Sei sulla pagina 1di 14

NEED OF CYBER SECURITY

IN HEALTHCARE INDUSTRY

GUIDED BY: PRESENTED BY:


Dr.P.K.Pattnayak Ms.Sushree Bharati
Professor M.Tech Schoolr
School of Computer School of Computer
Engineering Engineering
KIIT University KIIT University

26-03-2019 1
CONTENT

 INTRODUCTION

26-03-2019
 OBJECTIVE
 PROPOSED SCHEME
 RESULTS & DISCUSSION
 CONCLUSION
 FUTURE WORKS
 REFERENCES

2
INTRODUCTION

26-03-2019
twuye

3
LITERATURE REVIEW

26-03-2019
SL. TOPIC AUTHORS DESCRIPTION OF REFERENCE
NO.

1. Issues and Kumar, P described Several techniques in the


Challenges of (2019). literature to improve performance and
Load Balancing et.al resource use based on load balancing,
Techniques in task scheduling, resource management,
Cloud quality of service, and workload
Computing: A management. Load balancing in the
Survey. cloud allows data centers to avoid
overloading/underloading in virtual
machines, which itself is a challenge in
the field of cloud computing.

4
CONT...

26-03-2019
SL. TOPIC AUTHORS DESCRIPTION OF REFERENCE
NO.

2. An Nigel Presented cyber security risks and


Introduction Stanlel et. challenges for the medical device
to medical al manufacturing community on a
device cyber daily basis.
security Demonstrated with the assistance
of experts in cyber security and
product testing device
manufacturers can get ahead of
the curve and build vibrant,
secure, international businesses
that embrace modern, internet
based technologies.

5
CONT...

26-03-2019
SL. TOPIC AUTHORS DESCRIPTION OF REFERENCE
NO.

3. Understanding Sharifah described IT security


and Defending Roziah et. perspectives taken into
Against al consideration due to problems with
Mobile information disclosure, privacy and
Botnets: A risks of human threats, many
Case Study entities and individuals are
concerned about the future of
information sharing and its
management while projecting data
protection

stated continues improvement in


online platforms will make the
public more confident and assured
with using social media platforms. 6
CONT...

26-03-2019
SL. TOPIC AUTHORS DESCRIPTION OF REFERENCE
NO.

4. Health Care Joshua described Data collected for the


Industry Corman et. good of patients and used to
Cyber al develop new treatments can be
Security Task used for nefarious purposes such
Force as fraud, identity theft, supply
chain disruptions, the theft of
research and development, and
stock manipulation. Most
importantly, cyber security
attacks disrupt patient care.

7
PROBLEM DEFINITION

26-03-2019
8
SIMULATION ENVIRONMENT

26-03-2019
MATLAB
• User Friendly (GUI)
• Powerful tools for Data Mining
• Useful for complex signal analysis,
feature extraction and dynamic
time simulations.

9
ORGANIZATION OF THE CASE STUDY

26-03-2019
Start

Introduction to Cyber Security and Issues in Health care

Detailed Literature Review on the current Issues

Identification of types of threats

Risk Analysis and Prevention techniques

Future Works with Mobile Botnets 10


CONCLUSION

26-03-2019
11
FUTURE SCOPE

26-03-2019
12
REFERENCES

26-03-2019
1. Kumar, P., & Kumar, R. (2019). Issues and Challenges of Load Balancing
Techniques in Cloud Computing: A Survey. ACM Computing Surveys (CSUR), 51(6),
120.

13
26-03-2019
14

Potrebbero piacerti anche