| Literature DB >> 30634962 |
Salem T Argaw1, Nefti-Eboni Bempong1, Bruce Eshaya-Chauvin1, Antoine Flahault2.
Abstract
BACKGROUND: The health sector has quickly become a target for cyberattacks. Hospitals are especially sensitive to these sorts of attacks as any disruption in operations or even disclosure of patient personal information can have far-reaching consequences. The objective of this study was to map the available literature on cyberattacks on hospitals and to identify the different domains of research, while extracting the recommendations and guidelines put forth in the literature.Entities:
Keywords: Cyberattacks; Cybersecurity recommendations; Hospital cybersecurity; Medical device security
Mesh:
Year: 2019 PMID: 30634962 PMCID: PMC6330387 DOI: 10.1186/s12911-018-0724-5
Source DB: PubMed Journal: BMC Med Inform Decis Mak ISSN: 1472-6947 Impact factor: 2.796
Fig. 1Study Selection Process in accordance with PRISMA guidelines
Fig. 2Yearly distribution of publications
Fig. 3Publications concentrated on the cybersecurity of specific medical specialties
Identified domains of research and types of studies
| Research domain | Brief description of research domain | Number of articles | Study design with reference |
|---|---|---|---|
| Context and trends in cybersecurity | Explores context of the field, formulates definitions of pertinent terms, offers generalized recommendations, and describes trends in cybersecurity. | 27 | - Literature review [ |
| Connected medical devices and equipment | Discusses the development, research, and security of connected medical devices and equipment (includes implantable and wearable devices found in neurology, cardiology, endocrinology, mental health, and radiology) | 29 | - Summative report [ |
| Hospital information systems (HIS) | Offers methods for evaluating HIS, discusses security concerns of electronic health records, and proposes specific recommendations. Also includes discussions on data security and cloud-based storage. | 14 | - Descriptive study [ |
| Raising awareness and lessons learned | Discusses previous attacks and lessons learned, as well as training programs for various players. Also proposes and evaluates methods for the dissemination of information. | 6 | - Descriptive study [ |
| Information security methodology | Discusses network security, multifactor authentication, encryption, password protection, updates and others. | 15 | - Technical paper [ |
| Specific types of attacks (i.e. ransomware, phishing, and social engineering attacks) | Offers definitions, background information, and recommendations specific to these attack types in the context of hospitals. | 6 | - Descriptive study [ |