Downloads: 1
Review Paper | Computer Science and Engineering | Volume 15 Issue 4, April 2026 | Pages: 1635 - 1639 | India
Data Security in Healthcare the Safety of Data with Cybersecurity
Abstract: The increasing reliance on digital technologies has made the healthcare sector a prime target for cyber-attacks. With the rising need for data security and compliance, this article examines the importance of cybersecurity in healthcare, the associated risks, and the strategies required to protect patient information and ensure continuity of care. Healthcare organizations are particularly vulnerable and targeted by cyberattacks because they possess so much information of high monetary and intelligence value to cyber thieves and nation-state actors. The targeted data includes patients? protected health information (PHI). Cybersecurity is critical for patient safety; it has an unreliable track record. Breach of infrastructure has resulted in millions of health records being stolen, potentially putting patients' lives at risk. This necessitates the integration of Cybersecurity into patient safety. Before these attacks, many security experts struggled to persuade corporate executives of the necessity of cyber security. cybersecurity as a patient safety, enterprise risk, and strategic priority and instill it into the hospital?s existing enterprise, risk management, governance, and business-continuity framework. The main aim of this paper is the development of recent techniques applicable to crypt Analysis hash function, mainly from the SHA family. Recently proposed attacks on MD5 & SHA motivate a new hash function design. It is designed not only to have higher security but also to be faster than SHA-256. This method is very useful for attacking.
Keywords: Healthcare Cybersecurity, Cloud Computing, SHA-256 Algorithm, cryptographic hash function, patient privacy distributed cloud storage, Electronic Health Records (EHR), Access control, medical management system
How to Cite?: Pachiyappan C., "Data Security in Healthcare the Safety of Data with Cybersecurity", Volume 15 Issue 4, April 2026, International Journal of Science and Research (IJSR), Pages: 1635-1639, https://www.ijsr.net/getabstract.php?paperid=SR26425225714, DOI: https://dx.dx.doi.org/10.21275/SR26425225714