COMPUTER SCIENCE CAFÉ
  • WORKBOOKS
  • GCSE
    • CAMBRIDGE GCSE
  • IB
  • A LEVEL
  • LEARN TO CODE
  • ROBOTICS ENGINEERING
  • MORE
    • CLASS PROJECTS
    • BLOCKY GAMES
    • Classroom Discussions
    • Useful Links
    • SUBSCRIBE
    • ABOUT US
    • CONTACT US
    • PRIVACY POLICY
  • WORKBOOKS
  • GCSE
    • CAMBRIDGE GCSE
  • IB
  • A LEVEL
  • LEARN TO CODE
  • ROBOTICS ENGINEERING
  • MORE
    • CLASS PROJECTS
    • BLOCKY GAMES
    • Classroom Discussions
    • Useful Links
    • SUBSCRIBE
    • ABOUT US
    • CONTACT US
    • PRIVACY POLICY
HOME    >    IB   >   2026 CASE STUDY    >    CYBERSECURITY IN HEALTHCARE
NEXT PAGE >
LINGUISTIC NUANCES
Picture

2026 CASE STUDY | AN ETHICAL APPROACH TO HACKING

CYBERSECURITY IN HEALTHCARE​
​DESIGNED FOR IB EXAMINATIONS
FLIP CARDS
  • LEARN
  • TERMINOLOGY
  • QUESTIONS
<
>

SECTION 1 | WHY HOSPITALS ARE HIGH-VALUE CYCBER TARGETS

Modern hospitals, like MedTechPro Hospital (MTPH) in the 2026 IB Computer Science case study, rely heavily on interconnected technologies to deliver efficient and life-saving care. Electronic Health Records (EHRs), connected medical devices, and internal communication systems all depend on secure digital infrastructure. This dependence makes hospitals one of the most attractive targets for cyberattacks.

1. The Value of Patient Data
  • Hospitals hold vast amounts of sensitive personal information, including:
  • Full names, addresses, and national identification numbers
  • Medical histories, test results, and prescriptions
  • Insurance and payment information

This data is far more valuable than a credit card number on the black market, a single complete medical record can sell for 10–20 times the price of financial data. Criminals use this information for:
  • Identity theft
  • Insurance fraud
  • Blackmail or extortion

Because medical records cannot be easily changed (unlike a password or card number), they are especially profitable for cybercriminals.

2. Dependence on Continuous Operations
  • Hospitals operate 24/7, and any downtime can have serious consequences, including:
  • Delayed treatment or diagnosis
  • Disrupted surgeries or medical device functions
  • Risk to patient lives

This makes them prime targets for ransomware attacks. Hackers know hospitals cannot afford prolonged system outages and are therefore more likely to pay ransom demands quickly to restore access.

Example: A ransomware attack may encrypt patient data, forcing the hospital to choose between paying the attacker or risking critical care delays.

3. Complex and Interconnected Systems
  • Hospitals use a vast range of technologies:
  • Electronic Health Records (EHRs)
  • Internet of Things (IoT) devices such as infusion pumps, patient monitors, and MRI machines
  • Wireless networks and cloud storage
  • Third-party software for billing, scheduling, and communications

Each of these systems can introduce vulnerabilities. For example, outdated IoT devices may lack proper security updates or encryption, making them potential entry points into the wider hospital network.

4. Human Factors and Social Engineering Risks
  • Healthcare workers focus primarily on patient care, not cybersecurity. This can lead to:
  • Weak or reused passwords
  • Accidental sharing of sensitive data
  • Clicking on phishing emails disguised as hospital notices or medical alerts

Attackers exploit this through social engineering, using tactics such as pretexting (impersonating IT staff) or vishing (voice phishing) to obtain access credentials.

5. Regulatory and Ethical Pressures
Hospitals must comply with strict data protection and privacy standards to safeguard patient information. A data breach not only leads to financial and operational damage but also:
  • Violates patient trust
  • Damages reputation
  • Raises ethical concerns about confidentiality and care standards

From an ethical hacking perspective, cybersecurity professionals must test and secure hospital systems without endangering patients or disrupting essential services.

