International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 1

Review Paper | Computer Science and Engineering | Volume 15 Issue 4, April 2026 | Pages: 1635 - 1639 | India


Data Security in Healthcare the Safety of Data with Cybersecurity

Pachiyappan C.

Abstract: The increasing reliance on digital technologies has made the healthcare sector a prime target for cyber-attacks. With the rising need for data security and compliance, this article examines the importance of cybersecurity in healthcare, the associated risks, and the strategies required to protect patient information and ensure continuity of care. Healthcare organizations are particularly vulnerable and targeted by cyberattacks because they possess so much information of high monetary and intelligence value to cyber thieves and nation-state actors. The targeted data includes patients? protected health information (PHI). Cybersecurity is critical for patient safety; it has an unreliable track record. Breach of infrastructure has resulted in millions of health records being stolen, potentially putting patients' lives at risk. This necessitates the integration of Cybersecurity into patient safety. Before these attacks, many security experts struggled to persuade corporate executives of the necessity of cyber security. cybersecurity as a patient safety, enterprise risk, and strategic priority and instill it into the hospital?s existing enterprise, risk management, governance, and business-continuity framework. The main aim of this paper is the development of recent techniques applicable to crypt Analysis hash function, mainly from the SHA family. Recently proposed attacks on MD5 & SHA motivate a new hash function design. It is designed not only to have higher security but also to be faster than SHA-256. This method is very useful for attacking.

Keywords: Healthcare Cybersecurity, Cloud Computing, SHA-256 Algorithm, cryptographic hash function, patient privacy distributed cloud storage, Electronic Health Records (EHR), Access control, medical management system

How to Cite?: Pachiyappan C., "Data Security in Healthcare the Safety of Data with Cybersecurity", Volume 15 Issue 4, April 2026, International Journal of Science and Research (IJSR), Pages: 1635-1639, https://www.ijsr.net/getabstract.php?paperid=SR26425225714, DOI: https://dx.dx.doi.org/10.21275/SR26425225714

Download Citation: APA | MLA | BibTeX | EndNote | RefMan


Download Article PDF


Rate This Article!


Top