Saturday, May 14, 2022

Sociotechnical Plan Summarization

 

CS875-2202C-01

Predictions and Course Synthesis

Unit 10 Discussion Board 2

Raphael Brown

Date: 05/12/22

 

Sociotechnical Plan Summarization


Before taking the course on the future and innovation, I had no idea that I was capable of engaging in critical thought. This seminar was of immense use to me in writing my dissertation on cybersecurity concerning autonomous cars and trucks. One of the aspects that contributed to the success of my research was the extensive implementation of electronic health record (EHR) systems, which I was responsible for developing while working as a Systems/Network Administrator for a behavioral healthcare organization. Making decisions promptly that are well informed during patient care is made easier when patient data are managed using EHR systems. As a patient's care evolves, there may be more opportunities for collaboration on many aspects of the patient's treatment. Because many EHR systems hold personally identifiable information (PII) and protected health information (PHI), these systems have become desirable targets for cybercriminals.

Consequently, medical professionals are obligated to adhere to security best practices while utilizing these new technologies, which are susceptible to security breaches. This is necessary to safeguard the patients' information regarding its availability, integrity, and confidentiality. The Health Insurance Portability and Accountability Act (HIPAA) Security Rule requires all healthcare providers to have safeguards to protect patients' protected health information (PHI). This regulation was passed in 1996. (PHI).

On the other hand, most healthcare providers do not have the requisite expertise or resources to implement a proper security and privacy controls to protect the information in electronic health records. Because these systems are not safeguarded, they are susceptible to ransomware and other types of invasions. This is the impetus behind my decision to pursue a career in cybersecurity for autonomous vehicles.

A human error is likely to play a substantial role in most cyberattacks, regardless of whether the error was intentional or unintentional. This may be performed via social engineering and can include both insiders and outsiders. There is also the possibility that cyberattacks would exploit technical systems and network vulnerabilities. Social engineers take advantage of human weaknesses and trust nature (Kano & Nakajima, 2021). Attacks such as phishing, spear phishing, whaling, vishing and smishing, tailgating, and piggybacking continue to be the most popular non-technical attack vectors exploited by cybercriminals to purposely enter the networks of organizations (Jan-Willem & Junger, 2020) These methods of social engineering as well as vulnerabilities in information systems might be used to launch ransomware as well as other types of large-scale assaults.


References

Jan-Willem, B., & Junger, M. (2020). How effective are social engineering interventions? A meta-analysis. Information and Computer Security, 28(5), 801-830.https://doi.org/http://dx.doi.org/10.1108/ICS-07-2019-0078

Kano, Y., & Nakajima, T. (2021, 9-11 March 2021). Trust factors of social engineering attacks on social networking services. 2021 IEEE 3rd Global Conference on Life Sciences and Technologies (LifeTech)

No comments:

Post a Comment

Sociotechnical Plan Summarization

  CS875-2202C-01 Predictions and Course Synthesis Unit 10 Discussion Board 2 Raphael Brown Date: 05/12/22   Sociotechnical Pla...