Summary
  • Hospitals are high value targets because they:
  • Store sensitive and lucrative data.
  • Depend on constant system availability.
  • Operate with complex, interconnected technology.
  • Are vulnerable to human error and social engineering.
  • Face high ethical and regulatory expectations.

Understanding these risks helps cybersecurity teams like CyberHealth Security apply the Penetration Testing Execution Standard (PTES) effectively while maintaining patient safety and ethical responsibility.
QUICK QUESTION

Quick Question: Why are hospitals prime targets for ransomware attacks?

A. They store large amounts of cryptocurrency
B. They cannot tolerate downtime due to 24/7 patient care needs
C. They rarely use any digital systems
D. Medical records are easy to change and replace

SECTION 2 | ELECTRONIC HEALTH RECORDS (EHRs) VULNERABILITIES

Electronic Health Records (EHRs) have transformed the way hospitals store and access patient information. Instead of paper files stored in cabinets, patient histories, lab results, prescriptions, and imaging data are now stored digitally accessible instantly to doctors and nurses anywhere in the hospital.

While this improves efficiency and quality of care, it also creates significant cybersecurity risks. Because EHRs hold sensitive personal and medical data, they are among the most valuable targets for cybercriminals.

1. What Is an EHR?
An Electronic Health Record (EHR) is a digital collection of a patient’s medical history maintained by healthcare providers. It may include:
  • Personal identification data (name, address, date of birth, ID number)
  • Medical history, allergies, diagnoses, prescriptions, and lab results
  • Insurance and billing information
  • Communication logs between healthcare professionals

These records are accessed daily by doctors, nurses, pharmacists, and administrators often from multiple devices connected across a hospital network.

2. Why EHRs Are Vulnerable
EHRs are stored on centralized systems connected to a wide range of other hospital technologies. This interconnectedness means that if one system is compromised, attackers may gain access to all stored patient data. Common vulnerabilities include:
  • Weak access control | If login credentials are shared or not regularly updated, unauthorized users can easily gain access.
  • Outdated software and unpatched systems | Many hospitals rely on legacy IT systems that are no longer supported by the vendor, leaving unpatched security flaws.
  • Poor network segmentation | Without proper separation between medical devices, administration systems, and EHR databases, a single breach can spread quickly.
  • Insufficient encryption | If patient data is stored or transmitted without strong encryption, it can be intercepted and read by attackers.
  • Third-party integrations | Hospitals often use external systems for billing, lab results, or imaging. Each connection adds potential entry points for attackers.
THREATS
DESCRIPTION
IMPACT
Ransomeware
Encrypts EHR data and demands payment for its release.
Causes major system downtime and threatens patient safety.
Inside threats
Employees or contractors intentionally or accidentally misuse access privileges.
Data theft or privacy violations
Phishing Attacks
Deceptive emails trick users into revealing passwords or clicking malicious links.
Allows attackers into the hospital network.
SQL Injection
Exploits poorly protected input fields in hospital web systems to access databases.
Unauthorized data extraction or modification.
Data Exfiltration
Attackers secretly copy patient data to external servers.
Loss of confidentiality and violation of privacy laws.
4. Ethical and Operational Implications
EHR systems are not just about technology they are about trust. A single data breach can cause:
  • Emotional distress to patients whose private details are leaked
  • Legal and financial penalties for the hospital
  • Loss of public confidence in the healthcare system

From an ethical hacking perspective, penetration testers must handle EHR data with extreme care. Any test must ensure data integrity, confidentiality, and non-disruption to clinical services.

