BMC Medical Ethics | |
It takes a pirate to know one: ethical hackers for healthcare cybersecurity | |
Debate | |
Giorgia Lorenzini1  David Martin Shaw2  Bernice Simone Elger3  | |
[1] Institute for Biomedical Ethics, Faculty of Medicine, University of Basel, Bernoullistrasse 28, 4056, Basel, Switzerland;Institute for Biomedical Ethics, Faculty of Medicine, University of Basel, Bernoullistrasse 28, 4056, Basel, Switzerland;Care and Public Health Research Institute, Faculty of Health, Medicine and Life Sciences, Maastricht University, Maastricht, The Netherlands;Institute for Biomedical Ethics, Faculty of Medicine, University of Basel, Bernoullistrasse 28, 4056, Basel, Switzerland;Center of Legal Medicine, Faculty of Medicine, University of Geneva, Geneva, Switzerland; | |
关键词: Cybersecurity; Hacker ethics; Health data; Penetration test; | |
DOI : 10.1186/s12910-022-00872-y | |
received in 2022-07-07, accepted in 2022-12-03, 发布年份 2022 | |
来源: Springer | |
【 摘 要 】
Healthcare cybersecurity is increasingly targeted by malicious hackers. This sector has many vulnerabilities and health data is very sensitive and valuable. Consequently, any damage caused by malicious intrusions is particularly alarming. The consequences of these attacks can be enormous and endanger patient care. Amongst the already-implemented cybersecurity measures and the ones that need to be further improved, this paper aims to demonstrate how penetration tests can greatly benefit healthcare cybersecurity. It is already proven that this approach has enforced cybersecurity in other sectors. However, it is not popular in healthcare since many prejudices still surround the hacking practice and there is a lack of education on hackers’ categories and their ethics. The present analysis aims to comprehend what hacker ethics is and who ethical hackers are. Currently, hacker ethics has the status of personal ethics; however, to employ penetration testers in healthcare, it is recommended to draft an official code of ethics, comprising principles, standards, expectations, and best practices. Additionally, it is important to distinguish between malicious hackers and ethical hackers. Amongst the latter, penetration testers are only a sub-category. Acknowledging the subtle differences between ethical hackers and penetration testers allows to better understand why and how the latter can offer their services to healthcare facilities.
【 授权许可】
CC BY
© The Author(s) 2022
【 预 览 】
Files | Size | Format | View |
---|---|---|---|
RO202305066043055ZK.pdf | 1108KB | download | |
Fig. 5 | 2280KB | Image | download |
【 图 表 】
Fig. 5
【 参考文献 】
- [1]
- [2]
- [3]
- [4]
- [5]
- [6]
- [7]
- [8]
- [9]
- [10]
- [11]
- [12]
- [13]
- [14]
- [15]
- [16]
- [17]
- [18]
- [19]
- [20]
- [21]
- [22]
- [23]
- [24]
- [25]
- [26]
- [27]
- [28]
- [29]
- [30]
- [31]
- [32]
- [33]
- [34]
- [35]
- [36]
- [37]
- [38]
- [39]