Alsuwaidi et al., 2020 - Google Patents
Security vulnerabilities detected in medical devicesAlsuwaidi et al., 2020
- Document ID
- 977978392602769186
- Author
- Alsuwaidi A
- Hassan A
- Alkhatri F
- Ali H
- Mohammad Q
- Alrabaee S
- Publication year
- Publication venue
- 2020 12th Annual Undergraduate Research Conference on Applied Computing (URC)
External Links
Snippet
The increasingly close connection between medical devices and computer networks has given rise to novel cybersecurity threats. Due to the elevated number of connected medical devices, this means that more opportunities for security vulnerabilities exist. To safeguard …
- 101700069624 aksF 0 description 12
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F19/00—Digital computing or data processing equipment or methods, specially adapted for specific applications
- G06F19/30—Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
- G06F19/32—Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
- G06F19/322—Management of patient personal data, e.g. patient records, conversion of records or privacy aspects
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Newaz et al. | A survey on security and privacy issues in modern healthcare systems: Attacks and defenses | |
Chacko et al. | Security and privacy issues with IoT in healthcare | |
Priyadarshini et al. | A new enhanced cyber security framework for medical cyber physical systems | |
Alsubaei et al. | Security and privacy in the internet of medical things: taxonomy and risk assessment | |
López Martínez et al. | A comprehensive review of the state-of-the-art on security and privacy issues in healthcare | |
Sametinger et al. | Security challenges for medical devices | |
Burns et al. | A brief chronology of medical device security | |
McMahon et al. | Assessing medical device vulnerabilities on the Internet of Things | |
Alsuwaidi et al. | Security vulnerabilities detected in medical devices | |
Ganai et al. | A detailed investigation of implementation of Internet of Things (IOT) in cyber security in healthcare sector | |
Anandarajan et al. | Protecting the Internet of medical things: A situational crime-prevention approach | |
Puat et al. | IoMT: a review of pacemaker vulnerabilities and security strategy | |
Xu et al. | Analysis of cyber-security vulnerabilities of interconnected medical devices | |
Chen | Toward realizing self-protecting healthcare information systems: Design and security challenges | |
Longras et al. | Security vulnerabilities on implantable medical devices | |
Easttom et al. | Mitigating implanted medical device cybersecurity risks | |
Boddy et al. | A study into detecting anomalous behaviours within healthcare infrastructures | |
Le Bris et al. | State of cybersecurity & cyber threats in healthcare organizations | |
Lehto et al. | Cyber security in healthcare systems | |
Ranganayaki et al. | Cyber security in smart hospitals: A investigational case study | |
Vockley | Safe and secure? Healthcare in the Cyberworld | |
Musthafa et al. | Safeguarding IoT Device Deployment in Healthcare: Analysis and Strategies for Enhanced Security and Privacy | |
Alhammad et al. | A review of cyber threats to medical devices integration with electronic medical records | |
Kumar et al. | Securing cyber-resilience in healthcare sector | |
Hempel et al. | Hacking humans: A case study and analysis of vulnerabilities in the advancing medical device landscape |