Healthcare Data Breaches: Implications for Digital Forensic Readiness

被引:0
|
作者
Maxim Chernyshev
Sherali Zeadally
Zubair Baig
机构
[1] Edith Cowan University,Commonweath Scientific and Industrial Research Organisation (CSIRO)
[2] University of Kentucky,undefined
[3] Data61,undefined
来源
Journal of Medical Systems | 2019年 / 43卷
关键词
Computer crime; Forensics; Health information management; Security; Threat;
D O I
暂无
中图分类号
学科分类号
摘要
While the healthcare industry is undergoing disruptive digital transformation, data breaches involving health information are not usually the result of integration of new technologies. Based on published industry reports, fundamental security safeguards are still considered to be lacking with many documented data breaches occurring as the result of device and equipment theft, human error, hacking, ransomware attacks and misuse. Health information is considered to be one of the most attractive targets for cybercriminals due to its inherent sensitivity, but digital investigations of incidents involving health information are often constrained by the lack of the necessary infrastructure forensic readiness. Following the analysis of healthcare data breach causes and threats, we describe the associated digital forensic readiness challenges in the context of the most significant incident causes. With specific focus on privilege misuse, we present a conceptual architecture for forensic audit logging to assist with capture of the relevant digital artefacts in support of possible future digital investigations.
引用
收藏
相关论文
共 50 条
  • [41] The impact of data breaches on corporations and the status of potential regulation and litigation
    Klaus, Tim
    Elzweig, Brian
    LAW AND FINANCIAL MARKETS REVIEW, 2020, 14 (04): : 255 - 260
  • [42] Contemporaneous notes for digital forensic examinations
    Horsman, Graeme
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2021, 37
  • [43] Counterfeiting and Defending the Digital Forensic Process
    Botas, Alvaro
    Rodriguez, Ricardo J.
    Vaisanen, Teemu
    Zdzichowski, Patrycjusz
    CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1967 - 1972
  • [44] Cloud computing data breaches: A review of US regulation and data breach notification literature
    Kolevski, David
    Michael, Katina
    Abbas, Roba
    Freeman, Mark
    2021 IEEE INTERNATIONAL SYMPOSIUM ON TECHNOLOGY AND SOCIETY (ISTAS21): TECHNOLOGICAL STEWARDSHIP & RESPONSIBLE INNOVATION, 2021,
  • [45] EXPLORING FORENSIC IMPLICATIONS OF THE FUSION DRIVE
    Gupta, Shruti
    Rogers, Marcus
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2014, 9 (02) : 145 - 154
  • [46] Forensic Implications: Adolescent Sexting and Cyberbullying
    Panagiota Korenis
    Stephen Bates Billick
    Psychiatric Quarterly, 2014, 85 : 97 - 101
  • [47] Fatal intussusception in infancy: forensic implications
    Milenko Bogdanović
    Miloš Blagojević
    Jelena Kuzmanović
    Dragan Ječmenica
    Đorđe Alempijević
    Forensic Science, Medicine and Pathology, 2019, 15 : 284 - 287
  • [48] Fatal intussusception in infancy: forensic implications
    Bogdanovic, Milenko
    Blagojevic, Milos
    Kuzmanovic, Jelena
    Jecmenica, Dragan
    Alempijevic, Dorde
    FORENSIC SCIENCE MEDICINE AND PATHOLOGY, 2019, 15 (02) : 284 - 287
  • [49] Forensic Implications: Adolescent Sexting and Cyberbullying
    Korenis, Panagiota
    Billick, Stephen Bates
    PSYCHIATRIC QUARTERLY, 2014, 85 (01) : 97 - 101
  • [50] Reducing data privacy breaches: an empirical study of relevant antecedents and an outcome
    Ifinedo, Princely
    Vachon, Francine
    Ayanso, Anteneh
    INFORMATION TECHNOLOGY & PEOPLE, 2024,