Cargando…
Protection of Medical Information Systems Against Cyber Attacks: A Graph Theoretical Approach
Securing electronic health records of patients is the paramount concern in medical information systems which faces unique set of challenges. Safeguarding a health care’s computer network against attacks on its nodes and links requires placing mobile guards on the nodes of a network. Bloom topologies...
Autor principal: | |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer US
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9209834/ https://www.ncbi.nlm.nih.gov/pubmed/35756173 http://dx.doi.org/10.1007/s11277-022-09873-x |
_version_ | 1784730035357220864 |
---|---|
author | Angel, D. |
author_facet | Angel, D. |
author_sort | Angel, D. |
collection | PubMed |
description | Securing electronic health records of patients is the paramount concern in medical information systems which faces unique set of challenges. Safeguarding a health care’s computer network against attacks on its nodes and links requires placing mobile guards on the nodes of a network. Bloom topologies are attractive networks that are potential structures for massively parallel computers. This paper focuses on the evaluation of exact value of the parameters which gives the minimum number of guards required to protect the bloom networks. A linear time algorithm is proposed for finding these parameters. This study is beneficial in locating the minimum number of detection devices or cyber security employees (mobile guards) to be deployed on the significant servers (nodes) of the bloom’s architecture (healthcare system) which is essential for defending the network against a single malware attack by network monitoring. |
format | Online Article Text |
id | pubmed-9209834 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Springer US |
record_format | MEDLINE/PubMed |
spelling | pubmed-92098342022-06-21 Protection of Medical Information Systems Against Cyber Attacks: A Graph Theoretical Approach Angel, D. Wirel Pers Commun Article Securing electronic health records of patients is the paramount concern in medical information systems which faces unique set of challenges. Safeguarding a health care’s computer network against attacks on its nodes and links requires placing mobile guards on the nodes of a network. Bloom topologies are attractive networks that are potential structures for massively parallel computers. This paper focuses on the evaluation of exact value of the parameters which gives the minimum number of guards required to protect the bloom networks. A linear time algorithm is proposed for finding these parameters. This study is beneficial in locating the minimum number of detection devices or cyber security employees (mobile guards) to be deployed on the significant servers (nodes) of the bloom’s architecture (healthcare system) which is essential for defending the network against a single malware attack by network monitoring. Springer US 2022-06-21 2022 /pmc/articles/PMC9209834/ /pubmed/35756173 http://dx.doi.org/10.1007/s11277-022-09873-x Text en © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Article Angel, D. Protection of Medical Information Systems Against Cyber Attacks: A Graph Theoretical Approach |
title | Protection of Medical Information Systems Against Cyber Attacks: A Graph Theoretical Approach |
title_full | Protection of Medical Information Systems Against Cyber Attacks: A Graph Theoretical Approach |
title_fullStr | Protection of Medical Information Systems Against Cyber Attacks: A Graph Theoretical Approach |
title_full_unstemmed | Protection of Medical Information Systems Against Cyber Attacks: A Graph Theoretical Approach |
title_short | Protection of Medical Information Systems Against Cyber Attacks: A Graph Theoretical Approach |
title_sort | protection of medical information systems against cyber attacks: a graph theoretical approach |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9209834/ https://www.ncbi.nlm.nih.gov/pubmed/35756173 http://dx.doi.org/10.1007/s11277-022-09873-x |
work_keys_str_mv | AT angeld protectionofmedicalinformationsystemsagainstcyberattacksagraphtheoreticalapproach |