TY - GEN
T1 - Detection and control of phishing attack in electronic medical record application
AU - Aneesh Kini, U.
AU - Poornananda Bhat, M.
AU - Ganiga, Raghavendra
AU - Pai, Radhika M.
AU - Manohara Pai, M. M.
AU - Shiva Prasad, H. C.
PY - 2020
Y1 - 2020
N2 - Advancement in Information and Communication Technology (I&CT) has wide applications in medical field. The patient record can be stored electronically instead of files. Electronic Medical Record (EMR) is a collection of application program that collects and stores the patient data in servers. Data are retrievable by patients or doctors from any part of the globe via the internet. The disadvantage is that several attacks are possible, and one such attack is the phishing attack. In phishing attack, the attacker replicates the original web application to collect data in an unauthorized way. This paper provides an insight into the phishing attack in an EMR and the possible ways to overcome the phishing attack. The solution is provided by role-based authentication that ensures only privileged users get access to the EMR, thereby preventing the threat of patient’s data misuse. The application is tested for a potential attack on the pre- and post-implementation scenarios.
AB - Advancement in Information and Communication Technology (I&CT) has wide applications in medical field. The patient record can be stored electronically instead of files. Electronic Medical Record (EMR) is a collection of application program that collects and stores the patient data in servers. Data are retrievable by patients or doctors from any part of the globe via the internet. The disadvantage is that several attacks are possible, and one such attack is the phishing attack. In phishing attack, the attacker replicates the original web application to collect data in an unauthorized way. This paper provides an insight into the phishing attack in an EMR and the possible ways to overcome the phishing attack. The solution is provided by role-based authentication that ensures only privileged users get access to the EMR, thereby preventing the threat of patient’s data misuse. The application is tested for a potential attack on the pre- and post-implementation scenarios.
UR - http://www.scopus.com/inward/record.url?scp=85091314155&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85091314155&partnerID=8YFLogxK
U2 - 10.1007/978-981-15-5558-9_82
DO - 10.1007/978-981-15-5558-9_82
M3 - Conference contribution
AN - SCOPUS:85091314155
SN - 9789811555572
T3 - Lecture Notes in Electrical Engineering
SP - 975
EP - 985
BT - Advances in Electrical and Computer Technologies - Select Proceedings of ICAECT 2019
A2 - Sengodan, Thangaprakash
A2 - Murugappan, M.
A2 - Misra, Sanjay
PB - Springer Science and Business Media Deutschland GmbH
T2 - 1st International Conference on Advances in Electrical and Computer Technologies, ICAECT 2019
Y2 - 26 April 2019 through 27 April 2019
ER -