cybersecurity, telemedicine, cyberattack, confidential information, personal data, online medical services


In conditions of strict quarantine due to the COVID-19
pandemic, thanks to the capabilities of modern information and telecommunications systems, a significant part
of medical services has been transformed into a digital
environment online. The positive effect of this lies primarily in the elimination of the digital divide and realization of citizens' rights to equal medical care in electronic
format. However, this process has led to the potential
danger of confidential information leaks. Nowadays, the
cybersecurity issues of medical computer systems are very
relevant and require a comprehensive and balanced approach to the solution. An important component is the
legal protection of confidential information circulating in
medical computer systems. Analysis of digital technologies and computer systems for the provision of online
medical services has shown the urgency of anonymizing
patients' medical data, protecting medical devices connected to the Internet from leaks of confidential medical
information. Therefore, the rules for ensuring the confidentiality of data processed in medical information systems must be strictly observed when developing appropriate software. The issue of security of the infrastructure
for collection, storage and transmission of medical data is
primarily to limit access and create a reliable electronic
database of medical information. Certain security issues
have been identified for cloud platforms used to store
data in the provision of health services related to their
vulnerability to possible cyberattacks. To increase the
credibility and ensure the reliable protection of confidential medical information processed in such services, all
software, hardware and organizational aspects should be
considered. Analysis of cybersecurity of medical computer
systems has identified a number of data protection issues,
the importance of multifactor user authentication, access
control, the use of effective cryptographic encryption
schemes to effectively protect health ecosystems on the
Internet and identify areas for further research to provide
quality secure online health services.


Misery of Ransomware Hits Hospitals the Hardest. URL: (дата звернення: 12.02.2021).

Luh F., Yen Y. Cybersecurity in Science and Medicine: Threats and Challenges. Trends in biotechnology. 2020. № 38(8). P. 825-828. DOI: 10.1016/j.tibtech.2020.02.010.

Schumacher G., Sawaya St., Nelson D., Hansen A. Genetic Information Insecurity as State of the Art. Frontiers in Bioengineering and Biotechnology. 2020. Vol. 8. P. 1-9. DOI: 10.3389/fbioe.2020.591980.

Dridi A., Sassi S., Faiz S. A Smart IoT Platform for Personalized Healthcare Monitoring Using Semantic Technologies. IEEE International Conference on Tools with Artificial Intelligence. 2017. P. 1198-1203. DOI: 10.1109/ICTAI.2017.00182.

Yehia L., Khedr A., Darwish A. Hybrid Security Techniques for Internet of Things Healthcare Applications. Advances in Internet of Things. 2015. №5. P. 21-25. DOI: 10.4236/ait.2015.53004.

Шупяцький І. М. Комплексна система захисту інформації медичної – надійний алгоритм надання якісної медичної допомоги в закладах охорони здоров’я. Актуальні проблеми клінічної та профілактичної медицини. 2013. Т. 1. № 2. С. 20-24.

Manta C., Jain S., Coravos A., Mendelsohn D., Izmailova E. An Evaluation of Biometric Monitoring Technologies for Vital Signs in the Era of COVID-19. Clinical and Translational Science. 2020. № 13. Р. 1-35. DOI: 10.1111/cts.12874.

Iyengar A., Kundu A., Pallis G. Healthcare Informatics and Privacy. IEEE Internet Computing. 2018. Т. 22. № 2. Р. 29-31. DOI: 10.1109/MIC.2018.022021660.

Silic M., Back A. The Influence of Risk Factors in Decision-Making Process for Open Source Software Adoption. International Journal of Information Technology & Decision Making. 2016. № 15. DOI: 10.1142/S0219622015500364.

Гапон А.О., Федорченко В.М., Поляков А.О. Підходи до побудови моделі загроз для аналізу безпеки відкритого програмного коду. Захист інформації та кібернетична безпека. 2020. Вип. 1(160). С. 128-135. DOI: 10.30748/soi.2020.160.17.

Zadereyko O., Trofymenko O., Loginova N. Algorithm of user’s personal data protection against data leaks in Windows 10 OS. Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska. Lublin University of Technology. 2019. Vol. 9. No 1, pp. 41-44. DOI: 10.5604/01.3001.0013.0905

Трофименко О.Г., Прокоп Ю.В., Логінова Н.І., Задерейко О.В. Кібербезпека України: аналіз сучасного стану. Захист інформації. 2019. Т. 21. № 3. Київ: Національний авіаційний університет. С. 150–157. DOI: 10.18372/2410-7840.21.13951.

Health insurance portability and accountability act. URL: (дата звернення: 12.02.2021).

Complete guide to GDPR compliance. URL: (дата звернення: 12.02.2021).

Закон України «Основи законодавства України про охорону здоров'я». URL: (дата звернення: 12.02.2021).

Закон України «Про захист персональних даних». URL: (дата звернення: 12.02.2021).

HIPAA: як захищають медичні дані пацієнтів в США? URL: (дата звернення: 12.02.2021).

Kosmidis, D., Nestoras, K. Telehealth and telenursing in time of COVID-19. The step of ASCLIPI. 2020. Vol. 19, № 4. P. 256-272. DOI: 10.5281/zenodo.4061532.