Verified Document

Cyberterrorism In Healthcare Essay

Healthcare and the Threat of Cyber-Terrorism Cyber-Terrorism and Healthcare

Government and military computer networks in the United States have been repeatedly attacked over a period of several years by China, North Korea, and third parties suspected of working for these two states (Gewitz, 2010). Although most of the known attacks by China and North Korea constituted espionage, denial-of-service attacks and network intrusions to assess network vulnerabilities have also occurred. The denial of service attacks are a form of cyber-terrorism. Acts of cyber-terrorism are not limited to governments and can be committed by individuals and groups, either acting alone or in conjunction with a more traditional terrorist organization. In a recent survey of nearly 8,000 American businesses it was revealed that 1.5 million viruses had been detected in 2005 alone (Rantala, 2005, p. 1), so the scale of the problem is considerable.

HIPAA Security Rule

The seriousness of the cyber-terrorism threat will only increase as society becomes more dependent on computer networks to engage in commercial, social, and government transactions. The recently mandated conversion of protected health information (PHI) to a digital format in the United States created a large target for cyber-terrorists. This vulnerability...

6-7). The necessity of such a law was demonstrated recently when it was revealed that 67% of the nearly 8,000 businesses surveyed by the Bureau of Justice Statistics in 2005 experienced a cyber attack (Rantala, 2005, p. 1). Of these, 11% represented cyber theft. Two thirds of all detected network intrusions, close to 13 million, were directed towards critical infrastructure businesses like healthcare, utilities, telecommunications, and transportation (Rantala, 2005, p. 5). Of these, healthcare suffered the longest network downtimes. Of the 423 healthcare businesses responding to the survey, 409 suffered a cyber attack. The threat of cyber terrorism to the healthcare industry is therefore real.
Healthcare is becoming a Terrorist Target

Although healthcare may not be the first target most people think of when imagining more traditional terrorist targets, the recent trend of planting secondary bombs by terrorists in the Middle East to target responding police and emergency medical personnel suggests healthcare services represents a viable terrorist target (Clem, Galwankar, and Buck, 2005, p. 273). Besides using a cyber attack…

Sources used in this document:
References

California Beat. (2011, Aug. 14). Anonymous hackers attack BART, personal information for some riders released. Retrieved Oct. 17, 2011 from http://www.californiabeat.org/2011/08/14/anonymous-hackers-attack-bart-personal-information-for-some-riders-breached

Clem, A., Galwankar, Sagar, and Buck, George. (2005). Health implications of cyber-terrorism. Prehospital and Disaster Medicine, 18, 272-275.

Gewitz, David. (2010). State-sponsored cyberterrorism. Journal of Counterterrorism & Homeland Security International, 16, 8-10.

Rantala, Ramona R. (2008). Cybercrime against Businesses, 2005. Bureau of Justice Statistics Special Report, U.S. Department of Justice. Retrieved Oct. 16, 2011 from http://bjs.ojp.usdoj.gov/content/pub/pdf/cb05.pdf
Scholl, Matthew, Stine, Kevin, Hash, Joan, Bowen, Pauline, Johnson, Arnold, Smith, Carla D. et al. (2008). Information Security: An introductory resource guide for implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule. Publication 800-66 Revision 1. National Institute of Standards and Technology, U.S. Department of Commerce. Retrieved March 14, 2011 from http://csrc.nist.gov/publications/nistpubs/800-66-Rev1/SP-800-66-Revision1.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Cyber Terrorism
Words: 4455 Length: 13 Document Type: Research Paper

Cyber Terrorism The Internet that we know today and use in our everyday lives was founded in the early 1970s. But all through the Cold War, the apprehension of data theft led to the Internet becoming a decentralized system. But it was not until the late 1980s when the Internet, after years and years of research was made available to public. This was a big change because now anyone in the

Enhancing Security in the US Health Sector
Words: 966 Length: 3 Document Type: Term Paper

Confidentiality, Privacy, and Security in HIPAA and HITECH ACTs The increasing rate of greatly publicized security breaches has sparked changes in the attitudes of consumers and business owners. Business leaders can no more neglect the dramatic consequences that security breaches have on company reputation. In the meantime, consumers now demand more remedies and communication from business after a security breach incident. Therefore, this subject remains one of the greatest priorities confronting

Cyber Crime and Corporate Security Insights
Words: 5089 Length: 17 Document Type: Research Paper

CYBER CRIME AND CORPORATE SECURITYAbstractIn the past, various businesses have lost huge sums of money to cybercriminals, while others have experienced severe service disruptions. This has been the case as cyber criminals execute schemes meant to advance certain agendas. For this reason, cybercrime is increasingly being seen as one of the most serious challenges that business enterprises (as well as government agencies) face today. Various surveys conducted in the past

How Public Sector Information Managers Respond to Threats and Challenges...
Words: 2117 Length: 7 Document Type: Research Paper

CHALLENGES AND BIBLICAL PRINCIPLES IN MANAGING INFORMATIONToday, public sector information managers are responsible for the collection, organization, maintenance, and dissemination of information by their respective government agencies and other public organizations. This role has assumed new importance and relevance in recent years as the flow of information continues to intensify. The purpose of this paper is to provide a review of the scholarly literature concerning the ethical and legal issues

Weapons of Mass Destruction WMD Antifa
Words: 3787 Length: 13 Document Type: Research Paper

Weapons of Mass Destruction 1 An electro-magnetic pulse (EMP) attack could crash the American economy and bring virtually every industry to a standstill—such is the reliance of modern business upon the digital infrastructure. Thus, considering an EMP attack is something that government should take very seriously. As more and more of the world becomes dependent upon cyber infrastructure for the maintenance of other systems, the complexity of the security services of a

America Isn't Ready for Real Digital Protection of Its Infrastructure...
Words: 1401 Length: 4 Document Type: Essay

Combating Digital Crime & Digital Terrorism "Describe the overall impact (e.g. economic, social, etc.) of utilizing technologies in combating digital crime and digital terrorism" It has become very obvious over the past few years that the United States' technologies that are supposed to combat cyber attacks on corporate, personal, and government computers are enormously ineffective. Some would say that is an understatement. This paper discusses ways to combat cyber crime and cyber

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now