<?xml version="1.0" encoding="utf-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<ArticleSet>
  <Article>
    <Journal>
      <PublisherName>IJIRCSTJournal</PublisherName>
      <JournalTitle>International Journal of Innovative Research in Computer Science and Technology</JournalTitle>
      <PISSN>I</PISSN>
      <EISSN>S</EISSN>
      <Volume-Issue>Volume 11 Issue 3</Volume-Issue>
      <PartNumber/>
      <IssueTopic>Computer Science &amp; Engineering</IssueTopic>
      <IssueLanguage>English</IssueLanguage>
      <Season>May - June 2023</Season>
      <SpecialIssue>N</SpecialIssue>
      <SupplementaryIssue>N</SupplementaryIssue>
      <IssueOA>Y</IssueOA>
      <PubDate>
        <Year>2023</Year>
        <Month>06</Month>
        <Day>02</Day>
      </PubDate>
      <ArticleType>Computer Sciences</ArticleType>
      <ArticleTitle>Review Analysis of Cyber Security in Healthcare System: A Systematic Approach of Modern Development</ArticleTitle>
      <SubTitle/>
      <ArticleLanguage>English</ArticleLanguage>
      <ArticleOA>Y</ArticleOA>
      <FirstPage>38</FirstPage>
      <LastPage>42</LastPage>
      <AuthorList>
        <Author>
          <FirstName>Venkateswaran Radhakrishnan</FirstName>          
          <AuthorLanguage>English</AuthorLanguage>
          <Affiliation/>
          <CorrespondingAuthor>Y</CorrespondingAuthor>
          <ORCID/>
             
        </Author>
      </AuthorList>
      <DOI>https://doi.org/10.55524/ijircst.2023.11.3.7</DOI>
      <Abstract>The healthcare industry provides medical devices such as pharmaceuticals. The third-party vendor can also pose a risk to the organization. Cyber security if they are not properly vetted and do not have adequate security measures in place. These will help to mitigate and other cyber security risks, healthcare organizations should implement a range of security measures. Regular security assessments in healthcare organizations should conduct a regular security assessment to identify vulnerable in their systems and network. Distributed dental or services attacks where criminals overload the healthcare system. Health care system servers with traffic, causing them to crash and preventive. Lag mate users from accessing the system&amp;#39;s network, stealing data, and causing damage to the system.&amp;nbsp; Ensure that these tools are updated regularly to protect against the latest threats. Regularly check the backup data&amp;nbsp;and critical data and store them in a secure location. Monitoring network activity to detect and respond to any potential security incidents conduct regularly.</Abstract>
      <AbstractLanguage>English</AbstractLanguage>
      <Keywords>Cyber, Data, Healthcare Security, Malware, Systematic, Technology</Keywords>
      <URLs>
        <Abstract>https://ijircst.org/abstract.php?article_id=1118</Abstract>
      </URLs>      
    </Journal>
  </Article>
</ArticleSet>