
A Comparative Analysis of Various Cyber-Attacks: Healthcare System | IJCT Volume 12 – Issue 6 | IJCT-V12I6P54

International Journal of Computer Techniques
ISSN 2394-2231
Volume 12, Issue 6 | Published: November – December 2025
Table of Contents
ToggleAuthor
Prachi Verma, Dr. Ganesh Chandra
Abstract
Healthcare industry plays an important role in everyone’s life. Today, healthcare industry is fully depending on information technology as similar to other domains such as educational, research etc. As a result of technological advancement, healthcare industry opens the door for variety of cyber-attacks. In this paper we present the various types of cyber-attacks that are rapidly taking place in the healthcare industry and we also discuss about the most destructive cyber-attack (case studies) which taken place in healthcare domain and it was observed that due to these cyber-attack case studies, huge losses were suffered. In this paper we also tried to pay attention on the various possible key points which are helpful to keep save the healthcare industry from various cyber-attacks.
Keywords
Healthcare System, Cyber-attacks, Cyber Security.
Conclusion
A definitive objective for medical care suppliers is to give quality medical care administrations by using medical care innovation; in the event that network safety techniques are not as expected executed, then medical care associations should put away more cash managing digital breaks. With additional clinical gadgets becoming web associated and information being moved in an electronic structure, security disappointments are being perceived. The expansion in network protection isn’t the way to addressing this issue; all things being equal, wellbeing leaders need to sort out some way to execute network safety practices and medical care consistence, for example, using review controls.
Current medical care is profoundly interlaced with innovation. From the complicated machines used for diagnosing contamination to the endeavor undertaking frameworks that store patient records, it’s extremely difficult to run any clinical consideration affiliation today without seriously relying upon information advancement. In any case, similarly as with each and every other industry, the chances that accompany IT are not without their dangers—the greatest of these dangers is network safety dangers. Information defilement, unapproved framework access and malware contamination, are a portion of the things you need to monitor as a medical care IT or medical services the board proficient. The accompanying tips are fundamental in raising your medical services frameworks’ network protection to an acceptable level [22].
• Network protection Preparing for Staff
• Apply Programming Updates Expeditiously
• Execute currently demonstrated network safety advancements
• Controlled Framework Access
• Beat the Utilization of One Secret key for All Frameworks down
• Regular Risk Assessment
• Security Inside and out
• Data Recovery
• Protect Mobile Gadgets
References
[1]Cabrera, E. (2016). Health Care: Cyberattacks and How to Fight Back. Journal of Health Care Compliance.
[2]Martin, G., Martin, P., Hankin, C., Darzi, A., & Kinross, J. (2017). Cybersecurity and healthcare: how safe are we?. Bmj, 358.
[3]Li, F., Yan, X., Xie, Y., Sang, Z., & Yuan, X. (2019, October). A Review of Cyber-Attack Methods in Cyber-Physical Power System. In 2019 IEEE 8th International Conference on Advanced Power System Automation and Protection (APAP) (pp. 1335- 1339). IEEE.
[4]Stiawan, D., Idris, M. Y. B., Abdullah, A. H., AlQurashi, M., &Budiarto, R. (2016). Penetration Testing and Mitigation of Vulnerabilities Windows Server. IJ Network Security, 18(3), 501-513.
[5]Slayton, T. B. (2018). Ransomware: The virus attacking the healthcare industry. Journal of Legal Medicine, 38(2), 287-311.
[6]Ransomware attack definition Retrieved March 07,2021, from [7]Gupta, S., Singhal, A., & Kapoor, A. (2016, April). A literature survey on social engineering attacks: Phishing attack. In 2016 international conference on computing, communication and automation (ICCCA) (pp. 537-540). IEEE.
[8]Mouton, F., Malan, M. M., Leenen, L., & Venter, H. S. (2014, August). Social engineering attack framework. In 2014 Information Security for South Africa (pp. 1-9). IEEE.
[9]Data breachRetrieved March 09,2021, from [10]Sethuraman, S. C., Vijayakumar, V., & Walczak, S. (2020). Cyber-attacks on healthcare devices using unmanned aerial vehicles. Journal of medical systems, 44(1), 1-10.
[11]Chernyshev, M., Zeadally, S., &Baig, Z. (2019). Healthcare data breaches: Implications for digital forensic readiness. Journal of medical systems, 43(1), 1-12.
[12]About cyber-attacks in healthcare industry. Retrieved April 10, 2021 from [13]Blackbaud sued after ransomware attack. Retrieved April 10, 2021 from< https://www.securitymagazine.com/articles/93857- blackbaud-sued-after-ransomware-attack > [14]Healthcare data breach report. Retrieved April 10, 2021 from [15]Luxotticacyber attack. Retrieved April 10,2021 from [16]Chen, Y., Dong, F., & Chen, H. (2016). Business process and information security: A cross-listing perspective. Journal of Industrial Integration and Management, 1(02), 1650009.
[17]Gupta, S., Singhal, A., & Kapoor, A. (2016, April). A literature survey on social engineering attacks: Phishing attack. In 2016 international conference on computing, communication and automation (ICCCA) (pp. 537-540). IEEE.
[18]Attacks in healthcare industry, Retrieved may 06, 2021 from [19]Wannacry ransomware. Retrieved april 19, 2021 from Health share of Oregon data breach. Retrieved may 06,2021from
How to Cite This Paper
Prachi Verma, Dr. Ganesh Chandra (2025). A Comparative Analysis of Various Cyber-Attacks: Healthcare System. International Journal of Computer Techniques, 12(6). ISSN: 2394-2231.









