Selecting a Passive Network Monitoring Solution for Medical Device Cybersecurity Management

被引:1
|
作者
Upendra P. [1 ]
机构
[1] Sunnyvale, CA
来源
关键词
D O I
10.2345/0890-8205-55.4.121
中图分类号
学科分类号
摘要
The number of cyberattacks and information system breaches in healthcare have grown exponentially, as well as escalated from accidental incidents to targeted and malicious attacks. With medical devices representing a substantial repository of all the assets in a healthcare system, network security and monitoring are critical to ensuring cyber hygiene of these medical devices. Because of the unique challenges of connected medical devices, a passive network monitoring (PNM) solution is preferred for its overall cybersecurity management. This article is intended to provide guidance on selecting PNM solutions while reinforcing the importance of program assessment, project management, and use of leading practices that facilitate the selection and further implementation of PNM solutions for medical devices. The article provides a detailed introduction to connected medical devices and its role in effective care delivery, an overview of network security types and PNM, an overview of the National Institute of Standards and Technology Cybersecurity Framework and its application for program assessment, essentials of project management for PNM solution selection and implementation, key performance indicators for measuring a solution’s ability to meet critical cybersecurity needs for medical devices, and lessons learned from the author’s professional experience, selective literature review, and leading practices. Rather than describing a complete list of guidelines for selecting PNM solutions, the current work is intended to provide guidance based on the author’s experience and leading practices compiled from successful medical device cybersecurity programs. © Copyright AAMI 2021.
引用
收藏
页码:121 / 130
页数:9
相关论文
共 50 条
  • [31] Building and selecting mobile agents for network management
    Satoh, Ichiro
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2006, 14 (01) : 147 - 169
  • [32] IoT Device Identification and Cybersecurity: Advancements, Challenges, and an LSTM-MLP Solution
    Alshaya, Shaya A.
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2023, 13 (06) : 11992 - 12000
  • [33] Network Management and Monitoring
    Maag, Stephane
    INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2015, 5 (02) : 63 - 64
  • [34] High-layer protocol and service management based on passive network traffic monitoring: the trace management platform
    Gaspary, L
    Meneghetti, E
    Wendt, F
    Braga, L
    Storch, R
    Tarouco, L
    ISCC 2002: SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2002, : 601 - 608
  • [35] Portable Network Monitoring System for Passive Optical Network (PON)
    Ng, Boonchuan
    Ab-Rahman, Mohammad Syuhaimi
    Premadi, Aswir
    Jumari, Kasmiran
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT, VOL 2, 2009, : 176 - 180
  • [36] Measuring and Mitigating the Costs of Attentional Switches in Active Network Monitoring for Cybersecurity
    Kortschot, Sean W.
    Sovilj, Dusan
    Jamieson, Greg A.
    Sanner, Scott
    Carrasco, Chelsea
    Soh, Harold
    HUMAN FACTORS, 2018, 60 (07) : 962 - 977
  • [37] Privacy-Aware Passive Network Monitoring
    Gogoulos, Fotios
    Antonakopoulou, Anna
    Mousas, Aziz S.
    Lioudakis, Georgios V.
    Kaklamani, Dimitra I.
    Venieris, Iakovos S.
    13TH PANHELLENIC CONFERENCE ON INFORMATICS, PROCEEDINGS, 2009, : 171 - 175
  • [38] Device-Centric Monitoring for Mobile Device Management
    Chircop, Luke
    Colombo, Christian
    Pace, Gordon J.
    ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2016, (205): : 31 - 44
  • [39] Passive Optical Network Monitoring: Challenges and Requirements
    Rad, Mohammad M.
    Fouli, Kerim
    Fathallah, Habib A.
    Rusch, Leslie A.
    Maier, Martin
    IEEE COMMUNICATIONS MAGAZINE, 2011, 49 (02) : S45 - S52
  • [40] Passive testing and applications to network management
    Lee, D
    Netravali, AN
    Sabnani, KK
    Sugla, B
    John, A
    1997 INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS - PROCEEDINGS, 1997, : 113 - 122