VULNERABILITY ASSESSMENT OF OPERATING SYSTEMS IN HEALTHCARE: EXPLOITATION IMPLICATIONS TECHNIQUES AND SECURITY

  • Muhammad Ahsan QureshiDepartment of Computer Science, Air University, Islamabad, Pakistan
  • Shakeel AhmedDepartment of e-learning Center (ELC), Jazan University, Saudi Arabia.
  • Asim MehmoodDepartment of Health Informatics, College of Public Health and Tropical Medicine, Jazan University, Saudi Arabia.
  • Reema ShaheenDepartment of e-learning Center (ELC), Jazan University, Saudi Arabia.
  • Muhammad Shahid DildarDepartment of Computer Science, King Khalid University, Saudi Arabia

DOI: 

https://doi.org/10.59365/hsj.2(2).2024.98

Keywords: 

Operating System, Healthcare, Security Implications

Abstract

Aim: This research highlights the importance of vulnerability assessment and techniques for exploiting the Windows operating system (OS) in health care. Utilizing CVE data and other  vulnerability reports plays a crucial role in evaluating healthcare's operating system security posture. Security tools such as Metasploit, msfvenom, Nessus, and Nmap were required to conduct vulnerability assessments and intrusion experiments in a simulated environment. Material & Methods: The research followed a typical ethical hacking procedure, including reconnaissance, network scanning, vulnerability assessment, exploit creation, and gaining access to the latest version of the Windows OS. Despite installing the latest version of Windows, complete protection against attacks is not guaranteed.
Future Research Directions: Further research is necessary to assess the system's vulnerabilities and recommend improved solutions thoroughly.