Internet Risk and Cybercrime at the U.S. Department of Veterans Affairs
Internet Risk
Cybercrime
Today, the mission of the U.S. Department of Veterans Affairs (VA) as taken from President Lincoln's second inaugural address is, "To care for him who shall have borne the battle, and for his widow, and his orphan." To this end, this cabinet-level organization provides healthcare services through the Veterans Health Administration (VHA) to nine million veteran patients each year. In an effort to improve the quality of these healthcare services, the VHA has implemented a number of technological solutions including electronic healthcare records and a nationwide communication network. These solutions, though, have also introduced a number of security risks and a number of high-profile security breaches have drawn increased scrutiny on the VHA in recent years. This paper provides an overview of the VHA and what types of Internet-related security threats it faces. A discussion concerning cybercrime at the VA is followed by a summary of the research and important findings concerning these issues in the paper's conclusion.
Today, through its Veterans Health Administration (VHA), the Department of Veterans Affairs (VA) is the largest healthcare provider in the United States, and millions of veteran patients receive care from its nationwide network of medical centers, outpatient clinics and Vet Centers. In recent years, the VA has committed itself to improving the quality of patient care it provides by implementing a wide range of technological solutions, including electronic healthcare records and a sophisticated communications system (Boyer, 2011). These same innovations, though, have also introduced a number of security problems for this cabinet-level organization, including most especially the compromise of sensitive patient data. Although the VA is not unique in experiencing these types of security problems, the fact that the organization is so large and its mission is so critical makes these breaches an important issue for all stakeholders. To determine the facts, this paper provides an overview of the VA, and a critical analysis of the strategic approaches that are used to identify analyze and address these types of cyber-threats within this organization, taking account the impact of managing the risk throughout this organization. Finally, a summary of the research and important findings concerning these issues are provided in the conclusion.
Review and Discussion
Overview of the Department of Veterans Affairs
The VHA is the nation's largest integrated health care system, and consists of more than 1,700 healthcare facilities that provide care for nearly 9 million veteran patients annually as shown in Figure 1 below (Veterans Health Administration, 2016).
Figure 1. Regional breakdown of VA facilities in the United States
Source: http://www.va.gov/directory/images/VHA/VHAmap.gif
The healthcare facilities identified in Figure 1 above comprise the VHA's integrated services network of 23 divisions as follows:
VISN 1: VA New England Healthcare System
VISN 2: VA Health Care Upstate New York
VISN 4: VA Healthcare - VISN 4
VISN 5: VA Capitol Health Care Network
VISN 6: VA Mid-Atlantic Health Care Network
VISN 7: VA Southeast Network
VISN 8: VA Sunshine Healthcare Network
VISN 9: VA MidSouth Healthcare Network
VISN 10: VA Healthcare System
VISN 12: VA Great Lakes Health Care System
VISN 15: VA Heartland Network
VISN 16: South Central VA Health Care Network
VISN 17: VA Heart of Texas Health Care Network
VISN 18: VA Southwest Health Care Network
VISN 19: Rocky Mountain Network
VISN 20: Northwest Network
VISN 21: Sierra Pacific Network
VISN 22: Desert Pacific Healthcare Network
VISN 23: VA Midwest Health Care Network (Veterans Health Administration, 2016).
In these regions, the VHA operates of 150 medical centers, almost 1,400 community-based outpatient clinics, community living centers, Vet Centers and domiciliaries staffed by more than 53,000 healthcare practitioners (Veterans Health Administration, 2016). With an annual budget exceeding $182 billion (Annual budget submission, 2016), it is clear that an enormous amount of resources have been allocated to the VA to fulfill its mission "To care for him who shall have borne the battle, and for his widow, and his orphan." The organization, though, has failed in this mission in a number of ways in recent years, including most especially the compromise of millions of patient data records as discussed below.
Internet Risk at the Department of Veterans Affairs
Given its far-flung operations and thousands of employees, it is little wonder that the VA has experienced a number of Internet-related security breaches in recent years. Many of the risks that are associated with the Internet directly relate to the advantages the medium provides. As Eastmond (2004) cautions, "The Internet is indeed a technology of freedom -- but it can free the...
VA Security Breach The Veteran's Affairs department has had several notable security breeches in recent years. In one 2006 incident, patient data was downloaded onto an unsecured laptop and stolen. Patient records at the VA were unencrypted at the time. "If data is properly encrypted there is no data breach. The device can be stolen but no data can be accessed" because the thief lacks the 'key' to decode the data
Technology Proposal/Implementation Paper A: Introduction The Department of Veterans Affairs (VA) remains a vital entity in as far as the provision of key services to veterans in the country is concerned. The Veteran Benefits Administration (VBA), to a large extent, concerns itself with the administration of U.S. Department of Veteran Affairs’ programs. This is more so the case with regard to the provision or advancement of various forms of support to not
Less satisfied knowledge dealing processes like keeping copies of old as well as unused spreadsheets which have several Social Security numbers instead of transmitting such data to long period and safe storage- persistently involve data at vulnerable stage. (Schuster 140-141) Security concerns are associated with primarily to the system security, information security and also to Encryption. Taking into consideration the system security, it is applicable that what is pertinent to
One can also set up policies and procedures to respond to and reduce the effects of the loss or damage to ones it environment (Capability: Security Process, 2012). The assess phase should decide the fitting security needs for an organization and which processes are presently in place. Security requirements can vary radically from company to company or institution to institution based, for instance, on dimension, industry or field, regional laws,
First of all only a scant few of these Veterans groups will acknowledge the "promise" of free health care; for the most part these groups will tout the benefits already promised by the Veterans Administration and assert that cuts in these benefits are the same a broken promise-or contractual breach in legal terms. The idea of the United States military making a "promise" or forging a legally binding agreement between
Interviewee The information technology (IT) professional interviewed telephonically for this paper was the director of quality assurance for a VA medical center in Oklahoma. The director is a registered nurse and masters of public health who has responsibility for the implementation and administration of electronic health records in the medical center and its three supported outpatient clinics, including privacy and security protections for the medical center's decentralized hospital computer system.
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now