Commentary - (2022) Volume 7, Issue 1
Received: 05-Jan-2022, Manuscript No. apn-22-54603;
Editor assigned: 07-Jan-2022, Pre QC No. P-54603;
Reviewed: 10-Jan-2022, QC No. Q-54603;
Revised: 15-Jan-2022, Manuscript No. R-54603;
Published:
20-Jan-2022
, DOI: 10.4172/ apn.2022.07.243
Citation: Singh, Samir. "Conduct Reactions to a Digital Assault in a Medical Clinic Climate." Adv Practice Nurs 7 (2022): 243. DOI: 10.4172/ apn.2022.07.243
Copyright: © 2022 Singh S. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Critical infrastructure (CI) institutions (for example, power grids, telecommunications networks, and healthcare facilities) ensure the availability of services and goods required by our society and economy. Cyberattacks on CI pose a serious risk because they jeopardise critical supply chains. Healthcare institutions, particularly hospitals, have a unique place among CI. They help to keep public services running and play an important role in saving people's lives. Furthermore, they generate, process, and store vast quantities of valuable medical data from thousands of patients. However, the combination of insufficient security for networked medical devices and surrounding systems, as well as a lack of physical entry barriers, makes these institutions easy targets for cybercriminals [1]. Due to these circumstances, we have already seen large-scale, non-targeted, and targeted attacks in the past. According to a 2017 study, 64 percent of all German hospitals have been victims of cybercrime. Hospitals are targeted by ransomware attackers in addition to nontargeted attacks. In September 2020, the German university medical centre of Duesseldorf was subjected to a large-scale ransomware attack. As a result, emergency care and major parts of the hospital infrastructure were disrupted [2].
Critical patient treatment areas such as operating rooms, emergency departments, intermediate care, and intensive care units are critical to the patient's well-being. Patients may suffer harm or die if a system is not available. Technical attack vectors exist in these systems due to the prevalence of networked medical devices. Patients rely on the medical equipment working properly and the medical staff using it correctly. In medical settings, crisis behaviours, in particular, play an important role [3]. Despite the fact that decisions are made by medical professionals, technically supported medical decision-making is critical in critical care areas. As a result, when dealing with cyberattacks, human behaviours must be considered.
In terms of cyber security, the human factor is either described as the "weakest link" or as one of the strongest defences. There are few published studies on IT-security incidents in a hospital setting. Different approaches have been used in behavioural research on victims of cyberattacks and the consequences of such attacks to investigate stress levels, socio-psychological impacts, and effects on team performance in general [4]. These works have demonstrated a strong interaction between psychological and technical factors in a public-interest topic. Nurses' behaviour is critical in ensuring patient safety because they provide critical care in a high-demand, low-control, and high-risk environment. Because time is a critical factor in critical situations, their actions must be made quickly and under uncertain conditions.
The presented lab study provides insight into the nursing staff's behaviours during a simulated cyberattack on an Intermediate Care (IMC) ward's monitoring system. An IMC Ward typically includes advanced monitoring capabilities as well as the ability to use nearly all intensive care measurements. These facilities are intended for patients who require close monitoring but do not require the full spectrum of intensive care. We created a simulation of an attacker tampering with the values of vital monitors in order to make incorrect medical decisions [5]. Although this behaviour has not yet been observed in practise, it is technically possible as long as attackers have physical access to the device or access to the hospital network.
None.
Google Scholar, Crossref, Indexed at
Google Scholar, Crossref, Indexed at
Google Scholar, Crossref, Indexed at
Journal of Advanced Practices in Nursing received 410 citations as per Google Scholar report