Advertisement

Designing a Cybersecurity Awareness and Training Program for a Large Medical Center

Review Article | DOI: https://doi.org/10.31579/2835-9232/056

Designing a Cybersecurity Awareness and Training Program for a Large Medical Center

  • Cheryl Ann Alexander 1*
  • Lidong Wang 2

1Institute for IT Innovation and Smart Health, Mississippi, USA.

2Institute for Systems Engineering Research, Mississippi State University, Mississippi, USA.

*Corresponding Author: Cheryl Ann Alexander, Institute for IT Innovation and Smart Health, Mississippi, USA

Citation: Cheryl A. Alexande rand Lidong Wang, (2024), Designing a Cybersecurity Awareness and Training Program for a Large Medical Center, International Journal of Clinical Epidemiology, 3(2); DOI:10.31579/2835-9232/056

Copyright: © 2024, Cheryl Ann Alexander. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Received: 08 March 2024 | Accepted: 15 March 2024 | Published: 20 March 2024

Keywords: open systems interconnection (osi); transmission control protocol (tcp); internet protocol (ip); attack vector;training program; cybersecurity

Abstract

This review paper investigates Open Systems Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) are networking models that support interoperability and reduce proprietary incompatibilities. This paper investigates whether Internet Protocol (IP) data transmissions are vulnerable to being interrupted and modified. Attack vectors at the network level also include man-in-the-middle attack, spoofing or forging of a network address, denial of service (DoS), etc. User Datagram Protocol (UDP) and TCP are transport layer protocols. Attack vectors in the transport layer are attacks using UDP (considered unreliable) and TCP, for example, SYN flood attacks. The session layer and the presentation layer are not popular targets for common attacks. The protocols of the application layer include File Transfer Protocol (FTP), Hypertext Transfer Protocol (HTTP), etc. The centralized program management model (Wilson and Hash, 2003) is used. However, in this model, a centralized policy, strategy, and implementation are used while Charleston Regional Medical Center in the US does not spread over a wide geographical area, it has a centralized structure. The information systems security manager is the Chief Information Officer (CIO) in the center. TCP/IP is also an example of a multilayer protocol. Attackers can also use multilayer protocol encapsulation to secure the capacity to fool interior switching devices to achieve entrance to a virtual local area network (VLAN). 

Introduction

Networking models support interoperability and reduce proprietary incompatibilities. Two prevailing models are Open Systems Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP). Figure 1 shows the two models. There are seven layers in the OSI model, while there are four layers in the TCP/IP model (also called DARPA model) (Warsinske et al., 2019). 

TCP/IP Model

OSI Model

 

Application

Application

Presentation

Session

Transport

Transport

Internet

Network

Link

Data Link

Physical

Figure 1: OSI and TCP/IP Models

Internet Protocol (IP) data transmissions are susceptible to being intercepted and altered. Attack vectors in the network layer include man-in-the-middle attacks, spoofing or forging of a network address, denial of service (DoS), etc. User Datagram Protocol (UDP) and TCP are transport layer protocols. Attack vectors in the transport layer include attacks using UDP (considered unreliable) and TCP, for example, SYN flood attacks. The session layer and the presentation layer aren’t popular targets for common attacks. The protocols of the application layer include File Transfer Protocol (FTP), Hypertext Transfer Protocol (HTTP), etc. Attack vectors in the application layer include SQL injection or cross-site scripting, HTTP-based attacks such as an HTTP flood or input validation attacks, etc. TCP/IP is also an example of a multilayer protocol. Attackers can also use multilayer protocol encapsulation to provide an ability to fool interior switching devices to gain access to a virtual local area network (VLAN) (Warsinske et al., 2019).

The purpose of the work is to design a security awareness and training program so that employees in Charleston Regional Medical Center (a large medical center in the US) understand their security responsibilities, information security risks related to their activities, and policies in the center

2. Audiences, Roles, and Responsibilities

Audiences of the program in the Medical Center include four target groups. Group 1 includes providers (i.e., physicians, nurse practitioners, physician assistants), nurses, pharmacists, techs, and staff (e.g., certified nursing assistants (CNAs), techs, clerks, etc.). Group 2 includes Stakeholders (i.e., ambulance personnel, transferring staff members, secondary hospital staff such as providers and nurses, delivery personnel, etc.), security personnel, external delivery personnel, etc. Group 3 includes the CEO, financial staff, Chief Nursing Officer, and department heads (other than the information systems security manager). Group 4 includes the information systems security manager and other IT staff, data analytics staff, etc., in the information systems security department. The CEO assigns responsibility to the information systems security manager for the security training and the security program implementation. The information systems security manager directs other information systems security department members, ensures the members with substantial security responsibilities, ensures the training with quality implementation, and ensures effective tracking and reporting mechanisms. The information systems security department members assist other employees in the Medical Center in completing training and help them fix problems in information systems security.

