Visible to the public Security Assessment as a Service Cross-Layered System for the Adoption of Digital, Personalised and Trusted Healthcare

TitleSecurity Assessment as a Service Cross-Layered System for the Adoption of Digital, Personalised and Trusted Healthcare
Publication TypeConference Paper
Year of Publication2019
AuthorsMarkakis, E., Nikoloudakis, Y., Pallis, E., Manso, M.
Conference Name2019 IEEE 5th World Forum on Internet of Things (WF-IoT)
Keywordscloud computing, composability, computer security, Cross Layer Security, cyber aware environment, cyber threats, cybersecurity, cybersecurity risk, digital-personalised-trusted healthcare, Health Care, healthcare, Internet of Things, Internet-of-Things, IT healthcare ecosystem, Medical services, Monitoring, pubcrawl, resilience, Resiliency, SAaaS, security assessment as a service, security of data, Sensors, service cross-layered system, Trusted Computing

The healthcare sector is exploring the incorporation of digital solutions in order to improve access, reduce costs, increase quality and enhance their capacity in reaching a higher number of citizens. However, this opens healthcare organisations' systems to external elements used within or beyond their premises, new risks and vulnerabilities in what regards cyber threats and incidents. We propose the creation of a Security Assessment as a Service (SAaaS) crosslayered system that is able to identify vulnerabilities and proactively assess and mitigate threats in an IT healthcare ecosystem exposed to external devices and interfaces, considering that most users are not experts (even technologically illiterate") in cyber security and, thus, unaware of security tactics or policies whatsoever. The SAaaS can be integrated in an IT healthcare environment allowing the monitoring of existing and new devices, the limitation of connectivity and privileges to new devices, assess a device's cybersecurity risk and - based on the device's behaviour - the assignment and revoking of privileges. The SAaaS brings a controlled cyber aware environment that assures security, confidentiality and trust, even in the presence of non-trusted devices and environments.

Citation Keymarkakis_security_2019