Loading

Healthcare Management System and Cybersecurity
Ali J. Askar

Ali J. Askar, College of Engineering, Al-Iraqia University, Baghdad, Iraq.
Manuscript received on 25 June 2019 | Revised Manuscript received on 08 July 2019 | Manuscript Published on 17 July 2019 | PP: 237-248 | Volume-8 Issue-2S July 2019 | Retrieval Number: B10340782S19/2019©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The using of Electronic Health Record systems in healthcare organizations has increased in the 21st century to improve the medical services. This leads us to force a rapid increase in cyber-attacks all over the world. In the early 2015, Anthem breach was one of the biggest cyber-attack happened in the healthcare system. In nowadays IT systems have used to be dynamic and complex, the strategies of the cyber security against attacks are still static and ineffective. This paper will analyze the breach of Anthem security to evaluate the weakness of its system by using the guidelines of current cyber security in addition to the Systems-Theoretic Accident Model and Process (STAMP) method.
Keywords: Cryptography, Cyber Security, Management System, STAMP, Healthcare Management.
Scope of the Article: Plant Cyber Security