5. Protecting EHR Systems
To minimize vulnerabilities, hospitals like MedTechPro Hospital (MTPH) can implement several best practices:
  • Strong authentication controls | Require unique, complex passwords and multi-factor authentication.
  • Regular patching and updates | Ensure systems and software remain up to date.
  • Network segmentation | Isolate critical systems from non-critical ones to limit breach impact.
  • Encryption | Protect patient data both at rest (on servers) and in transit (over networks).
  • Access logging and monitoring | Track every access and alert security teams to unusual patterns.
  • Staff training | Educate employees about phishing, password security, and data handling responsibilities.

Summary
Electronic Health Records are essential but highly exposed components of healthcare IT systems. Their vulnerabilities arise from a combination of:
  • High data value
  • Complex, interconnected systems
  • Legacy technology
  • Human factors

Protecting EHRs requires both technical security measures and ethical awareness. In the context of the IB 2026 case study, understanding these vulnerabilities helps explain why CyberHealth Security must approach penetration testing at MedTechPro Hospital with precision, caution, and professionalism.

Quick Question: Why are hospitals prime targets for ransomware attacks?

A. They store large amounts of cryptocurrency
B. They cannot tolerate downtime due to 24/7 patient care needs
C. They rarely use any digital systems
D. Medical records are easy to change and replace

SECTION 3 | ELECTRONIC HEALTH RECORDS (EHRs) VULNERABILITIES

The Internet of Things (IoT) refers to the network of connected devices that communicate and share data with each other over the internet.
In hospitals, IoT plays a critical role in modern healthcare improving patient care, automating processes, and providing real-time data to medical staff.

However, each connected device also introduces new cybersecurity risks. Understanding these risks and benefits is essential when analyzing the case study involving MedTechPro Hospital (MTPH) and CyberHealth Security.

1. What Are IoT Devices in Healthcare?
IoT devices in hospitals include any equipment or system that connects to a network to send or receive data. Examples include:
  • Patient monitors (heart rate, blood oxygen, temperature)
  • Infusion pumps that deliver medication automatically
  • Smart beds that adjust positioning and monitor patient movement
  • Wearable health trackers used for remote patient observation
  • Imaging equipment (MRI, CT scanners) with network connectivity
  • Smart HVAC and lighting systems in hospital infrastructure

These devices collect and transmit vast amounts of sensitive patient and operational data — often in real time.

2. Benefits of IoT in Healthcare

IoT technology brings enormous value to hospitals, both medically and operationally:
  • Improved patient monitoring | Doctors and nurses can track patient conditions continuously, even remotely. Alerts can be triggered automatically if readings go out of range.
  • Faster diagnosis and treatment | Real-time data allows quicker medical decisions and personalized treatment.
  • Operational efficiency | IoT systems can automate inventory control, bed management, and energy use, reducing waste and cost.
  • Predictive maintenance | Equipment can automatically report performance issues, preventing downtime of critical medical machinery.
  • Remote healthcare | Telemedicine devices and wearables allow monitoring of patients outside the hospital, reducing pressure on healthcare systems.

IoT enhances patient care, efficiency, and safety — but it also expands the attack surface for cybercriminals.
Risk Description Impact on Hospitals
Outdated Firmware Many IoT medical devices receive updates infrequently or not at all, leaving known vulnerabilities unpatched. Attackers can exploit old vulnerabilities to gain entry into the wider hospital network.
Weak or Default Passwords Some devices are deployed with factory-set login credentials that are never changed. Attackers can easily access device controls or extract sensitive patient data.
Unencrypted Communication Data sent between devices and servers may be transmitted without encryption. Sensitive health data can be intercepted, modified, or stolen.
Device Hijacking Attackers can gain control of medical IoT devices such as infusion pumps or monitors. Compromised devices may deliver incorrect dosages, give false readings, or disrupt patient care.
Network Lateral Movement IoT devices often sit on the same network as other hospital systems. Attackers can use a weak IoT device as a starting point to access EHRs, communication systems or servers.
Physical Access Risks Devices located in patient rooms or public areas may be physically accessed or tampered with. Attackers could reset devices, plug in malicious USBs, or gather information to plan deeper attacks.
Because IoT devices often lack standard security updates and central oversight, they are ideal entry points for ransomware or botnet attacks.

