Selecting a Passive Network Monitoring Solution for Medical Device Cybersecurity Management

被引:1
|
作者
Upendra P. [1 ]
机构
[1] Sunnyvale, CA
来源
关键词
D O I
10.2345/0890-8205-55.4.121
中图分类号
学科分类号
摘要
The number of cyberattacks and information system breaches in healthcare have grown exponentially, as well as escalated from accidental incidents to targeted and malicious attacks. With medical devices representing a substantial repository of all the assets in a healthcare system, network security and monitoring are critical to ensuring cyber hygiene of these medical devices. Because of the unique challenges of connected medical devices, a passive network monitoring (PNM) solution is preferred for its overall cybersecurity management. This article is intended to provide guidance on selecting PNM solutions while reinforcing the importance of program assessment, project management, and use of leading practices that facilitate the selection and further implementation of PNM solutions for medical devices. The article provides a detailed introduction to connected medical devices and its role in effective care delivery, an overview of network security types and PNM, an overview of the National Institute of Standards and Technology Cybersecurity Framework and its application for program assessment, essentials of project management for PNM solution selection and implementation, key performance indicators for measuring a solution’s ability to meet critical cybersecurity needs for medical devices, and lessons learned from the author’s professional experience, selective literature review, and leading practices. Rather than describing a complete list of guidelines for selecting PNM solutions, the current work is intended to provide guidance based on the author’s experience and leading practices compiled from successful medical device cybersecurity programs. © Copyright AAMI 2021.
引用
收藏
页码:121 / 130
页数:9
相关论文
共 50 条
  • [1] The role of healthcare technology management in facilitating medical device cybersecurity
    Busdicker M.
    Upendra P.
    Biomedical Instrumentation and Technology, 2017, 51 (Horizons): : 19 - 25
  • [2] Medical Device Safety Management Using Cybersecurity Risk Analysis
    Kim, Dong-Won
    Choi, Jin-Young
    Han, Keun-Hee
    IEEE ACCESS, 2020, 8 (08): : 115370 - 115382
  • [3] Mitigating Implanted Medical Device Cybersecurity Risks
    Easttom, Chuck
    Mei, Nagi
    2019 IEEE 10TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2019, : 145 - 148
  • [4] Stronger rules needed for medical device cybersecurity
    Owens, Brian
    LANCET, 2016, 387 (10026): : 1364 - 1364
  • [5] Controlling for Cybersecurity Risks of Medical Device Software
    Fu, Kevin
    Blum, James
    COMMUNICATIONS OF THE ACM, 2013, 56 (10) : 35 - 37
  • [6] Cybersecurity and the Medical Device Product Development Lifecycle
    Jones, Richard W.
    Katzis, Konstantinos
    INFORMATICS EMPOWERS HEALTHCARE TRANSFORMATION, 2017, 238 : 76 - 79
  • [7] Practical Model for Management, Monitoring and Research of Passive Optical Network
    Angelov, Krasen Kirov
    Sadinov, Stanimir Mihailov
    Kogias, Panagiotis Gregorios
    2017 XXVI INTERNATIONAL SCIENTIFIC CONFERENCE ELECTRONICS (ET), 2017,
  • [8] An Overview of Cybersecurity Regulations and Standards for Medical Device Software
    Lechner, Nadica Hrgarek
    CENTRAL EUROPEAN CONFERENCE ON INFORMATION AND INTELLIGENT SYSTEMS: PROCEEDINGS ARCHIVE 2017, 2017, : 237 - 249
  • [9] A Sandbox Test Environment for Medical Device System Cybersecurity
    Goldman, Julian M.
    Guffrey, David
    Jaffe, Michael B.
    Zhang, Yi
    Dumas, Barbara
    Arney, Dave
    ANESTHESIA AND ANALGESIA, 2020, 130
  • [10] ANDVI: Automated Network Device and Vulnerability Identification in SCADA/ICS by Passive Monitoring
    AL Ghazo, Alaa T.
    Kumar, Ratnesh
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2024, 54 (04): : 2539 - 2550