scholarly journals International Trends in Cyber Security for Medical Devices

2015 ◽  
Vol 85 (5) ◽  
pp. 513-517
Author(s):  
Dr. Karen C. Benson ◽  
Dr. Lorraine Jonassen ◽  
Dr. Binh Tran

2016 ◽  
Vol 11 (2) ◽  
pp. 198-202 ◽  
Author(s):  
Jonathan Sackner-Bernstein

Background: The focus of the medical device industry and regulatory bodies on cyber security parallels that in other industries, primarily on risk assessment and user education as well as the recognition and response to infiltration. However, transparency of the safety of marketed devices is lacking and developers are not embracing optimal design practices with new devices. Achieving cyber safe diabetes devices: To improve understanding of cyber safety by clinicians and patients, and inform decision making on use practices of medical devices requires disclosure by device manufacturers of the results of their cyber security testing. Furthermore, developers should immediately shift their design processes to deliver better cyber safety, exemplified by use of state of the art encryption, secure operating systems, and memory protections from malware.


2019 ◽  
pp. 1500-1516 ◽  
Author(s):  
Penelope Wang

Innovation and technological advancements have seen many devices and systems being linked up on to the Internet. Such devices and systems include personal medical devices like insulin pumps and pacemakers, cars, as well as critical infrastructure like power grids and traffic light systems. However, recent research by cyber security experts has revealed that these critical devices and systems are highly vulnerable to being hacked into and manipulated. Should such an attack be carried out successfully by bad actors, like violent extremists, this could result in physical injury or even death. Hence, this chapter aims to bring awareness on the kinetic cyber threat by highlighting various forms of kinetic cyber, and the vulnerabilities that make these devices and systems susceptible. In addition, this chapter introduces the motivations and characteristics of violent extremists who might engage in kinetic cyber, and ends off by proposing some recommended directions to counter this threat.


Author(s):  
Bruno J. Santos ◽  
Rachel P. Tabacow ◽  
Marcelo Barboza ◽  
Tarcisio F. Leão ◽  
Eduardo G. P. Bock

Cyber security in Healthcare is a growing concern. Since it has been a proliferation of IoT devices, data breaches from the healthcare industry are increasing the concern about how cyber security can protect data from connected medical devices. Recent years have seen numerous hacking and IT security incidents. Many healthcare organizations are facing problems to defend their networks from cybercriminals. In the current digital era, the physical world has a cyber-representation. Both the real and virtual worlds are connected in areas, such as informatics and manufacturing. Health 4.0 (H4.0) refers to a group of initiatives aiming to improve medical care for patients, hospitals, researchers, and medical device suppliers. Increasing collaboration in terms of medical equipment, artificial organs, and biosensors is a way to facilitate H4.0. As a result, cyber security budgets have increased, new technology has been purchased, and healthcare organizations are improving at blocking attacks and keeping their networks secure.


Author(s):  
Neelam Naik

Due to the complexity and heterogeneity of technology, devices, data and computation, Internet of Things (IoT) systems are vulnerable to the cyber-attacks. Many cyber security risk assessment frameworks dedicated to IoT systems are under study. This study introduces the unique risk ranking method by calculating risk impact and risk likelihood by quantifying them. This unique computational approach is applied in the context of medial domain to calculate risk ranking of two medical devices used in medical IoT-based system.


Author(s):  
Penelope Wang

Innovation and technological advancements have seen many devices and systems being linked up on to the Internet. Such devices and systems include personal medical devices like insulin pumps and pacemakers, cars, as well as critical infrastructure like power grids and traffic light systems. However, recent research by cyber security experts has revealed that these critical devices and systems are highly vulnerable to being hacked into and manipulated. Should such an attack be carried out successfully by bad actors, like violent extremists, this could result in physical injury or even death. Hence, this chapter aims to bring awareness on the kinetic cyber threat by highlighting various forms of kinetic cyber, and the vulnerabilities that make these devices and systems susceptible. In addition, this chapter introduces the motivations and characteristics of violent extremists who might engage in kinetic cyber, and ends off by proposing some recommended directions to counter this threat.


Sign in / Sign up

Export Citation Format

Share Document