A Systematization of Cybersecurity Regulations, Standards and Guidelines
for the Healthcare Sector
- URL: http://arxiv.org/abs/2304.14955v1
- Date: Fri, 28 Apr 2023 16:19:21 GMT
- Title: A Systematization of Cybersecurity Regulations, Standards and Guidelines
for the Healthcare Sector
- Authors: Maria Patrizia Carello, Alberto Marchetti Spaccamela, Leonardo
Querzoni, Marco Angelini
- Abstract summary: This paper contributes a systematization of the significant cybersecurity documents relevant to the healthcare sector.
We collected the 49 most significant documents and used the NIST cybersecurity framework to categorize key information.
- Score: 5.121113572240309
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: The growing adoption of IT solutions in the healthcare sector is leading to a
steady increase in the number of cybersecurity incidents. As a result,
organizations worldwide have introduced regulations, standards, and best
practices to address cybersecurity and data protection issues in this sector.
However, the application of this large corpus of documents presents operational
difficulties, and operators continue to lag behind in resilience to cyber
attacks. This paper contributes a systematization of the significant
cybersecurity documents relevant to the healthcare sector. We collected the 49
most significant documents and used the NIST cybersecurity framework to
categorize key information and support the implementation of cybersecurity
measures.
Related papers
- Towards AI-enabled Cyber Threat Assessment in the Health Sector [0.0]
The aim of this project is to introduce an AI-enabled platform that collects security relevant information from the outside of a health organization.
The platform delivers a risk score and supports decision makers in healthcare institutions to optimize investment choices for security measures.
arXiv Detail & Related papers (2024-09-19T13:34:34Z) - Securing The Future Of Healthcare: Building A Resilient Defense System For Patient Data Protection [0.0]
The study predicts the severity of healthcare data breaches using a gradientboosting machine learning model.
The findings revealed that hacking and IT incidents are the most common type of breaches in the healthcare industry.
The model evaluation showed that the gradient boosting algorithm performs well.
arXiv Detail & Related papers (2024-07-23T04:25:35Z) - A Security Assessment tool for Quantum Threat Analysis [34.94301200620856]
The rapid advancement of quantum computing poses a significant threat to many current security algorithms used for secure communication, digital authentication, and information encryption.
A sufficiently powerful quantum computer could potentially exploit vulnerabilities in these algorithms, rendering data in insecure transit.
This work developed a quantum assessment tool for organizations, providing tailored recommendations for transitioning their security protocols into a post-quantum world.
arXiv Detail & Related papers (2024-07-18T13:58:34Z) - Navigating the road to automotive cybersecurity compliance [39.79758414095764]
The automotive industry is compelled to adopt robust cybersecurity measures to safeguard both vehicles and data against potential threats.
The future of automotive cybersecurity lies in the continuous development of advanced protective measures and collaborative efforts among all stakeholders.
arXiv Detail & Related papers (2024-06-29T16:07:48Z) - Security in IS and social engineering -- an overview and state of the art [0.6345523830122166]
The digitization of all processes and the opening to IoT devices has fostered the emergence of a new formof crime, i.e. cybercrime.
The maliciousness of such attacks lies in the fact that they turn users into facilitators of cyber-attacks, to the point of being perceived as the weak link'' of cybersecurity.
Knowing how to anticipate, identifying weak signals and outliers, detect early and react quickly to computer crime are therefore priority issues requiring a prevention and cooperation approach.
arXiv Detail & Related papers (2024-06-17T13:25:27Z) - SEvenLLM: Benchmarking, Eliciting, and Enhancing Abilities of Large Language Models in Cyber Threat Intelligence [27.550484938124193]
This paper introduces a framework to benchmark, elicit, and improve cybersecurity incident analysis and response abilities.
We create a high-quality bilingual instruction corpus by crawling cybersecurity raw text from cybersecurity websites.
The instruction dataset SEvenLLM-Instruct is used to train cybersecurity LLMs with the multi-task learning objective.
arXiv Detail & Related papers (2024-05-06T13:17:43Z) - Assessing The Effectiveness Of Current Cybersecurity Regulations And Policies In The US [0.0]
The study evaluates the impact of these regulations on different sectors and analyzes trends in cybercrime data from 2000 to 2022.
The findings highlight the challenges, successes, and the need for continuous adaptation in the face of evolving cyber threats.
arXiv Detail & Related papers (2024-04-17T15:26:55Z) - Purple Llama CyberSecEval: A Secure Coding Benchmark for Language Models [41.068780235482514]
This paper presents CyberSecEval, a comprehensive benchmark developed to help bolster the cybersecurity of Large Language Models (LLMs) employed as coding assistants.
CyberSecEval provides a thorough evaluation of LLMs in two crucial security domains: their propensity to generate insecure code and their level of compliance when asked to assist in cyberattacks.
arXiv Detail & Related papers (2023-12-07T22:07:54Z) - White paper on cybersecurity in the healthcare sector. The HEIR solution [1.3717071154980571]
Patient data, including medical records and financial information, are at risk, potentially leading to identity theft and patient safety concerns.
The HEIR project offers a comprehensive cybersecurity approach, promoting security features from various regulatory frameworks.
These measures aim to enhance digital health security and protect sensitive patient data while facilitating secure data access and privacy-aware techniques.
arXiv Detail & Related papers (2023-10-16T07:27:57Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.