Social Engineering Attacks in Healthcare Systems: A Survey

Technology runs much of modern society’s daily functions due to how efficient, reliable, and easy it is to access and manage content anywhere at any time. This rapid growth has created an emphasis on cybersecurity to ensure data integrity in today’s digital realm and the future to come. Since more industries are relying on technology, cybersecurity is becoming more utilized as the foundation for success for many companies and individuals alike. However, as these new avenues for communication become part of daily life, cyber threats have also become more prevalent. One of these avenues affected includes healthcare telemedicine (Annaswarmy et al. 2020) which during COVID-19 pandemic provides patients with more convenient methods of medical services. To prevent cyber-attacks on these services through social engineering, among several defense techniques, including machine learning (ML), are being researched to mitigate the effects of human error. This paper provides recent social engineering attacks on healthcare systems, devices, and telemedicine services;and highlights the potential of machine learning in defending against social engineering attacks. © 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.

[1]  Gbadebo Ayoade,et al.  Evolving Advanced Persistent Threat Detection using Provenance Graph and Metric Learning , 2020, 2020 IEEE Conference on Communications and Network Security (CNS).

[2]  T. Annaswamy,et al.  Telemedicine barriers and challenges for persons with disabilities: COVID-19 and beyond , 2020, Disability and Health Journal.

[3]  Marcus K. Rogers,et al.  Detecting Social Engineering , 2005, IFIP Int. Conf. Digital Forensics.

[4]  Diane Dolezel,et al.  Cyber-analytics: Modeling factors associated with healthcare data breaches , 2018, Decis. Support Syst..

[5]  Sajib Sen,et al.  Machine learning in cybersecurity: a comprehensive survey , 2020, The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology.

[6]  Cláudio Gottschalg Duque,et al.  The Answer is in the Text: Multi-Stage Methods for Phishing Detection Based on Feature Engineering , 2020, IEEE Access.