Defending Medical Information Networks from Cyber Threats Using Co-Secure Set Domination

Main Article Content

C. Ruby Sharmila, S. Meenakshi

Abstract

Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from digital attacks. It's also known as information technology security or electronic information security. Individuals and organizations are exposed to significant risks due to cyber security, including financial, political, and social aspects. A growing number of cyberattacks have targeted healthcare over the past decade, and the sophistication of these attacks has increased dramatically. There is an awareness of this new era both in industry and in government. Cyberattacks are of particular concern for the health sector because attacks can directly threaten not just the security of systems and information but also the health and safety of patients. Hospitals are among the least secure and most vulnerable organizations in terms of cybersecurity. In order to protect a healthcare network's nodes and links from attacks, mobile guards need to be placed on the nodes. This paper uses the Bloom graph for massively parallel computers, which is a potential structure. Co-secure set domination is used to find the minimum number of guards required to protect the bloom network.

Article Details

Section
Articles