Next generation cyber security solution for an eHealth organization

Hossam Ahmed, Abeer Alsadoon, P. W. C. Prasad, N. Costadopoulos, Lau Siong Hoe, Amr Elchoemi

Research output: Chapter in Book / Conference PaperConference Paperpeer-review

4 Citations (Scopus)

Abstract

eHealth organizations are a major target for hackers as they hold wealth of information. Current cyber security solutions for eHealth organizations are not comprehensive and only protect certain security layer. Therefore; the need for a next generation cyber security solution is increasing, a solution that is smart, scalable and adoptable to challenges. The wide spread of security tools and advancing technology have provided the needed infrastructure to create a comprehensive eHealth security solution. Connecting the right security tools together to ensure the overall security without affecting the network performance and user productivity is hard and requires special setup. The network layer is a major target for any eHealth organization, this research has indicated several network security metrics that need to be considered when designing and managing network security for an eHealth organization. The ultimate goal of this research is to identify the limitations in the current eHealth organization cyber security solutions specially the network layer and propose a next generation cyber security solution for eHealth organizations.
Original languageEnglish
Title of host publicationProceedings of the 5th International Conference on Information and Communication Technology (ICoICT 2017), Melaka, Malaysia, May 17 - 19, 2017
PublisherIEEE
Number of pages5
ISBN (Print)9781509049127
DOIs
Publication statusPublished - 2017
EventInternational Conference on Information and Communication Technology -
Duration: 17 May 2017 → …

Conference

ConferenceInternational Conference on Information and Communication Technology
Period17/05/17 → …

Fingerprint

Dive into the research topics of 'Next generation cyber security solution for an eHealth organization'. Together they form a unique fingerprint.

Cite this