CS875-2202C-01
Predictions
and Course Synthesis
Unit
10 Discussion Board 2
Raphael Brown
Date:
05/12/22
Sociotechnical
Plan
Before taking the course
on the future and innovation, I had no idea that I was capable of engaging in
critical thought. This seminar was of immense use to me in writing my
dissertation on cybersecurity concerning autonomous cars and trucks. One of the
aspects that contributed to the success of my research was the extensive
implementation of electronic health record (EHR) systems, which I was
responsible for developing while working as a Systems/Network Administrator for
a behavioral healthcare organization. Making decisions promptly that are well
informed during patient care is made easier when patient data are managed using
EHR systems. As a patient's care evolves, there may be more opportunities for
collaboration on many aspects of the patient's treatment. Because many EHR
systems hold personally identifiable information (PII) and protected health
information (PHI), these systems have become desirable targets for
cybercriminals.
Consequently, medical
professionals are obligated to adhere to security best practices while
utilizing these new technologies, which are susceptible to security breaches.
This is necessary to safeguard the patients' information regarding its
availability, integrity, and confidentiality. The Health Insurance Portability
and Accountability Act (HIPAA) Security Rule requires all healthcare providers
to have safeguards to protect patients' protected health information (PHI).
This regulation was passed in 1996. (PHI).
On the other hand, most
healthcare providers do not have the requisite expertise or resources to
implement a proper security and privacy controls to protect the information in
electronic health records. Because these systems are not safeguarded, they are
susceptible to ransomware and other types of invasions. This is the impetus
behind my decision to pursue a career in cybersecurity for autonomous vehicles.
A human error is likely to play a substantial role in most cyberattacks, regardless of whether the error was intentional or unintentional. This may be performed via social engineering and can include both insiders and outsiders. There is also the possibility that cyberattacks would exploit technical systems and network vulnerabilities. Social engineers take advantage of human weaknesses and trust nature (Kano & Nakajima, 2021). Attacks such as phishing, spear phishing, whaling, vishing and smishing, tailgating, and piggybacking continue to be the most popular non-technical attack vectors exploited by cybercriminals to purposely enter the networks of organizations (Jan-Willem & Junger, 2020) These methods of social engineering as well as vulnerabilities in information systems might be used to launch ransomware as well as other types of large-scale assaults.
References
Jan-Willem,
B., & Junger, M. (2020). How effective are social engineering
interventions? A meta-analysis. Information and Computer Security, 28(5),
801-830.https://doi.org/http://dx.doi.org/10.1108/ICS-07-2019-0078
Kano,
Y., & Nakajima, T. (2021, 9-11 March 2021). Trust factors of social
engineering attacks on social networking services. 2021 IEEE 3rd Global
Conference on Life Sciences and Technologies (LifeTech)
No comments:
Post a Comment