Grin logo
en de es fr
Shop
GRIN Website
Publier des textes, profitez du service complet
Go to shop › Santé - Santé Publique

A Brief Report on Data Breaches in U.S. Healthcare. What, Why, and How?

Titre: A Brief Report on Data Breaches in U.S. Healthcare. What, Why, and How?

Travail de Recherche , 2015 , 20 Pages , Note: 1

Autor:in: Hariesh Rajasekar (Auteur)

Santé - Santé Publique
Extrait & Résumé des informations   Lire l'ebook
Résumé Extrait Résumé des informations

Data breaches in U.S. healthcare have become ubiquitous with modern hackers honing in on healthcare data due to its lucrative economic value. Cyber crooks regard medical identity theft as ‘The triple crown of stolen data’ as it’s worth more than a Social Security Number or credit card number in the internet black market. The black market rate for each partial EHR is $50 as compared to $1 for a stolen Social Security Number or credit card number. With 44% of data breaches that healthcare organizations contribute to, this report analyzes for the evolving security measures and trends in the healthcare industry to protect data from cyber crooks.

An infographic study was carried out to explore the ways by which data is lost, states accounting the most and least number of medical data breaches, and the location of breached information. Outcome of this infographics study is expected to pave the way for possibility of future research and scholarly debate. Potential of cloud computing in healthcare has been taken into account and was analyzed for its benefits of adoption and use, obstacles, and its forecast in the near future.

At the outset, this report is a snapshot of U.S. healthcare’s defensive preparation and strategy against the level of cyber-attacks that will be coming at them, statistical analysis on types of breach impacting healthcare organizations the most, state-wise percentage analysis of medical data breach, and cloud computing as a defensive solution to protect the data from cyber-attacks, and insider threat - disgruntled employees and patient-record snoopers.

Extrait


Inhaltsverzeichnis (Table of Contents)

  • Introduction
  • Arguments
    • Data breaches in healthcare: Can customers' data be better protected by their healthcare institution?
    • Breaches by type: How the data is lost?
    • Cloud storage of medical data: Safe or sloppy?
  • Conclusion
  • References

Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)

This report aims to provide a comprehensive overview of data breaches in the U.S. healthcare system, analyzing the causes, impact, and strategies for mitigating these threats. The report explores the economic value of medical data, the evolving security measures in the healthcare industry, and the potential of cloud computing to enhance data protection.

  • The lucrative economic value of medical data in the black market
  • The various types of data breaches impacting healthcare organizations
  • The importance of implementing effective security practices to protect patient records
  • The role of cloud computing in securing healthcare data
  • The challenges and potential of cloud computing adoption in healthcare

Zusammenfassung der Kapitel (Chapter Summaries)

  • Introduction: This chapter introduces the critical issue of information security in healthcare, highlighting the increasing prevalence of data breaches and the significant economic value of medical data. It provides insights into the motivations of cybercriminals and the potential consequences of medical identity theft.
  • Arguments: This section delves into the arguments surrounding data breaches in healthcare, analyzing the various types of breaches and how data is lost. It examines the potential of cloud computing as a defensive solution to protect healthcare data from cyber-attacks and insider threats.
  • Data breaches in healthcare: Can customers' data be better protected by their healthcare institution?: This chapter explores the challenges and strategies for protecting patient data from breaches within healthcare institutions. It discusses the importance of implementing strong security measures and the need for continuous vigilance against evolving cyber threats.
  • Breaches by type: How the data is lost?: This chapter provides an in-depth analysis of the different types of data breaches impacting healthcare organizations. It examines the causes of each breach type and explores the most common methods employed by cybercriminals.
  • Cloud storage of medical data: Safe or sloppy?: This chapter examines the potential of cloud computing as a solution for secure storage of medical data. It discusses the benefits and challenges of cloud adoption in healthcare, including its potential to enhance data security, improve accessibility, and reduce costs.

Schlüsselwörter (Keywords)

This report centers on the key themes of medical identity theft, the economic value of healthcare data, cyber threats, breach types, defensive strategies, and cloud computing. It analyzes the evolving landscape of cyber security in the healthcare industry and explores the potential of cloud computing to mitigate data breaches and enhance patient safety.

Fin de l'extrait de 20 pages  - haut de page

Résumé des informations

Titre
A Brief Report on Data Breaches in U.S. Healthcare. What, Why, and How?
Université
Northeastern University of Boston
Note
1
Auteur
Hariesh Rajasekar (Auteur)
Année de publication
2015
Pages
20
N° de catalogue
V315187
ISBN (ebook)
9783668151130
ISBN (Livre)
9783668151147
Langue
anglais
mots-clé
data theft data breach healthcare USA fraud internet criminality data loss cloud computing
Sécurité des produits
GRIN Publishing GmbH
Citation du texte
Hariesh Rajasekar (Auteur), 2015, A Brief Report on Data Breaches in U.S. Healthcare. What, Why, and How?, Munich, GRIN Verlag, https://www.grin.com/document/315187
Lire l'ebook
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
  • Si vous voyez ce message, l'image n'a pas pu être chargée et affichée.
Extrait de  20  pages
Grin logo
  • Grin.com
  • Page::Footer::PaymentAndShipping
  • Contact
  • Prot. des données
  • CGV
  • Imprint