Advertisement

Safeguarding Personal Health Information: Case Study

  • Holly Gandarilla
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 738)

Abstract

Password cracking tools have given hackers the ability to solve hashes in minutes. These same tools can also be used for penetration testing to determine weak passwords within our own infrastructure. In using products, such as, Cain and Abel or Ophcrack, organizations can gain insight and awareness that could be the stronghold in keeping accounts and personal health information (PHI) safe. Cain and Abel, and Ophcrack, which are the two password cracking tools tested, can be both useful and very dangerous at the same time. While many can learn from these products, so can their adversaries. In using these products to test our own password strengths we can foresee vulnerabilities that we may have been overlooked. As new software is created, passwords will become easier to crack. Technology knows no boundaries in many aspects, which is why securing our networks, strengthening our physical and logical security, and mitigating every risk possible, becomes of utmost importance in this technology-ridden world.

Keywords

PHI Personal health information Password Cracking Penetration Safeguard Hackers Study 

References

  1. 1.
    Major 2016 healthcare data breaches: mid year summary. HIPAA J. (2017), [Online]. http://www.hipaajournal.com/major-2016-healthcare-data-breaches-mid-year-summary-3499/
  2. 2.
    R.A. Leo, The HIPAA Program Reference Handbook (CRC Press, Boca Raton, FL, 2005)Google Scholar
  3. 3.
    M. Korolov, Healthcare organizations face unique security challenges. CSO Online, (2015), [Online]. https://www.csoonline.com/article/2932978/data-protection/health-care-organization-face-unique-security-challenges.html
  4. 4.
    N. Daras (ed.), Applications of Mathematics and Informatics in Military Science (Springer, Berlin, 2014), p. 208Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Holly Gandarilla
    • 1
  1. 1.Department of CybersecurityUniversity of Maryland University CollegeAdelphiUSA

Personalised recommendations