4. Real-World Example
A cyberattack known as WannaCry (2017) affected healthcare systems globally, including hospitals in the UK’s National Health Service (NHS). The malware spread rapidly through networked devices running outdated operating systems, locking users out of vital patient systems and forcing hospitals to cancel surgeries.

This example illustrates how a single infected IoT or networked device can disrupt critical healthcare operations.

5. Securing IoT Devices in Hospitals
Hospitals can minimize IoT risks through a layered defense strategy:
  • Network segmentation | Isolate IoT devices from the main hospital network.
  • Strong authentication | Replace default passwords and use multi-factor access controls.
  • Encryption | Encrypt all transmitted data to prevent interception.
  • Regular updates | Patch firmware and software frequently.
  • Continuous monitoring | Use intrusion detection systems (IDS) to identify unusual activity.
  • Access control policies | Limit device access to authorized users only.
  • Vendor management |Work with suppliers who follow secure coding and patching practices.

6. Ethical Considerations
In a hospital setting, any testing or updates on IoT systems must ensure non-disruption of patient care.
Penetration testers must:
  • Obtain proper authorization
  • Avoid interfering with active medical devices
  • Protect patient data confidentiality

Ethical responsibility is as important as technical skill especially when cybersecurity directly impacts human health.

7. Summary
IoT devices bring remarkable benefits to healthcare, including automation, accuracy, and improved patient outcomes.
However, they also present serious risks if left unsecured. Hospitals like MedTechPro Hospital (MTPH) must balance innovation and safety, ensuring IoT systems are properly protected through strong cybersecurity and ethical practices.

In the IB 2026 case study, understanding the dual nature of IoT as both a tool for better healthcare and a gateway for cyber threats is key to analyzing how CyberHealth Security approaches penetration testing in sensitive medical environments.

SECTION 3 | INTERNAL SECURITY CHALLENGES

Modern hospitals rely heavily on digital communication systems to share vital information between departments, doctors, nurses, laboratories, and administrative staff. Instant access to patient data and coordination tools improves efficiency and saves lives but it also creates serious cybersecurity challenges when internal communication systems are not properly secured.

In the MedTechPro Hospital (MTPH) case study, these communication systems are part of the network being tested by CyberHealth Security during their penetration testing process.

1. What Are Internal Communications in a Hospital?
Internal communications include all digital methods staff use to exchange information across the hospital, such as:
  • Email systems used for administrative or clinical updates
  • Instant messaging platforms or chat tools used between doctors and nurses
  • Electronic Health Record (EHR) portals for sharing patient updates
  • Paging systems and internal VoIP phones for quick alerts
  • Shared drives and cloud storage systems for medical files and documents

While these systems help staff work collaboratively, they also transmit sensitive patient and operational data that must remain confidential, accurate, and available at all times.

2. Key Cybersecurity Challenges
Hospitals face multiple risks related to internal communications:

Phishing and Social Engineering | Attackers often target hospital staff through phishing emails or fake messages that appear to come from trusted colleagues. A single click on a malicious link can:
  • Install malware on the network
  • Steal login credentials
  • Compromise EHR or scheduling systems
  • Phishing remains one of the most common entry points for hospital cyberattacks.

Unencrypted Messaging Systems | Some internal messaging or email systems transmit information without end-to-end encryption, meaning data can be intercepted or read if attackers gain access to the network.
This threatens patient privacy and confidentiality both critical ethical concerns in healthcare.

Shadow IT (Unapproved Tools) | Staff may use personal devices or unapproved apps (like WhatsApp or Google Drive) to communicate quickly, especially during emergencies. Although convenient, these platforms are not designed for medical-grade security, leaving sensitive patient data unprotected.

Weak Access Controls | If communication systems lack proper access restrictions:
  • Staff may view patient data outside their role’s authority.
  • Former employees’ accounts may remain active.
  • Attackers could impersonate staff using compromised credentials.

