Audible会員プラン登録で、12万以上の対象タイトルが聴き放題。

  • Cybersecurity Hygiene for the Healthcare Industry

  • The Basics in Healthcare IT, Health Informatics and Cybersecurity for the Health Sector, Volume 1
  • 著者: James Scott
  • ナレーター: Kelly Rhodes
  • 再生時間: 2 時間 28 分

聴き放題対象外タイトルです。Audible会員登録で、非会員価格の30%OFFで購入できます。

無料体験で、12万以上の対象作品が聴き放題に
アプリならオフライン再生可能
プロの声優や俳優の朗読も楽しめる
Audibleでしか聴けない本やポッドキャストも多数
無料体験終了後は月会費1,500円。いつでも退会できます。
『Cybersecurity Hygiene for the Healthcare Industry』のカバーアート

Cybersecurity Hygiene for the Healthcare Industry

著者: James Scott
ナレーター: Kelly Rhodes
¥ 630で会員登録し購入

無料体験終了後は月額¥1,500。いつでも退会できます。

¥ 900 で購入

¥ 900 で購入

下4桁がのクレジットカードで支払う
ボタンを押すと、Audibleの利用規約およびAmazonのプライバシー規約同意したものとみなされます。支払方法および返品等についてはこちら

あらすじ・解説

Hospitals and the health-care community as a whole have become the most common and lucrative targets for cyberattacks. Many breaches are targeted and sophisticated while others are surprisingly random and simple. The Internet of Things has increased the attack surface with a host of new vulnerabilities, and an alarming number of organizations lack even the most basic cybersecurity hygiene, yet everyone is surprised when there is a breach and sensitive information is exfiltrated.

Bad actors come in all forms, with a multitude of methods, motivations, and exploits, but virtually all of them start with phishing attacks. All it takes is one click on a malicious link, and an entire organization can be infected. The initial goal of a hacker is to obtain legitimate admin credentials then move laterally throughout a network, escalating the level of privileges for access. Exfiltration of sensitive information and injecting falsified content are easy with the right access.

Strangely, the health sector as a whole offers virtually zero training on social engineering or even basic standards for a cybersecurity-centric organizational culture. Continuous education on the latest exploits and techniques used by hackers is a mandatory prerequisite to initiating an environment conducive to security. Regularly patching vulnerabilities in applications used industrywide are crucial as vulnerabilities lead to exploit kits designed to infiltrate and corrupt distracted organizations. The most organized risks to the health sector in the United States come from state-sponsored and hacker-for-hire groups, primarily out of China. Platforms such as Elderwood offer a plethora of new Zero Days to organizations such as Deep Panda, Axiom, and Hidden Lynx, etc., whose sole purpose is to breach networks, exfiltrate data, and corrupt critical infrastructure networks.

©2015 James Scott (P)2015 James Scott

Cybersecurity Hygiene for the Healthcare Industryに寄せられたリスナーの声

カスタマーレビュー:以下のタブを選択することで、他のサイトのレビューをご覧になれます。