Intrusion and attacks over mobile networks and cloud health systems

2017 
In every existed technical tool and specific-purpose application, security must be in watch all the time. Each of these has its security implications that need to be considered specifically in order to protect all users' data and information and prevent putting them at risk. Moreover, the rapid development and spread of many technologies such as mobile networks and smart phones, IoT, smart cities, and cloud computing, resulted in increasing the demand on more security. There is a needs to secure the communication networks that transfer the users data, the application itself that manipulates this data, the mobile device that runs that application, and the cloud environment that process and store this information. There is a variety of the user's information that need to be protected including financial transactions, personal data, and medical records. In the last few years, there are many health care providers worldwide integrated their systems with the mobile and cloud environment solutions to compete in the IT-based services. This integration brought up the need to secure healthcare applications and systems against cyber attacks. In this paper, we discuss the security of associated technologies with mobile networks and cloud-based health care systems. Also, we present a combination of meet in the middle attack and Side Channel Attack.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    14
    References
    5
    Citations
    NaN
    KQI
    []