These issues can lead to data leaks, privacy violations, and unauthorized access.

Insider Threats
Sometimes, data is compromised intentionally or accidentally by staff.Examples include:
  • Forwarding confidential information to the wrong recipient
  • Downloading attachments onto personal devices
  • Using weak passwords on shared workstations
  • Internal mistakes account for a large portion of healthcare data breaches each year.

3. Security Measures to Protect Internal Communication
Hospitals can reduce these risks by implementing strong technical and procedural controls:
  • Use encrypted email and messaging systems (e.g. secure hospital intranet or end-to-end encrypted apps).
  • Multi-factor authentication (MFA) for all logins.
  • Regular staff cybersecurity training, focusing on phishing awareness and data handling.
  • Access control policies to limit who can view or share sensitive information.
  • Device management systems to ensure all hospital devices meet security standards.
  • Network monitoring to detect unusual communication traffic or data transfers.
  • Incident response protocols for suspected data leaks or unauthorized communications.

4. Ethical and Operational Considerations
Internal communications in healthcare must maintain the CIA triad Confidentiality, Integrity, and Availability while also supporting fast decision-making in critical situations. Penetration testers must therefore:
  • Avoid disrupting active communication systems during tests
  • Respect data confidentiality and patient privacy
  • Report vulnerabilities responsibly to minimize operational risk

Balancing security with functionality is essential overly restrictive controls could slow medical response times, but weak controls could expose lives and data to danger.

Cybersecurity in Healthcare

Internal Communications Security Challenges – Review Questions


Closed Questions

1. Which of the following is an example of social engineering?

Installing antivirus software
Sending a fake email asking for login details
Encrypting sensitive files
Using a firewall

2. What does E2EE stand for?

End-to-End Evaluation
End-to-End Encryption
Entry-to-Exit Encoding
End-user Encryption Exchange

3. True or False: Shadow IT refers to authorized communication platforms approved by the hospital IT department.

True
False

4. Which of the following is NOT part of the CIA triad?

Confidentiality
Integrity
Complexity
Availability

5. Which of the following helps protect internal communications from unauthorized access?

Disabling encryption
Multi-factor authentication (MFA)
Sharing passwords across staff
Using public Wi-Fi

Open Questions

Click “Show Answer” to reveal guidance or model points.

1. Explain how phishing can lead to a wider network compromise in a hospital.

Sample answer: Phishing emails may trick staff into revealing login credentials or downloading malware, allowing attackers to move laterally through hospital systems and access EHR databases or internal communication servers.

2. Describe two ways hospitals can reduce the risks associated with unencrypted internal communications.

  • Implement end-to-end encryption for all internal emails and messaging platforms.
  • Ensure network connections are secure using VPNs and HTTPS protocols.

3. Outline three security policies that can help prevent insider threats.

  • Regular staff training on data handling and cybersecurity awareness.
  • Access control policies limiting data visibility to necessary roles.
  • Monitoring user activity logs and enforcing strong authentication.

4. Discuss the ethical challenges faced by cybersecurity testers when examining internal communication systems in active hospitals.

Guidance: Testers must avoid interrupting communication critical to patient care, must protect private patient and staff data, and should only conduct tests with explicit authorization and careful timing.

5. Evaluate whether convenience or security should take priority in hospital communication systems, providing examples from the case study.

