Legal Handling of Cyber Attacks on Healthcare Facilities

被引:0
|
作者
Dann, Matthias [1 ]
Nadeborn, Diana [2 ]
机构
[1] WESSING & PARTNER Rechtsanwalte mbB, Arzt & Med Strafrecht, Dusseldorf, Germany
[2] Cybercrime Verfahren Tsambikakis & Partner Rechtsa, Berlin, Germany
关键词
ransomware; legal requirements; sanctions; dealing with cyber attacks; ransom; payments;
D O I
10.1055/a-2392-6194
中图分类号
R5 [内科学];
学科分类号
1002 ; 100201 ;
摘要
Healthcare facilities are popular targets for cyber attacks. Ransomware is used to access sensitive data and systems in order to extort ransom money. To prevent this and restore cyber security as quickly as possible in the event of an attack, there are numerous regulations that stipulate technical and organizational protective measures, among other things.
引用
收藏
页码:453 / 459
页数:7
相关论文
共 50 条
  • [41] Cyber attacks on the nuclear industry
    不详
    NUCLEAR ENGINEERING INTERNATIONAL, 2015, 60 (733): : 35 - 35
  • [42] Detection of complex cyber attacks
    Gregorio-de Souza, Ian
    Berk, Vincent H.
    Giani, Annarita
    Bakos, George
    Bates, Marion
    Cybenko, George
    Madory, Doug
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C31)TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE V, 2006, 6201
  • [43] Weaponized AI for cyber attacks
    Yamin, Muhammad Mudassar
    Ullah, Mohib
    Ullah, Habib
    Katt, Basel
    Journal of Information Security and Applications, 2021, 57
  • [44] Patient transfers between healthcare facilities and referral healthcare facilities
    Parizkova, Cerna R.
    Zaleska, D.
    Cerny, V
    ANESTEZIOLOGIE A INTENZIVNI MEDICINA, 2018, 29 (04): : 224 - 229
  • [45] New Wave Cyber Attacks
    Mison, Angela
    Davies, Gareth
    Eden, Peter
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2022), 2022, : 576 - 582
  • [46] Futuristic cyber-attacks
    Chakkaravarthy, S. Sibi
    Sangeetha, D.
    Rathnam, M. Venkata
    Srinithi, K.
    Vaidehi, V.
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2018, 22 (03) : 195 - 204
  • [47] Weaponized AI for cyber attacks
    Yamin, Muhammad Mudassar
    Ullah, Mohib
    Ullah, Habib
    Katt, Basel
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 57
  • [48] Cyber Attacks: The Fog of Identity
    Greiman, V. A.
    2016 IEEE INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON U.S.), 2016, : 50 - 62
  • [49] Pentagon on lookout for cyber attacks
    Wall, R
    AVIATION WEEK & SPACE TECHNOLOGY, 1999, 150 (16): : 58 - 58
  • [50] Handling User-Oriented Cyber-Attacks: STRIM, a User-Based Security Training Model
    Hamoud, Aymen
    Aimeur, Esma
    FRONTIERS IN COMPUTER SCIENCE, 2020, 2