Other employees can be called users of information systems or resources. They are the largest audience in the center. They need to understand and observe security policies and procedures in the center, complete training on time, and keep software updated with security patches. Their activities for security include data backup, suitable password use, appropriate antivirus protection, etc.

3. Components of the Program: Awareness, Training, and Education

Learning starts with awareness, goes to training, and progresses to education. Awareness is to focus attention on security. Training endeavors to obtain security skills and competencies. Education helps to achieve knowledge and produce security specialists and professionals (Wilson and Hash, 2003).

Professional development validates skills through certification. There are two kinds of certification: technical and general. The general focus is on a foundation of knowledge. The technical focus is on technical security (Wilson and Hash, 2003). Data analytics, AI, blockchain, and their applications in cybersecurity are very useful topics for professional development.

4. Designing an Awareness and Training Program

4.1 Structuring an awareness and training program

The centralized program management model (Wilson and Hash, 2003) is used. The model is centralized policy, strategy, and implementation. The Medical Center does not spread over a wide geographical area; it has a centralized structure. Figure 2 shows the model implemented in the Medical Center. The information systems security manager is the Chief Information Officer (CIO) in the center.

Figure 2. Centralized Program Management

4.2 Developing an awareness and training plan

All employees in the four target groups need to complete universal training annually. The training includes 1) computers being covered with privacy screens, 2) not chatting about patients in the elevator and other public places, 3) regulations for Centers for Medicare & Medicaid Services (CMS) and Medicaid, 4) not reading information from charts if you aren’t taking care of the patient, 5) biometric screening, barcodes for medication safety. The following are training for specific target groups.

Role 1: Group 1 (including providers, nurses, pharmacists, techs, and staff)

Learning Objectives: Learn enough security knowledge of patient data, treat patients, provide medications, and provide patient care while protecting patient data from malicious actors. 

Focus Areas: They need training in the use of barcodes, the Health Insurance Portability and Accountability Act (HIPAA), biometrics (e.g., fingerprint, iris scanning, and facial recognition), and security regulations.

Providers, nurses, and all bedside staff need additional training on ICD-10 billing requirements, security requirements for data protection, and regulatory standards.

Methods/Activities:

Both online training and physical showing in the training rooms are acceptable; physical showing in the training rooms is recommended for employees with a weak background in IT and computer application knowledge.

Schedule:

An annual training of two hours is scheduled.

Evaluation Criteria:

A test is performed right after the training. An individual will get a certificate after getting a grade of 80%. Everyone can try the training and test four times.

Role 2: Group 2 (including stakeholders, security personnel, external delivery personnel, etc.) 

Learning Objectives: Learn how to protect patient data physically with the aid of screen protectors and biometrics, and how to identify malicious actors.

Focus Areas:

Regulatory standards, HIPAA, and biometrics

Methods/Activities: Both online training and physical showing in the training rooms are acceptable. Physical showing in the training rooms is recommended for employees with a weak background in IT and computer application knowledge.

Schedule:

An annual training of two hours is scheduled.

Evaluation Criteria: A test is performed right after the training. An individual will get a certificate after getting a grade of 80%. Everyone can try the training and test four times.

Role 3: Group 3 (including CEO, financial staff, Chief Nursing Officer, and department heads)

Learning Objectives: Receive enough knowledge to protect patient data, protect the financial status of the facility, and learn how to protect each department from malicious actors.

Focus Areas: Regulatory standards, biometrics, HIPAA, and data security.

Methods/Activities: Both online training and physical showing in the training rooms are acceptable; physical showing in the training rooms is recommended for employees with a weak background in IT and computer application knowledge.

Schedule: An annual training of two hours is scheduled.

Evaluation Criteria: A test is performed right after the training. An individual will get a certificate after getting a grade of 80%. Everyone can try the training and test four times.

Role 4: Group 4, including the information systems security manager and other IT staff, data analytics staff, etc., in the information systems security department.

Learning Objectives: Have enough deep knowledge to provide security services within the hospital and professional skills to control data.

Focus Areas: Compatibility among applications, validating the integrity of applications before installation, configuring firewalls, monitoring network activity, intrusion detection systems (IDS), managing network bridges and routers, managing account privileges, auditing account activity, security for all hospital departments, etc.

