Skip to main content
. 2022 Mar 22;24(3):e29108. doi: 10.2196/29108

Table 3.

Attack scenarios and threats considered by the proposed system.

Types and attack scenario Threats
External threats

Eavesdropping Private data leakage (eg, electronic medical record and personal information)

Denial of service Service unavailable
Internal threats

Abnormal access Private data leakage

Data forgery Unexpected output