:29:07Z) - Towards AI-enabled Cyber Threat Assessment in the Health Sector [0.0]
The aim of this project is to introduce an AI-enabled platform that collects security relevant information from the outside of a health organization.
The platform delivers a risk score and supports decision makers in healthcare institutions to optimize investment choices for security measures.
arXiv Detail & Related papers (2024-09-19T13:34:34Z) - A Security Assessment tool for Quantum Threat Analysis [34.94301200620856]
The rapid advancement of quantum computing poses a significant threat to many current security algorithms used for secure communication, digital authentication, and information encryption.
A sufficiently powerful quantum computer could potentially exploit vulnerabilities in these algorithms, rendering data in insecure transit.
This work developed a quantum assessment tool for organizations, providing tailored recommendations for transitioning their security protocols into a post-quantum world.
arXiv Detail & Related papers (2024-07-18T13:58:34Z) - Navigating the road to automotive cybersecurity compliance [39.79758414095764]
The automotive industry is compelled to adopt robust cybersecurity measures to safeguard both vehicles and data against potential threats.
The future of automotive cybersecurity lies in the continuous development of advanced protective measures and collaborative efforts among all stakeholders.
arXiv Detail & Related papers (2024-06-29T16:07:48Z) - SEvenLLM: Benchmarking, Eliciting, and Enhancing Abilities of Large Language Models in Cyber Threat Intelligence [27.550484938124193]
This paper introduces a framework to benchmark, elicit, and improve cybersecurity incident analysis and response abilities.
We create a high-quality bilingual instruction corpus by crawling cybersecurity raw text from cybersecurity websites.
The instruction dataset SEvenLLM-Instruct is used to train cybersecurity LLMs with the multi-task learning objective.
arXiv Detail & Related papers (2024-05-06T13:17:43Z) - Assessing The Effectiveness Of Current Cybersecurity Regulations And Policies In The US [0.0]
The study evaluates the impact of these regulations on different sectors and analyzes trends in cybercrime data from 2000 to 2022.
The findings highlight the challenges, successes, and the need for continuous adaptation in the face of evolving cyber threats.
arXiv Detail & Related papers (2024-04-17T15:26:55Z) - Purple Llama CyberSecEval: A Secure Coding Benchmark for Language Models [41.068780235482514]
This paper presents CyberSecEval, a comprehensive benchmark developed to help bolster the cybersecurity of Large Language Models (LLMs) employed as coding assistants.
CyberSecEval provides a thorough evaluation of LLMs in two crucial security domains: their propensity to generate insecure code and their level of compliance when asked to assist in cyberattacks.
arXiv Detail & Related papers (2023-12-07T22:07:54Z) - White paper on cybersecurity in the healthcare sector. The HEIR solution [1.3717071154980571]
Patient data, including medical records and financial information, are at risk, potentially leading to identity theft and patient safety concerns.
The HEIR project offers a comprehensive cybersecurity approach, promoting security features from various regulatory frameworks.
These measures aim to enhance digital health security and protect sensitive patient data while facilitating secure data access and privacy-aware techniques.
arXiv Detail & Related papers (2023-10-16T07:27:57Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.