Schedule: An annual training of two hours is scheduled.

Evaluation Criteria: A test is performed right after the training. An individual will get a certificate after getting a grade of 80%. Everyone can try the training and test three times.

4.3 Developing Awareness and Training Materials

Awareness topics can be selected as follows (Wilson and Hash, 2003):

     1) Unknown e-mail and attachments

     2) Social engineering

     3) Laptop security while on travel – address both physical and information security issues

     4) Desktop security

     5) Protect information subject to confidentiality concerns

Sources of awareness material (Wilson and Hash, 2003) can be:

   1) Online IT security websites

   2) Professional journals

   3) Conferences and courses.

A Model for Building Training Courses: NIST Special Pub. 800-16 (Wilson and Hash, 2003) is recommended as training material.

5. Conclusion

In this paper, Open Systems Interconnection (OSI) and Transmission Control Protocol/Internet Protocol (TCP/IP) are networking models that support interoperability and decrease proprietary mismatches. This paper investigates whether Internet Protocol (IP) data transmissions are vulnerable to being interrupted and modified. Attack vectors at the network level also include man-in-the-middle attack, spoofing or forging of a network address, denial of service (DoS), etc. User Datagram Protocol (UDP) and TCP are transport layer protocols. Attack vectors in the transport layer are attacks using UDP (considered unreliable) and TCP, for example, SYN flood attacks. The session layer and the presentation layer are not popular targets for common attacks. The protocols of the application layer include File Transfer Protocol (FTP), Hypertext Transfer Protocol (HTTP), etc. The centralized program management model (Wilson and Hash, 2003) is used. However, in this model, a centralized policy, strategy, and implementation are used and while the Medical Center does not spread over a wide geographical area, it has a centralized structure. The information systems security manager is the Chief Information Officer (CIO) in the center. TCP/IP is also an example of a multilayer protocol. Attackers can also use multilayer protocol encapsulation to secure the capacity to fool interior switching devices to achieve entrance to a virtual local area network (VLAN). 

In a healthcare center, the protection of patient data has become a crucial step in providing care to patients. For providers, nurses, staff, and non-licensed personnel, the need to be educated on protecting patient care is essential to keeping data safe from malicious actors. A substantial educational program is necessary for staff to understand cybersecurity in the healthcare setting, and to ensure the correct steps for learning how to protect patient data. The model for building a better training program lies in the Model for Building Training Courses. Within the document, many uses of the tool can be modified for the development of a strong educational program for protecting patient data and educating staff, providers, IT staff, etc.

Acknowledgements

The authors would like to express thanks to Technology and Healthcare Solutions, USA for its help and support.

Conflict of interest

The authors would like to announce that there is no conflict of interest.

References

Clinical Trials and Clinical Research: I am delighted to provide a testimonial for the peer review process, support from the editorial office, and the exceptional quality of the journal for my article entitled “Effect of Traditional Moxibustion in Assisting the Rehabilitation of Stroke Patients.” The peer review process for my article was rigorous and thorough, ensuring that only high-quality research is published in the journal. The reviewers provided valuable feedback and constructive criticism that greatly improved the clarity and scientific rigor of my study. Their expertise and attention to detail helped me refine my research methodology and strengthen the overall impact of my findings. I would also like to express my gratitude for the exceptional support I received from the editorial office throughout the publication process. The editorial team was prompt, professional, and highly responsive to all my queries and concerns. Their guidance and assistance were instrumental in navigating the submission and revision process, making it a seamless and efficient experience. Furthermore, I am impressed by the outstanding quality of the journal itself. The journal’s commitment to publishing cutting-edge research in the field of stroke rehabilitation is evident in the diverse range of articles it features. The journal consistently upholds rigorous scientific standards, ensuring that only the most impactful and innovative studies are published. This commitment to excellence has undoubtedly contributed to the journal’s reputation as a leading platform for stroke rehabilitation research. In conclusion, I am extremely satisfied with the peer review process, the support from the editorial office, and the overall quality of the journal for my article. I wholeheartedly recommend this journal to researchers and clinicians interested in stroke rehabilitation and related fields. The journal’s dedication to scientific rigor, coupled with the exceptional support provided by the editorial office, makes it an invaluable platform for disseminating research and advancing the field.

img

Dr Shiming Tang

Clinical Reviews and Case Reports, The comment form the peer-review were satisfactory. I will cements on the quality of the journal when I receive my hardback copy

img

Hameed khan