nsights and trends in cybersecurity breaches in a health and human services department.

Authors

DOI:

https://doi.org/10.62465/rti.v2n2.2023.55

Keywords:

Ciberseguridad, clustering, análisis de patrones, evolución temporal, Entorno Virtual de Aprendizaje

Abstract

In this cybersecurity analysis focused on the healthcare sector, the prominence of HCA Healthcare as a leader in infractions is highlighted, underscoring the critical need to strengthen cybersecurity measures. The diversity of attack vectors, particularly on network servers, emphasizes the critical importance of addressing cybersecurity risks and vulnerabilities in the management of physical documents. The uneven distribution of infractions among entities underscores the urgency of improving cybersecurity in healthcare providers, leading with 562 cases. The temporal evolution reveals a continuous increase in incidents, reaching 539 in 2023, emphasizing the need for robust data protection measures. The analysis of temporal trends highlights the prevalence of "Hacking/IT" and unauthorized access, providing key insights for proactive cybersecurity strategies. In summary, this technical study underscores the critical importance of enhancing cybersecurity in the healthcare sector, addressing specific attack vectors, and emerging trends to mitigate future risks.

Downloads

Download data is not yet available.

References

Bharadwaj, Prakash, K. B., & Kanagachidambaresan, G. R. (2021). Pattern recognition and machine learning. Programming with TensorFlow: Solution for Edge Computing Applications, 105-144. DOI: https://doi.org/10.1007/978-3-030-57077-4_11

Bokan, B., & Santos, J. (2021, April). Managing cybersecurity risk using threat based methodology for evaluation of cybersecurity architectures. In 2021 Systems and Information Engineering Design Symposium (SIEDS) (pp. 1-6). IEEE. DOI: https://doi.org/10.1109/SIEDS52267.2021.9483736

Cando-Segovia, M. R., & Chicaiza, R. P. M. (2021). Prevención en ciberseguridad: enfocada a los procesos de infraestructura tecnológica. 3 c TIC: cuadernos de desarrollo aplicados a las TIC, 10(1), 17-41. DOI: https://doi.org/10.17993/3ctic.2021.101.17-41

Chang, J. E. A. (2020). Análisis de ataques cibernéticos hacia el Ecuador. Editora Adjunta, 2, 18.

Fernández Khatiboun, A. (2018). Machine Learning en Ciberseguridad.

Guaña-Moya, J., Sánchez-Zumba, A., Chérrez-Vintimilla, P., Chulde-Obando, L., Jaramillo-Flores, P., & Pillajo-Rea, C. (2022). Ataques informáticos más comunes en el mundo digitalizado. Revista Ibérica de Sistemas e Tecnologias de Informação, (E54), 87-100.

Hernández, E. F. T., Canizales, R. R., & Páez, A. V. (2021). La importancia de la ciberseguridad y los derechos humanos en el entorno virtual. Misión Jurídica, 14(20), 142-158. DOI: https://doi.org/10.25058/1794600X.1912

Hirare, C. S. (2017). Ciberseguridad. Presentación del dossier. URVIO Revista Latinoamericana de Estudios de Seguridad, (20), 8-15.

Moya, J. G. (2023). La importancia de la seguridad informática en la educación digital: retos y soluciones. RECIMUNDO: Revista Científica de la Investigación y el Conocimiento, 7(1), 609-616. DOI: https://doi.org/10.26820/recimundo/7.(1).enero.2023.609-616

Nicol, D. M. (2020). The Value of Useless Academic Research to the Cyberdefense of Critical Infrastructures. IEEE Security & Privacy, 18(01), 4-7. DOI: https://doi.org/10.1109/MSEC.2019.2951835

Ogunleye, J. O. (2021). The Concept of Data Mining. In Data Mining-Concepts and Applications. IntechOpen.

Quezada Herrera, B. S., & León Yaguana, D. M. (2022). Revisión sistemática de la literatura relacionada con ciberseguridad apoyada con analisis de Big Data para actividades de red Team (Bachelor's thesis).

Timarán Pereira, S. R., Hernández Arteaga, I., Caicedo Zambrano, J., Hidalgo Troya, A., & Alvarado Pérez, J. C. (2016). Descubrimiento de patrones de desempeño académico.

Tsirintanis, K., Azzurro, E., Crocetta, F., Dimiza, M., Froglia, C., Gerovasileiou, V., ... & Katsanevakis, S. (2022). Bioinvasion impacts on biodiversity, ecosystem services, and human health in the Mediterranean Sea. Aquatic Invasions, 17(3), 308-352. DOI: https://doi.org/10.3391/ai.2022.17.3.01

Vishwakarma, G. K., Paul, C., Hadi, A. S., & Elsawah, A. M. (2023). An automated robust algorithm for clustering multivariate data. Journal of Computational and Applied Mathematics, 429, 115219. DOI: https://doi.org/10.1016/j.cam.2023.115219

Published

2023-08-08

How to Cite

Almeida, J. C., Vergara Loor, J., Muñoz Pisco, X., & Guaña-Moya, J. (2023). nsights and trends in cybersecurity breaches in a health and human services department. Revista Tecnopedagogía E Innovación, 2(2), 27–46. https://doi.org/10.62465/rti.v2n2.2023.55

Issue

Section

Artículos