𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Cybersecurity for eHealth: A Simplified Guide to Practical Cybersecurity for Non-technical Stakeholders & Practitioners of Healthcare

✍ Scribed by Emmanuel C. Ogu


Publisher
Routledge
Year
2022
Tongue
English
Leaves
135
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


The modern realities of cybersecurity have uncovered the unpreparedness of many sectors and industries to deal with emerging threats. One of these sectors is the healthcare industry. The pervasiveness and proliferation of online innovation, systems, and applications in global healthcare have created a threat domain wherein policy and regulation struggle to keep pace with development, standardization faces contextual challenges, and technical capacity is largely deficient.

It is now urgent that healthcare professionals know the most relevant concepts and fundamentals of global cybersecurity related to eHealth. Cybersecurity for eHealth: A Practical Guide for Nontechnical Stakeholders and Healthcare Practitioners uses both a rigorous academic and practical professional approach in covering the essentials of cybersecurity. The book:

  • Distills foundational knowledge and presents it in a concise manner that is easily assimilated
  • Draws lessons from real-life case studies across the global healthcare industry to drive home complex principles and insights
  • Helps eHealth professionals to deal more knowledgeably and effectively with the realities of cybersecurity

Written for healthcare professionals without a background in the workings of information and communication technologies, the book presents the basics of cybersecurity and an overview of eHealth. It covers the foundational concepts, perspectives, and applications of cybersecurity in the context of eHealth and traverses the cybersecurity threat landscape to eHealth, including:

  • Threat categories, agents, and objectives
  • Strategies and approaches deployed by various threat agents
  • Predisposing risk factors in cybersecurity threat situations
  • Tools and techniques to protect against cybersecurity incidents

A comprehensive and practical guide, the book discusses approaches and best practices for enhancing personal cybersecurity as well as giving an overview of governance, ethics, and regulation in eHealth.

✦ Table of Contents


Cover
Half Title
Title Page
Copyright Page
Dedication
Table of Contents
Preface
Acknowledgement
Author Bio
Chapter 1: Cybersecurity Basics & Overview of eHealth
Introduction
Cybersecurity Basics & Overview of eHealth
Cybersecurity as a Concept
Overview & Applications of eHealth
Healthcare Data Invariants: Integrity, Confidentiality, and Availability
Healthcare Information & Communication Technology and People
Notes
Chapter 2: The Cybersecurity Threat Landscape for eHealth
Introduction
The Cybersecurity Threat Landscape for eHealth
Threat Agents to Cybersecurity of eHealth
Cybersecurity Incidents in Healthcare
Pertaining People/Users
Pertaining Systems & Devices
Pertaining Infrastructure
Pertaining Processes/Operations
Pertaining Policy
What Are the Risk Factors?
Notes
Chapter 3: Personal Cybersecurity for eHealth Deployments
Introduction
Personal Cybersecurity for eHealth Deployments
The Intuition for Security
Threat Situations: Identification, Isolation, and Containment
Escalation and Reporting
Notes
Chapter 4: Data/Information Security for eHealth Deployments
Introduction
Data/Information Security for eHealth Deployments
Integrity, Confidentiality, and Availability: Invariant and Non-Negotiable
Preserving Integrity
Safeguarding Privacy
Ensuring Confidentiality
Guaranteeing Availability
Notes
Chapter 5: Securing eHealth Systems and Infrastructures
Introduction
Securing eHealth Systems and Infrastructures
Cybersecurity for eHealth: Physical Imperatives
Cybersecurity for eHealth: Logical Imperatives
Cybersecurity for eHealth: Operational Imperatives
Monitoring and Evaluation for Compliance
Understanding Ecosystems of eHealth Deployments
Notes
Chapter 6: Governance, Ethics, and Regulation in eHealth
Introduction
Governance, Ethics, and Regulation in eHealth
Understanding the Goals and Challenges of Regulation
Notable International Legislations
Roles & Responsibilities of Management and Administration
Compliance versus Security
Final Thoughts
Notes
Glossary of Definitions
Bibliography


πŸ“œ SIMILAR VOLUMES


Cybersecurity for Executives: A Practica
✍ Gregory J. Touhill, C. Joseph Touhill πŸ“‚ Library πŸ“… 2014 πŸ› Wiley-AIChE 🌐 English

Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business<ul><li>Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues</li><

Cybersecurity for Executives: A Practica
✍ Gregory J. Touhill, C. Joseph Touhill πŸ“‚ Library πŸ“… 2014 πŸ› Wiley 🌐 English

Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business. Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues; Covers 'W

Practical Cybersecurity Architecture: A
✍ Ed Moyle, Diana Kelley πŸ“‚ Library πŸ“… 2020 πŸ› Packt Publishing 🌐 English

<p><b>Plan and design robust security architectures to secure your organization's technology landscape and the applications you develop</b></p><h4>Key Features</h4><ul><li>Leverage practical use cases to successfully architect complex security structures</li><li>Learn risk assessment methodologies f

Practical Cybersecurity Architecture: A
✍ Diana Kelley, Ed Moyle πŸ“‚ Library πŸ“… 2023 πŸ› Packt Publishing 🌐 English

<p><span>Plan, design, and build resilient security architectures to secure your organization’s hybrid networks, cloud-based workflows, services, and applications </span></p><h4><span>Key Features</span></h4><ul><li><span><span>Understand the role of the architect in successfully creating complex se

Cybersecurity for Hospitals and Healthca
✍ Luis Ayala (auth.) πŸ“‚ Library πŸ“… 2016 πŸ› Apress 🌐 English

<p><p>This book is a wake-up call explaining how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. The vulnerability of the medical equipment inside the hospital to cyber-attacks far eclipses the actual building equipment. A cyber-physical attack on build