VULNERABILITY ASSESSMENT OF OPERATING SYSTEMS IN HEALTHCARE: EXPLOITATION IMPLICATIONS TECHNIQUES AND SECURITY

Authors

  • Muhammad Ahsan Qureshi Department of Computer Science, Air University, Islamabad, Pakistan
  • Shakeel Ahmed Department of e-learning Center (ELC), Jazan University, Saudi Arabia.
  • Asim Mehmood Department of Health Informatics, College of Public Health and Tropical Medicine, Jazan University, Saudi Arabia.
  • Reema Shaheen Department of e-learning Center (ELC), Jazan University, Saudi Arabia.
  • Muhammad Shahid Dildar Department of Computer Science, King Khalid University, Saudi Arabia

DOI:

https://doi.org/10.59365/hsj.2(2).2024.98

Keywords:

Operating System, Healthcare, Security Implications

Abstract

Aim: This research highlights the importance of vulnerability assessment and techniques for exploiting the Windows operating system (OS) in health care. Utilizing CVE data and other
vulnerability reports plays a crucial role in evaluating healthcare's operating system security posture. Security tools such as Metasploit, msfvenom, Nessus, and Nmap were required to conduct vulnerability assessments and intrusion experiments in a simulated environment. Material & Methods: The research followed a typical ethical hacking procedure, including reconnaissance, network scanning, vulnerability assessment, exploit creation, and gaining access to the latest version of the Windows OS. Despite installing the latest version of Windows, complete protection against attacks is not guaranteed.
Future Research Directions: Further research is necessary to assess the system's vulnerabilities and recommend improved solutions thoroughly.

Published

2024-06-07