Outlines

Mobile Health and Its Security in the Face Cyber Attacks

Author(s):
R S  SharifR S Sharif, F RangrazejeddiF Rangrazejeddi, S R FarrahiS R Farrahi, Sh AnvariSh Anvari, R S SharifR S Sharif1,*
1MS Student, Health Information Management Research Center, Kashan University of Medical Sciences, Kashan, Iran

Shiraz E-Medical Journal:Vol. 19, issue Suppl; e66306
Published online:Feb 23, 2017
Article type:Abstract
Received:Jan 15, 2018
Accepted:Jan 01, 2017
How to Cite:Sharif R S, Rangrazejeddi F, Farrahi S R, Anvari S, Sharif R S. Mobile Health and Its Security in the Face Cyber Attacks.Shiraz E-Med J.2017;19(Suppl):e66306.https://doi.org/10.5812/semj.66306.

Fulltext

Background: Today, mobile phones are used as useful tools in medicine; however, the risks of using them have always been an important
concern of doctors and the medical community. The aim of this study is to evaluate mobile device risks of being attacked
in cyberspace and how to deal with them. Objectives: As we know, mobile phones and other portable electronic devices, including laptops, tablets, and etc. are always one of the favorite targets for small theft. In addition to the financial value of them, they are good choices for online thieves and hackers to access medical databases and IT systems in the medical community. In this work, the author studies the risks of mhealth and the ways to deal with them. These approaches include strong encryption on mobile health systems and a distrust of the links in
unknown emails.

Methods: This study is a review-analysis based on library sources and online articles. Data were collected using the resources available in PubMed-Medline, Springer, Magiran, and the Journal of Medical Internet Research. The results of the most common health
risks were developed as an analytical method. Results: The results showed that ‘Medjacking’ attacker or attackers to devices used in mobile health not only endanger the patient’s health, but are also a threat to the security of information systems used in hospitals or health systems. The best approach to handle such a problem can be by choosing a strong password on the mobile device and using tools such as URL X-ray to open the contents of the emails.

Conclusion: Although, vast use of mobile devices in mhealth increases the risk of virtual attack, using a proper security system
installed on the device can avoid this danger.


Crossmark
Crossmark
Checking
Share on
Cited by
Metrics

Purchasing Reprints

  • Copyright Clearance Center (CCC) handles bulk orders for article reprints for Brieflands. To place an order for reprints, please click here (   https://www.copyright.com/landing/reprintsinquiryform/ ). Clicking this link will bring you to a CCC request form where you can provide the details of your order. Once complete, please click the ‘Submit Request’ button and CCC’s Reprints Services team will generate a quote for your review.
Search Relations

Author(s):

Related Articles