Skip to main content

Government Strategies on Cybersecurity and How Artificial Intelligence Can Impact Cybersecurity in Healthcare with Special Reference to the UK

  • Chapter
  • First Online:
Cybersecurity and Artificial Intelligence

Abstract

This chapter explores the cybersecurity strategies implemented by the United Kingdom (UK) government and the profound impact of artificial intelligence (AI) on cybersecurity and healthcare. In an increasingly digitalised world, cybersecurity has become a critical concern for governments, organisations, and individuals. The UK government has taken substantial measures to address the evolving cybersecurity landscape, recognising the need for robust protection against cyber threats. The chapter will begin by examining the UK government’s overarching strategies and initiatives to safeguard the nation’s digital infrastructure. It will explore the National Cyber Security Strategy, highlighting key objectives, policies, and collaborative efforts to enhance cybersecurity resilience. Additionally, the paper will delve into the role of the National Cyber Security Centre (NCSC) in providing guidance, incident response, and fostering cooperation between the public and private sectors. Furthermore, there is an attempt to investigate the intersection of AI and cybersecurity, specifically focusing on its implications for healthcare. The integration of AI technologies in healthcare systems brings numerous benefits, such as improved diagnostics, personalised medicine, and enhanced patient care. However, it also introduces new cybersecurity challenges and vulnerabilities. This paper discusses the potential risks associated with AI in healthcare and explores the strategies and best practices to mitigate these risks. Ultimately, this chapter aims to provide an in-depth analysis of the UK government’s cybersecurity strategies and their effectiveness in the face of evolving threats. It also highlights the transformative potential of AI in healthcare while emphasising the importance of robust cybersecurity measures to safeguard sensitive patient data and ensure the integrity and safety of healthcare systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. ENISA (2023) Octave v2.0 (and Octave-S v1.0 for small and medium businesses). Available at: https://www.enisa.europa.eu/topics/risk-management/current-risk/risk-management-inventory/rm-ra-methods/m_octave.html. Accessed 16 Sept 2023

  2. Freter R (2022) Department of Defense (DoD) zero trust reference architecture. Version 2.0, July 2022. Prepared by the Defense Information Systems Agency (DISA) and National Security Agency (NSA) Zero Trust Engineering Team. Available at: https://dodcio.defense.gov/Portals/0/Documents/Library/(U)ZT_RA_v2.0(U)_Sep22.pdf. Accessed 16 Sept 2023

  3. Gerstell GS, Morell M (2020) Opinion | Four ways U.S. intelligence efforts should change in the wake of the coronavirus pandemic. Available at: https://www.washingtonpost.com/opinions/2020/04/07/four-ways-us-intelligence-efforts-should-change-wake-coronavirus-pandemic/. Accessed 16 May 2023

  4. Iddagoda R (2019) Practical approach to implementing ISO 27001—summary. Available at: https://medium.com/@ruween/practical-approach-to-implementing-iso-27001-summary-452e99cad00d. Accessed 16 Sept 2023

    Google Scholar 

  5. Legowo N, Juhartoyo Y (2022) Risk management; risk assessment of information

    Google Scholar 

  6. Razikin K, Soewito B (2022) Cybersecurity decision support model to designing information technology security system based on risk analysis and cybersecurity framework. Available at: https://www.sciencedirect.com/science/article/pii/S1110866522000226. Accessed 16 Sept 2023

  7. UKAS (2023) Accreditation underpins quality and confidence in health and social care provision to ensure consistency in the delivery of healthcare services to patients and commissioners. Available at: https://www.ukas.com/accreditation/sectors/health-social-care/#:~:text=ISO%2FIEC%2017065%2C%20ISO%2FIEC%2017020&text=NHS%20England%2C%20NHS%20Improvement%20and,endorse%20participation%20in%20UKAS%20accreditation. Accessed 16 Sept 2023

  8. UK Ministry of Justice (2023) The Government Security Classifications Policy (GSCP). https://www.gov.uk/government/publications/government-securityclassifications/government-security-classifications-policy-html. Accessed on 25 Jan 2024

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. I. Ndumbe .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Ndumbe, S.I., Velikov, P. (2024). Government Strategies on Cybersecurity and How Artificial Intelligence Can Impact Cybersecurity in Healthcare with Special Reference to the UK. In: Jahankhani, H., Bowen, G., Sharif, M.S., Hussien, O. (eds) Cybersecurity and Artificial Intelligence. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-52272-7_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-52272-7_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-52271-0

  • Online ISBN: 978-3-031-52272-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics