International Journal of


EISSN: 2313-3724, Print ISSN: 2313-626X

Frequency: 12

line decor
line decor

 Volume 8, Issue 12 (December 2021), Pages: 48-55


 Original Research Paper

 Title: A survey of cybersecurity vulnerabilities in healthcare systems

 Author(s): Abdullah Mohammed Alodaynan, Adwan Alownie Alanazi *


 Department of Information and Computer Science, College of Computer Science and Engineering, University of Hail, Hail, Saudi Arabia

  Full Text - PDF          XML

 * Corresponding Author. 

  Corresponding author's ORCID profile:

 Digital Object Identifier:


The security of healthcare servers and their applications from unauthorized access and hacking effect of patient file safety as a result of missing or modified data. Therefore, it is necessary to protect those servers and health systems and to know the cyber weaknesses in them and other related services to prevent them before they occur and treat them if they occur as soon as possible to reach the highest level of security and confidentiality of patient data and their privacy in addition to the safety of systems from malfunctions as a result of the attack. This research revolves around the concept of penetration and the motives of the attackers, in addition to the methods of penetration and vulnerability with mentioning some common attacks and clarifying their method of operation, and determining their effects on the victim. The research also deals with the most important basics and requirements to achieve privacy and security for health systems at different levels, including systems, users, and devices, with some intrusion protection techniques mentioned, and some challenges and solutions will be discussed in addition to some security issues in general, the research aims to gain the best level of security and privacy in the infrastructure of health systems. 

 © 2021 The Authors. Published by IASE.

 This is an open access article under the CC BY-NC-ND license (

 Keywords: Healthcare, Cybersecurity, Attack, Malware, Patient, Vulnerability, Malicious program

 Article History: Received 5 May 2021, Received in revised form 27 September 2021, Accepted 2 October 2021


No Acknowledgment.

 Compliance with ethical standards

 Conflict of interest: The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.


 Alodaynan AM and Alanazi AA (2021). A survey of cybersecurity vulnerabilities in healthcare systems. International Journal of Advanced and Applied Sciences, 8(12): 48-55

 Permanent Link to this page


 Fig. 1  


 Table 1    


 References (13)

  1. Bahkali S, Almaiman A, Almadani W, Househ MS, and El Metwally A (2014). The state public health informatics in Saudi Arabia. In: Mantas J, Househ MS, and Hasman A (Eds.), Integrating information technology and management for quality of care: 257-260. IOS Press, Amsterdam, Netherlands.   [Google Scholar]
  2. Chen Q, Lambright J, and Abdelwahed S (2016). Towards autonomic security management of healthcare information systems. In the IEEE 1st International Conference on Connected Health: Applications, Systems and Engineering Technologies, IEEE, Washington, USA: 113-118.   [Google Scholar]
  3. Dogaru DI and Dumitrache I (2015). Cyber-physical systems in healthcare networks. In the E-Health and Bioengineering Conference, IEEE, Iasi, Romania: 1-4.   [Google Scholar]
  4. Dogaru DI and Dumitrache I (2017). Cyber security in healthcare networks. In the E-Health and Bioengineering Conference, IEEE, Sinaia, Romania: 414-417.   [Google Scholar]
  5. Kumari Y (2019). Survey on web application vulnerabilities. International Research Journal of Engineering and Technology, 6(9): 922-925.   [Google Scholar]
  6. Kwon J and Johnson ME (2015). Protecting patient data-the economic perspective of healthcare security. IEEE Security and Privacy, 13(5): 90-95.   [Google Scholar]
  7. Mohsin AH, Zaidan AA, Zaidan BB, Albahri OS, Albahri AS, Alsalem MA, and Mohammed KI (2019). Based medical systems for patient’s authentication: Towards a new verification secure framework using CIA standard. Journal of Medical Systems, 43(7): 1-34.   [Google Scholar] PMid:31115768
  8. Nair MM, Tyagi AK, and Goyal R (2019). Medical cyber physical systems and its issues. Procedia Computer Science, 165: 647-655.   [Google Scholar]
  9. Newaz AKM, Sikder AK, Rahman MA, and Uluagac AS (2020). A survey on security and privacy issues in modern healthcare systems: Attacks and defenses. ACM Transactions on Computing for Healthcare, 2(3): 27.   [Google Scholar]
  10. Priya R, Sivasankaran S, Ravisasthiri P, and Sivachandiran S (2017). A survey on security attacks in electronic healthcare systems. In the International Conference on Communication and Signal Processing, IEEE, Chennai, India: 0691-0694.   [Google Scholar]
  11. Saleem K, Zeb K, Derhab A, Abbas H, Al-Muhtadi J, Orgun MA, and Gawanmeh A (2016). Survey on cybersecurity issues in wireless mesh networks based eHealthcare. In the IEEE 18th International Conference on e-Health Networking, Applications and Services, IEEE, Munich, Germany: 1-7.   [Google Scholar] PMid:28179853
  12. Sun Y, Lo FPW, and Lo B (2019). Security and privacy for the internet of medical things enabled healthcare systems: A survey. IEEE Access, 7: 183339-183355.   [Google Scholar]
  13. Thyagarajan C, Suresh S, Sathish N, and Suthir S (2020). A typical analysis and survey on healthcare cyber security. International Journal of Scientific and Technology Research Volume, 9(3): 3267-3270.   [Google Scholar]