Cargando…

Protection of Medical Information Systems Against Cyber Attacks: A Graph Theoretical Approach

Securing electronic health records of patients is the paramount concern in medical information systems which faces unique set of challenges. Safeguarding a health care’s computer network against attacks on its nodes and links requires placing mobile guards on the nodes of a network. Bloom topologies...

Descripción completa

Detalles Bibliográficos
Autor principal: Angel, D.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer US 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9209834/
https://www.ncbi.nlm.nih.gov/pubmed/35756173
http://dx.doi.org/10.1007/s11277-022-09873-x
_version_ 1784730035357220864
author Angel, D.
author_facet Angel, D.
author_sort Angel, D.
collection PubMed
description Securing electronic health records of patients is the paramount concern in medical information systems which faces unique set of challenges. Safeguarding a health care’s computer network against attacks on its nodes and links requires placing mobile guards on the nodes of a network. Bloom topologies are attractive networks that are potential structures for massively parallel computers. This paper focuses on the evaluation of exact value of the parameters which gives the minimum number of guards required to protect the bloom networks. A linear time algorithm is proposed for finding these parameters. This study is beneficial in locating the minimum number of detection devices or cyber security employees (mobile guards) to be deployed on the significant servers (nodes) of the bloom’s architecture (healthcare system) which is essential for defending the network against a single malware attack by network monitoring.
format Online
Article
Text
id pubmed-9209834
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Springer US
record_format MEDLINE/PubMed
spelling pubmed-92098342022-06-21 Protection of Medical Information Systems Against Cyber Attacks: A Graph Theoretical Approach Angel, D. Wirel Pers Commun Article Securing electronic health records of patients is the paramount concern in medical information systems which faces unique set of challenges. Safeguarding a health care’s computer network against attacks on its nodes and links requires placing mobile guards on the nodes of a network. Bloom topologies are attractive networks that are potential structures for massively parallel computers. This paper focuses on the evaluation of exact value of the parameters which gives the minimum number of guards required to protect the bloom networks. A linear time algorithm is proposed for finding these parameters. This study is beneficial in locating the minimum number of detection devices or cyber security employees (mobile guards) to be deployed on the significant servers (nodes) of the bloom’s architecture (healthcare system) which is essential for defending the network against a single malware attack by network monitoring. Springer US 2022-06-21 2022 /pmc/articles/PMC9209834/ /pubmed/35756173 http://dx.doi.org/10.1007/s11277-022-09873-x Text en © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Article
Angel, D.
Protection of Medical Information Systems Against Cyber Attacks: A Graph Theoretical Approach
title Protection of Medical Information Systems Against Cyber Attacks: A Graph Theoretical Approach
title_full Protection of Medical Information Systems Against Cyber Attacks: A Graph Theoretical Approach
title_fullStr Protection of Medical Information Systems Against Cyber Attacks: A Graph Theoretical Approach
title_full_unstemmed Protection of Medical Information Systems Against Cyber Attacks: A Graph Theoretical Approach
title_short Protection of Medical Information Systems Against Cyber Attacks: A Graph Theoretical Approach
title_sort protection of medical information systems against cyber attacks: a graph theoretical approach
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9209834/
https://www.ncbi.nlm.nih.gov/pubmed/35756173
http://dx.doi.org/10.1007/s11277-022-09873-x
work_keys_str_mv AT angeld protectionofmedicalinformationsystemsagainstcyberattacksagraphtheoreticalapproach