Ayala, L. (2016). Cybersecurity for hospitals and healthcare facilities: A guide to detection and prevention [eBook edition]. Apress. NOTE* If it is your first time accessing O’Reilly, it may prompt you to choose an institution. If so, select "Not Listed? Click Here" from the Institution List and sign in for access using your NU school email address.
Reading: Chapter 6
This chapter provides information on detecting incidents of cyber-attack in a healthcare network environment.
Almulhem, A. (2012). Threat modeling for electronic health record systems. Journal of Medical Systems, 36(5), 2921–2926. This journal article provides an easy-to-digest introduction to threat modeling for electronic health record systems, emphasizing the importance of protecting electronic health records from cyber attacks.
Cagnazzo, M., Hertlein, M., Holz, T., & Pohlmann, N. (2018). Threat modeling for mobile health systems. 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), 2018 IEEE, 314–319. This journal article provides the latest information on mobile health (mHealth) as a means of reducing costs while improving healthcare. A discussion on the cybersecurity implications of using the Internet of Things (IoT) devices in healthcare identifies assets and classifies related threats.
Siegel, C. A., & Sweeney, M. (2020). Cyber strategy: Risk-driven security and resiliency. Auerbach Publications. This e-book describes cybersecurity strategies using several of the industry-standard frameworks discussed in this class. Some of the topics detailed are cyber risks and controls, current and target statement assessments, and measuring cybersecurity plan performance. Chapters 4 and 5 are directly relevant to this assignment.
Farringer, D. R., & Blum, J. D. (2019). Maybe if we turn it off and then turn it back on again? Exploring health care reform as a means to curb cyber attacks. Journal of Law, Medicine & Ethics, 47, 91–102.
Ameen, N., Tarhini, A., Shah, M. H., Madichie, N., Paul, J., & Choudrie, J. (2021). Keeping customers’ data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce. Computers in Human Behavior, 114. This study looks at the impact of human behavior on cybersecurity risk and compliance. The authors make the case based on the increasingly mobile workforce in the field and the known data breaches impacting customer data security.
Siegel, C.A., & Sweeney, M. (2020). Cyber strategy: Risk-driven security and resiliency. Auerbach Publications. This e-book describes cybersecurity strategies using several of the industry-standard frameworks discussed in this class. Some of the topics detailed are cyber risks and controls, current and target statement assessments, and measuring cybersecurity plan performance. This e-book is a valuable tool to have as a reference, and specific chapters are valuable resources for the weekly assignments.