Endpoint Security for Healthcare Devices: Protecting Patient Data on Windows and Samsung Assets
DOI:
https://doi.org/10.63530/IJCSITR_2025_06_03_007Keywords:
Endpoint Security, Samsung Knox, HIPAA, GDPR, Threat Detection, Mobile Device Management (MDM)Abstract
Healthcare institutions in the digital age actively implement advanced technologies together with connected devices to achieve better healthcare services and operational process improvements. The transition to advanced healthcare technologies increases cybersecurity difficulties, especially with regard to endpoint defense systems. The Windows-based workstations and Samsung medical and mobile devices that serve as endpoint devices face rising attacks from cyber threats that attempt to access patient records. This research paper examines endpoint defense strategies that target healthcare facilities with special attention to Samsung devices and Windows operating systems. The paper examines healthcare system-specific vulnerabilities and then addresses threat pathways while reviewing present solutions before providing an all-encompassing endpoint security approach. The framework implements safe device parameters, encrypted data storage, biometric security features, and partitioned network infrastructure that combines with persistent threat detection protocols. The security framework meets compliance requirements, including HIPAA and GDPR standards, to protect health-related patient information. Our approach combines security layers with AI threat detection, mobile/fixed asset-specific policies, and scheduled risk evaluation. Our framework substantially improves endpoint resilience against ransomware, phishing attacks, data exfiltration, and insider threats through simulation and empirical tests. The research paper concludes with remarks on upcoming study guidelines and the necessity of developing an active security mindset within healthcare.
References
Uzzaman, A. (2018). End-point information security in the healthcare industry. International Journal of Engineering & Technology, 7(4.36), 338-349.
Martin, P. D. (2016). Securing medical devices and protecting patient privacy in the technological age of healthcare (Doctoral dissertation, Johns Hopkins University).
Taylor, K., Smith, A., Zimmel, A., Alcantara, K., & Wang, Y. (2022, October). Medical Device Security Regulations and Assessment Case Studies. In 2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS) (pp. 742-747). IEEE.
Clark, U. Y., & Baltezegar, J. G. (2018). Healthcare information security and assurance. Human-Computer Interaction and Cybersecurity Handbook, 257-270.
Brannock, K. A. (2022). Cybersecurity Risk Associated with Endpoint and IoT Devices: Examining Endpoint Print Device Security (Doctoral dissertation, Marymount University).
Moosavi, S. R., Nigussie, E., Levorato, M., Virtanen, S., & Isoaho, J. (2018). Performance analysis of end-to-end security schemes in healthcare IoT. Procedia computer science, 130, 432-439.
Williams, P. A., & McCauley, V. (2016, December). Always connected: The security challenges of the healthcare Internet of Things. In 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT) (pp. 30-35). IEEE.
Moosavi, S. R., Gia, T. N., Nigussie, E., Rahmani, A. M., Virtanen, S., Tenhunen, H., & Isoaho, J. (2015, October). Session resumption-based end-to-end security for healthcare internet-of-things. In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (pp. 581-588). IEEE.
Walker-Roberts, S., Hammoudeh, M., & Dehghantanha, A. (2018). A systematic review of the availability and efficacy of countermeasures to internal threats in healthcare critical infrastructure. IEEE Access, 6, 25167-25177.
Narayana Samy, G., Ahmad, R., & Ismail, Z. (2010). Security threats categories in healthcare information systems. Health Informatics Journal, 16(3), 201-209.
Rahim, M. J., Rahim, M. I. I., Afroz, A., & Akinola, O. (2024). Cybersecurity threats in healthcare it: Challenges, risks, and mitigation strategies. Journal of Artificial Intelligence General Science (JAIGS) ISSN: 3006-4023, 6(1), 438-462.
Aljuraid, R., & Justinia, T. (2022). Classification of challenges and threats in healthcare cybersecurity: a systematic review. Advances in Informatics, Management and Technology in Healthcare, 362-365.
Spanakis, E. G., Bonomi, S., Sfakianakis, S., Santucci, G., Lenti, S., Sorella, M., ... & Magalini, S. (2020, July). Cyber-attacks and threats for healthcare–a multi-layer thread analysis. In 2020 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC) (pp. 5705-5708). IEEE.
Jung, S. J., Myllylä, R., & Chung, W. Y. (2012). Wireless machine-to-machine healthcare solution using Android mobile devices in global networks. IEEE Sensors Journal, 13(5), 1419-1424.
Mohapatra, D. P., Mohapatra, M. M., Chittoria, R. K., Friji, M. T., & Kumar, S. D. (2015). The scope of mobile devices in health care and medical education. International Journal of Advanced Medical and Health Research, 2(1), 3-8.
Wang, B. X., Chen, J. L., & Yu, C. L. (2022). An AI-powered network threat detection system. IEEE Access, 10, 54029-54037.
Prince, N. U., Faheem, M. A., Khan, O. U., Hossain, K., Alkhayyat, A., Hamdache, A., & Elmouki, I. (2024). AI-powered data-driven cybersecurity techniques: Boosting threat identification and reaction. Nanotechnology Perceptions, 20, 332-353.
Moosavi, S. R., Gia, T. N., Nigussie, E., Rahmani, A. M., Virtanen, S., Tenhunen, H., & Isoaho, J. (2016). End-to-end security scheme for mobility-enabled healthcare Internet of Things. Future Generation Computer Systems, 64, 108-124.
Arefin, S. (2024). Strengthening Healthcare Data Security with Ai-Powered Threat Detection. International Journal of Scientific Research and Management (IJSRM), 12(10), 1477-1483.
Yaqoob, T., Abbas, H., & Shafqat, N. (2019). Integrated security, safety, and privacy risk assessment framework for medical devices. IEEE journal of biomedical and health informatics, 24(6), 1752-1761.
Elahi, B. (2021). Safety risk management for medical devices. Academic Press.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Anjan Gundaboina (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.




