University of Twente Student Theses

Login

Immersive VR cybersecurity training for physical and technical cyber threats in the healthcare sector

Sonneveld, Sven (2024) Immersive VR cybersecurity training for physical and technical cyber threats in the healthcare sector.

This is the latest version of this item.

[img] PDF
16MB
Abstract:Cyber threats are always changing and because of this cybersecurity also needs to be improved to keep up. Cybersecurity however has many links which all need to be strong for digital data to be secure, because with 1 point of failure data can already be lost to those trying to get access to it. The weakest link in cybersecurity is people (Khatari, 2023), which is an important and also difficult link to improve. This is because it is time-consuming to train people. There are also many training methods and they all vary in effectiveness. They also need to be taught about cybersecurity practices as it is constantly evolving to keep up with the best practices. An effective method found to help teach people about cybersecurity is VR (Klooster, 2022). They have found that the use of VR cybersecurity training had shown a significant increase in the average cybersecurity performance. In sectors with sensitive data, like the healthcare sector, this is especially prevalent as the importance of keeping this data as secure as possible. The data from the healthcare sector would contain private medical data that would be important for the patients and employees to keep secure. This is because such private medial data could be exploited by malicious actors and could cause harm to the patient. An example for this could be a contreversial medical procedure, which could affect the patient when this information gets released. A successfull cyberattack would also impact the functioning of the hospital, which could negatively impact the current patients that need medical attention. While the results from this cybersecurity training would be best applicable to the healthcare sector, where the amount of data security should be as high as possible, it would also apply to other sectors where the expected level of data security can be less stringent.
Item Type:Essay (Bachelor)
Faculty:EEMCS: Electrical Engineering, Mathematics and Computer Science
Programme:Creative Technology BSc (50447)
Link to this item:https://purl.utwente.nl/essays/101955
Export this item as:BibTeX
EndNote
HTML Citation
Reference Manager

 

Repository Staff Only: item control page