Threat Analysis and Mitigation for a Secure Healthcare System

Main Article Content

Uday Kiran K, et. al.


The adoption of networked medicinal apparatus has been aided by significant advancements and advances in communication networks and biomedicinal technologies. Medicinal apparatus have advanced tremendously in the last half-century as a result of such advancements. The widespread integration of technology and medicinal apparatus, on the other hand, is continuously creating new attack vectors. The attack surface has grown dramatically while some apparatus are not stand-alone apparatus and are now web-linked. Many apparatus in use today were designed and built without security features years ago. The importance of regulatory bodies has become clear in such a situation. Before a device may be sold, it must be validated and accepted by the FDA. EU, on another hand, uses a decentralized approach and Notified Bodies (NB) to ensure aloft levels, protection, and efficiency of medicinal apparatus sold in European Nation. After the unit has passed rigorous standards such as fine producing techniques, a Quality Management System (QMS), marking, remote testing, performance specifications, and sufficient storage, it is ready to be used. A memorandum for compliance, that remains legally permanent paper work specifying so a gadget complies accompanied by relevant EU needs as well as they are sold inside European nation, will be granted. Nonetheless, that advent for network competence inside medicinal apparatus has resulted in a significant rise in security and privacy-related attacks. Current regulations lack a standardized mechanism for determining a single protection, safety, and privacy risk that has an impact on patients' health. This study proposes the ISSP Probability Evaluation Architecture for evaluating device's danger category as well as necessary safety commands in order to close these gaps. It’s later applied to a infuse set illustration summary as well as it is tested farther next to compared with the existing level as well as enactment. Then comparing reveals so system offers an cohesive perspective for assessing various forms about device dangers.


Download data is not yet available.


Metrics Loading ...

Article Details

How to Cite
et. al., U. K. K. . (2021). Threat Analysis and Mitigation for a Secure Healthcare System. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(13), 1399–1410.
Research Articles