Model points: Students may argue that while convenience improves care speed, lack of encryption or poor access control can risk data breaches. Hospitals must balance both by deploying secure, user-friendly systems with proper training.
Cyberattack | A deliberate attempt by an individual or group to gain unauthorized access to a computer system, network, or data for malicious purposes such as theft, damage, or disruption.
Electronic Health Record (EHR)  | A digital version of a patient’s medical history maintained by healthcare providers, containing personal, medical, and treatment information.
Ransomware  | A type of malware that encrypts data or locks systems until a ransom is paid by the victim, often using cryptocurrencies.
Malware  | Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems. Examples include viruses, worms, Trojans, and ransomware.
Social Engineering  | Manipulating people into revealing confidential information or performing actions that compromise security (e.g., clicking phishing links).
Phishing  |  A social engineering technique that uses deceptive emails or messages to trick users into revealing credentials or downloading malicious software.
Vishing  | Short for “voice phishing,” where attackers use phone calls to trick individuals into providing sensitive information.
Pretexting  | A form of social engineering where an attacker creates a fabricated scenario (a “pretext”) to persuade a target to reveal information or perform an action.
Identity Theft  | The illegal use of someone’s personal data (such as name, address, or ID number) to commit fraud or other crimes.
Open-Source Intelligence (OSINT)Information collected from publicly available sources, such as websites, social media, and online databases, used to assess potential vulnerabilities.
Internet of Things (IoT)  | A network of interconnected devices that communicate and share data, often used in healthcare for monitoring and diagnostics (e.g., smart monitors, infusion pumps).
Vulnerability  | A weakness in a system or network that could be exploited by a threat actor to gain unauthorized access or cause harm.
Data Breach  | The unauthorized access, disclosure, or loss of confidential data, often resulting in privacy and financial consequences.
Defense-in-Depth  | A layered security strategy that uses multiple defensive mechanisms to protect data and systems.
Confidentiality  | Ensuring that sensitive data is accessible only to authorized individuals and protected from unauthorized disclosure.
Integrity  | Guaranteeing that data remains accurate and unaltered during storage or transmission.
Availability  | Ensuring that authorized users have reliable access to data and systems when needed—particularly critical in healthcare environments.
Ethical Hacking  | Authorized and legal hacking performed by cybersecurity professionals to identify and fix vulnerabilities before malicious hackers exploit them.
Penetration Testing (Pen Test) | A simulated cyberattack on a system to evaluate its security, following a structured standard such as PTES.
Critical Infrastructure  | ​Systems and assets essential for the functioning of a society or economy—healthcare systems are considered part of this category.
OTHER RELATED TERMS
  • Natural Language Processing (NLP)
  • High Query Volume
  • Decision Algorithms
  • Machine Learning Models
  • Dependencies
  • Training Dataset
  • Computational Resources
  • Tensor Processing Units (TPUs)
  • Latency Optimization
  • Response Time
  • Streamline the Critical Path
  • Bottlenecks
  • Optimize Models
  • Upgrade Infrastructure
  • Regularly Update the Training Dataset

Cybersecurity in Healthcare

IoT Devices in Healthcare – Review Questions


Closed Questions

1. What does IoT stand for?

Internet of Tools
Internet of Things
Integrated Operational Technology
Internal Online Transmission

2. Which of the following is an example of an IoT device used in hospitals?

Desktop computer used for payroll
MRI scanner connected to a local network
Hand-written patient chart
Security guard walkie-talkie

3. True or False: IoT devices in hospitals are immune to cyberattacks.

True
False

4. Which of the following is a benefit of using IoT in healthcare?

Reduced monitoring accuracy
Real-time patient data and alerts
Increased network isolation
Limited device communication

5. Which of the following best describes a common IoT vulnerability?

They use strong encryption by default
They often have default passwords and outdated firmware
They never store patient data
They are immune to ransomware

Open Questions

Click “Show Answer” to reveal guidance or model points.

1. Explain one way IoT devices improve healthcare and one way they increase cybersecurity risk.

Sample answer: IoT devices allow real-time monitoring of patients, improving safety and efficiency. However, they increase cybersecurity risk because they can be exploited through weak passwords or outdated firmware.

2. Describe how a compromised IoT medical device could impact both patient safety and hospital operations.

Sample answer: A compromised infusion pump could administer incorrect dosages, endangering patients. It might also spread malware across the hospital network, forcing critical systems offline.

