Cybersecurity Flashcards

1
Q

What is cybersecurity?

A

Cybersecurity is an essential component of data protection in healthcare.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does cybersecurity involve?

A

Safeguarding digital systems and data against breaches or attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why are healthcare organizations prime targets for cyberattacks?

A

Due to the sensitive and valuable nature of medical data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What can cybersecurity breaches disrupt in healthcare?

A

Lab operations, delay diagnoses, and harm patients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name a common cybersecurity threat.

A

Ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What was the HSE Cyberattack in 2021?

A

An unprecedented ransomware cyber attack on May 14, 2021.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What ransomware was used in the HSE Cyberattack?

A

Conti ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What was the financial demand made during the HSE Cyberattack?

A

$20 million.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How much data was stolen during the HSE Cyberattack?

A

700 Gigabytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What percentage of laboratory services were running after the HSE Cyberattack?

A

10%.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are best practices for cybersecurity? List any two.

A
  • Use strong passwords and multi-factor authentication.
  • Encrypt sensitive data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fill in the blank: Cybersecurity breaches can disrupt lab operations, delay ______, and harm patients.

A

diagnoses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False: Phishing emails are a common cybersecurity threat.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What immediate impacts did the HSE Cyberattack have on healthcare institutions?

A
  • Loss of access to patient information systems.
  • Clinical care systems.
  • Laboratory systems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What should be done if suspicious activity is detected?

A

Report suspicious activity immediately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How many computers were shut down across the HSE during the cyberattack?

A

85,000.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What was the disruption caused by the HSE Cyberattack to appointments and treatments?

A

Appointments and treatments were delayed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What percentage of outpatient appointments were affected by the HSE Cyberattack?

A

12,000 outpatient appointments affected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What process was activated in response to the 2021 cyber attack on HSE?

A

Activation of Critical Incident Process

This process is essential for managing significant incidents impacting operations.

20
Q

List the first step taken in response to the cyber attack.

A

Shut down IT systems and disconnected the National Health Network (NHN) from the internet

This was a crucial step to contain the attack.

21
Q

Which organizations were involved in the response to the cyber attack?

A
  • Garda National Cyber Crime Bureau
  • Interpol
  • National Cyber Security Centre (NCSC)

These organizations provided support and expertise in cyber security.

22
Q

What methods of communication were used during the cyber attack?

A
  • Phonecalls
  • Faxes
  • Handwritten reports
  • Handwritten requests

Communication methods had to adapt due to the IT system shutdown.

23
Q

What challenges did staff face during the attack?

A
  • Strain due to manual processes
  • Use of pen and paper for patient treatment
  • Backlogs in clinical and administrative tasks
  • Timing coincided with the COVID-19 pandemic

These challenges compounded the difficulties faced by healthcare staff.

24
Q

What were the objectives of the cyber attack on HSE?

A
  • Disrupt health services
  • Steal data
  • Demand ransom for stolen data and decryption

Understanding these objectives helps in assessing the impact of such attacks.

25
Did the Irish Government and HSE pay the ransom demanded during the attack?
No ## Footnote Declining to pay ransom is a common stance to discourage further attacks.
26
How long did the recovery from the cyber attack take?
Over four months ## Footnote This duration reflects the complexity of restoring services after a significant cyber incident.
27
What was one of the key findings from the post-incident review?
Need for significant improvements in HSE’s technological infrastructure ## Footnote This finding emphasizes the importance of robust technology in healthcare.
28
How many tactical and strategic steps were recommended in the post-incident review?
245 ## Footnote These steps aim to enhance the overall resilience and security of HSE.
29
What focus areas were identified for improvement in the post-incident review?
* ICT and cybersecurity * Clinical and operational resilience * Project management ## Footnote Addressing these areas is critical for preventing future incidents.
30
What does the cyber security statement of strategic intent focus on?
Implementing the Post Incident Review (PIR) recommendations from the 2021 cyberattack
31
What is outlined in the cyber security statement regarding the HSE’s programme?
The vision and guiding principles for the next three years
32
What type of approach does the HSE aim for in strengthening its cyber capability?
A coordinated and holistic approach
33
What does the HSE's cyber strategy respond to?
The everchanging cyber environment
34
What are the key strategic imperatives for HSE's cyber security?
Investments in: * Cyber technology * Security culture * Secure business practices * Staff behaviours at home and work
35
What has been set as the target maturity level for HSE cyber security?
To build a more secure future for the Irish healthcare system
36
What is the cornerstone of the health information system?
Data
37
What does good quality interconnected data require?
A secure cyber assured environment
38
What is effective data management about according to the HSE?
Ensuring the confidentiality, integrity, and availability of patient data
39
What must the HSE comply with regarding data management?
All applicable data protection, privacy, and security legislation and regulations
40
What culture does the HSE aim to foster?
A culture of honesty, compassion, transparency, and accountability
41
What does the Data Protection Policy set out for the HSE?
Requirements on the protection of personal data and measures to protect the rights of data subjects
42
How should personal data be treated according to the HSE?
With strict confidentiality and only for its intended purpose
43
What must be ensured when using anonymized data?
Identifiable data must be removed
44
What rights must be balanced with public interest?
The right to privacy of individuals
45
What action can the HSE take against individuals breaching policy conditions?
Take appropriate action as deemed necessary
46
What may happen to HSE staff who breach the policy?
Subject to disciplinary action as provided by HSE disciplinary procedure
47
What accountability may arise from reckless behaviour or failure to report a breach?
The person responsible may be held accountable