Privacy-Aware Access Control and Authorization in Passive Network Monitoring Infrastructures

Author(s):  
Fotios Gogoulos ◽  
Anna Antonakopoulou ◽  
Georgios V. Lioudakis ◽  
Aziz S. Mousas ◽  
Dimitra I. Kaklamani ◽  
...  
Author(s):  
Fotios Gogoulos ◽  
Anna Antonakopoulou ◽  
Aziz S. Mousas ◽  
Georgios V. Lioudakis ◽  
Dimitra I. Kaklamani ◽  
...  

Author(s):  
Amir Azodi ◽  
David Jaeger ◽  
Feng Cheng ◽  
Christoph Meinel

Author(s):  
Georgios V. Lioudakis ◽  
Francesca Gaudino ◽  
Elisa Boschi ◽  
Giuseppe Bianchi ◽  
Dimitra I. Kaklamani ◽  
...  

Passive network monitoring is very useful for the operation, maintenance, control and protection of communication networks, while in certain cases it provides the authorities with the means for law enforcement. Nevertheless, the flip side of monitoring activities is that they are natively surrounded by serious privacy implications and, therefore, they are subject to data protection legislation. Chapter 22 investigates the challenges related to privacy protection in passive network monitoring, based on a joint technical and regulatory analysis of the associated issues. After introducing the issue and its special characteristics, the chapter provides background knowledge regarding the corresponding legal and regulatory framework, as well as some related work. It then delves into the description of the legal and regulatory requirements that govern network monitoring systems, before providing an overview of a reference monitoring system, which has been designed with these requirements in mind.


2012 ◽  
Vol 35 (1) ◽  
pp. 129-140 ◽  
Author(s):  
Antonis Papadogiannakis ◽  
Giorgos Vasiliadis ◽  
Demetres Antoniades ◽  
Michalis Polychronakis ◽  
Evangelos P. Markatos

Author(s):  
Eugenia I. Papagiannakopoulou ◽  
Maria N. Koukovini ◽  
Georgios V. Lioudakis ◽  
Joaquin Garcia-Alfaro ◽  
Dimitra I. Kaklamani ◽  
...  

2021 ◽  
Vol 55 (4) ◽  
pp. 121-130
Author(s):  
Priyanka Upendra

Abstract The number of cyberattacks and information system breaches in healthcare have grown exponentially, as well as escalated from accidental incidents to targeted and malicious attacks. With medical devices representing a substantial repository of all the assets in a healthcare system, network security and monitoring are critical to ensuring cyber hygiene of these medical devices. Because of the unique challenges of connected medical devices, a passive network monitoring (PNM) solution is preferred for its overall cybersecurity management. This article is intended to provide guidance on selecting PNM solutions while reinforcing the importance of program assessment, project management, and use of leading practices that facilitate the selection and further implementation of PNM solutions for medical devices. The article provides a detailed introduction to connected medical devices and its role in effective care delivery, an overview of network security types and PNM, an overview of the National Institute of Standards and Technology Cybersecurity Framework and its application for program assessment, essentials of project management for PNM solution selection and implementation, key performance indicators for measuring a solution's ability to meet critical cybersecurity needs for medical devices, and lessons learned from the author's professional experience, selective literature review, and leading practices. Rather than describing a complete list of guidelines for selecting PNM solutions, the current work is intended to provide guidance based on the author's experience and leading practices compiled from successful medical device cybersecurity programs.


Sign in / Sign up

Export Citation Format

Share Document