Nothing Special   »   [go: up one dir, main page]

Alsuwaidi et al., 2020 - Google Patents

Security vulnerabilities detected in medical devices

Alsuwaidi et al., 2020

Document ID
977978392602769186
Author
Alsuwaidi A
Hassan A
Alkhatri F
Ali H
Mohammad Q
Alrabaee S
Publication year
Publication venue
2020 12th Annual Undergraduate Research Conference on Applied Computing (URC)

External Links

Snippet

The increasingly close connection between medical devices and computer networks has given rise to novel cybersecurity threats. Due to the elevated number of connected medical devices, this means that more opportunities for security vulnerabilities exist. To safeguard …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F19/00Digital computing or data processing equipment or methods, specially adapted for specific applications
    • G06F19/30Medical informatics, i.e. computer-based analysis or dissemination of patient or disease data
    • G06F19/32Medical data management, e.g. systems or protocols for archival or communication of medical images, computerised patient records or computerised general medical references
    • G06F19/322Management of patient personal data, e.g. patient records, conversion of records or privacy aspects

Similar Documents

Publication Publication Date Title
Newaz et al. A survey on security and privacy issues in modern healthcare systems: Attacks and defenses
Chacko et al. Security and privacy issues with IoT in healthcare
Priyadarshini et al. A new enhanced cyber security framework for medical cyber physical systems
Alsubaei et al. Security and privacy in the internet of medical things: taxonomy and risk assessment
López Martínez et al. A comprehensive review of the state-of-the-art on security and privacy issues in healthcare
Sametinger et al. Security challenges for medical devices
Burns et al. A brief chronology of medical device security
McMahon et al. Assessing medical device vulnerabilities on the Internet of Things
Alsuwaidi et al. Security vulnerabilities detected in medical devices
Ganai et al. A detailed investigation of implementation of Internet of Things (IOT) in cyber security in healthcare sector
Anandarajan et al. Protecting the Internet of medical things: A situational crime-prevention approach
Puat et al. IoMT: a review of pacemaker vulnerabilities and security strategy
Xu et al. Analysis of cyber-security vulnerabilities of interconnected medical devices
Chen Toward realizing self-protecting healthcare information systems: Design and security challenges
Longras et al. Security vulnerabilities on implantable medical devices
Easttom et al. Mitigating implanted medical device cybersecurity risks
Boddy et al. A study into detecting anomalous behaviours within healthcare infrastructures
Le Bris et al. State of cybersecurity & cyber threats in healthcare organizations
Lehto et al. Cyber security in healthcare systems
Ranganayaki et al. Cyber security in smart hospitals: A investigational case study
Vockley Safe and secure? Healthcare in the Cyberworld
Musthafa et al. Safeguarding IoT Device Deployment in Healthcare: Analysis and Strategies for Enhanced Security and Privacy
Alhammad et al. A review of cyber threats to medical devices integration with electronic medical records
Kumar et al. Securing cyber-resilience in healthcare sector
Hempel et al. Hacking humans: A case study and analysis of vulnerabilities in the advancing medical device landscape