Cargando…
Protection of Medical Information Systems Against Cyber Attacks: A Graph Theoretical Approach
Securing electronic health records of patients is the paramount concern in medical information systems which faces unique set of challenges. Safeguarding a health care’s computer network against attacks on its nodes and links requires placing mobile guards on the nodes of a network. Bloom topologies...
Autor principal: | |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer US
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9209834/ https://www.ncbi.nlm.nih.gov/pubmed/35756173 http://dx.doi.org/10.1007/s11277-022-09873-x |
Sumario: | Securing electronic health records of patients is the paramount concern in medical information systems which faces unique set of challenges. Safeguarding a health care’s computer network against attacks on its nodes and links requires placing mobile guards on the nodes of a network. Bloom topologies are attractive networks that are potential structures for massively parallel computers. This paper focuses on the evaluation of exact value of the parameters which gives the minimum number of guards required to protect the bloom networks. A linear time algorithm is proposed for finding these parameters. This study is beneficial in locating the minimum number of detection devices or cyber security employees (mobile guards) to be deployed on the significant servers (nodes) of the bloom’s architecture (healthcare system) which is essential for defending the network against a single malware attack by network monitoring. |
---|