3. Outline three measures hospitals can take to secure IoT devices against cyberattacks.

  • Use strong, unique passwords and multi-factor authentication.
  • Encrypt all data transmissions.
  • Regularly update firmware and segment IoT networks from core hospital systems.

4. Evaluate the trade-off between the benefits of IoT in improving patient care and the cybersecurity risks introduced.

Guidance: Responses should discuss how IoT increases efficiency and safety but simultaneously expands the attack surface. Strong security policies and ethical testing reduce this trade-off.

5. Describe what happened in the 2017 WannaCry attack and explain why IoT devices made healthcare systems vulnerable.

Sample answer: The WannaCry ransomware spread through unpatched Windows systems, encrypting data and locking devices. Many hospital IoT and medical systems ran outdated software, allowing rapid infection and service disruption.

Cybersecurity in Healthcare

Internal Communications Security Challenges – Review Questions


Closed Questions

1. Which of the following is an example of social engineering?

Installing antivirus software
Sending a fake email asking for login details
Encrypting sensitive files
Using a firewall

2. What does E2EE stand for?

End-to-End Evaluation
End-to-End Encryption
Entry-to-Exit Encoding
End-user Encryption Exchange

3. True or False: Shadow IT refers to authorized communication platforms approved by the hospital IT department.

True
False

4. Which of the following is NOT part of the CIA triad?

Confidentiality
Integrity
Complexity
Availability

5. Which of the following helps protect internal communications from unauthorized access?

Disabling encryption
Multi-factor authentication (MFA)
Sharing passwords across staff
Using public Wi-Fi

Open Questions

Click “Show Answer” to reveal guidance or model points.

1. Explain how phishing can lead to a wider network compromise in a hospital.

Sample answer: Phishing emails may trick staff into revealing login credentials or downloading malware, allowing attackers to move laterally through hospital systems and access EHR databases or internal communication servers.

2. Describe two ways hospitals can reduce the risks associated with unencrypted internal communications.

  • Implement end-to-end encryption for all internal emails and messaging platforms.
  • Ensure network connections are secure using VPNs and HTTPS protocols.

3. Outline three security policies that can help prevent insider threats.

  • Regular staff training on data handling and cybersecurity awareness.
  • Access control policies limiting data visibility to necessary roles.
  • Monitoring user activity logs and enforcing strong authentication.

4. Discuss the ethical challenges faced by cybersecurity testers when examining internal communication systems in active hospitals.

Guidance: Testers must avoid interrupting communication critical to patient care, must protect private patient and staff data, and should only conduct tests with explicit authorization and careful timing.

5. Evaluate whether convenience or security should take priority in hospital communication systems, providing examples from the case study.

Model points: Students may argue that while convenience improves care speed, lack of encryption or poor access control can risk data breaches. Hospitals must balance both by deploying secure, user-friendly systems with proper training.
Picture
NEXT PAGE | PENETRATION TESTING
☐ PART 1 | INTRODUCTION TO THE CASE STUDY
➩ PART 2  |  CYBERSECURITY IN HEALTHCARE
☐ PART 3  |  PENETRATION TESTING EXECUTION STANDARD (PTES) OVERVIEW
☐ PART 4  |  PHASE 1: PRE-ENGAGEMENT INTERACTIONS
☐ PART 5 |  PHASE 2: INTELLIGENCE GATHERING
☐ PART 6  |  PHASE 3: THREAT MODELLING
☐ PART  7  |  PHASE 4 & 5: VULNERABILITY ANALYSIS AND EXPLOITATION
☐ PART 8  |  PHASE 6: POST-EXPLOITATION
☐ PART 9  | PHASE 7: REPORTING & RESPONSE PLANS
☐ PART 10 | ETHICS, CHALLENGES, AND EXAM PREPERATION
☐ SUMMARY AND REVISION CHECKLIST
Picture
SUGGESTIONS
We would love to hear from you
SUBSCRIBE 
To enjoy more benefits
We hope you find this site useful. If you notice any errors or would like to contribute material then please contact us.