Detection of Cyber-Attacks

  • Ayala L
N/ACitations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Detecting most incidents requires automated analysis tools, system behavior patterns, and an awareness of what to look for among equipment operators, supervisors, and other hospital staff. Hackers try to hide their activities by stealing large amounts of data during peak hours. They deliberately limit the amount of data they steal at any one-time and use common protocols like HTTP or SSL. Hackers also choose a logical pivot point to attack that allows them to spread their malware across the hospital network. The attention of medical equipment operators and the building maintenance engineers is critical to detection of unusual operations and they are usually the first to notice anomalies in equipment and system behavior.

Cite

CITATION STYLE

APA

Ayala, L. (2016). Detection of Cyber-Attacks. In Cybersecurity for Hospitals and Healthcare Facilities (pp. 53–60). Apress. https://doi.org/10.1007/978-1-4842-2155-6_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free