The Key Elements of a Risk-based Product Security Program for Medical Devices: A Scoping Study

被引:0
|
作者
Lechner, Nadica Hrgarek [1 ]
机构
[1] Univ Zagreb, Fac Org & Informat, Pavlinska 2, Varazhdin 42000, Croatia
关键词
cybersecurity; FDA; medical devices; medical device software; privacy; product security program; security; security risk management;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
One of the main challenges facing medical device manufacturers is to design and develop secure products and services that can successfully withstand evolving cybersecurity threats. Building security and privacy considerations into medical devices and managing privacy and security risks proactively throughout the entire product life cycle requires a structured and systematic approach. The purpose of this paper is to identify in the existing research literature the key elements which are needed to establish a risk-based product security program in order to protect connected medical devices, the healthcare systems, and end users who use them against cybersecurity threats. A scoping study of available IEEE Xplore database literature was used to identify the key elements which are listed in this paper.
引用
收藏
页码:257 / 264
页数:8
相关论文
共 50 条
  • [21] Key Considerations in the Transition to Risk-Based Monitoring
    Rosenberg, Michael J.
    THERAPEUTIC INNOVATION & REGULATORY SCIENCE, 2014, 48 (04) : 428 - 435
  • [22] Key Considerations in the Transition to Risk-Based Monitoring
    Michael J. Rosenberg
    Therapeutic Innovation & Regulatory Science, 2014, 48 : 428 - 435
  • [23] Study of Cybercrime and Security in Medical Devices
    Noimanee, S.
    Noimanee, K.
    Krisanachinda, S.
    Senavongse, W.
    2016 9TH BIOMEDICAL ENGINEERING INTERNATIONAL CONFERENCE (BMEICON), 2016,
  • [24] Moving from compliance-based security to a risk-based security model
    Comput. Fraud Secur., 2009, 9 (14-17):
  • [25] A risk-based maintenance approach for critical care medical devices: a case study application for a large hospital in a developing country
    Vala S.
    Chemweno P.
    Pintelon L.
    Muchiri P.
    International Journal of System Assurance Engineering and Management, 2018, 9 (5) : 1217 - 1233
  • [26] Risk and Argument: A Risk-Based Argumentation Method for Practical Security
    Franqueira, Virginia N. L.
    Thein Than Tun
    Yu, Yijun
    Wieringa, Roel
    Nuseibeh, Bashar
    2011 19TH IEEE INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2011, : 239 - 248
  • [27] FDA Seeks Risk-Based Inspection Program
    Wechsler, Jill
    Pharmaceutical Technology, 2003, 27 (11) : 26 - 35
  • [28] Power grid risk-based static security assessment considering corrective control strategy of FACTS devices
    Shi, Pengjia
    Wen, Yunfeng
    Guo, Chuangxin
    Yang, Xiuyu
    Tian, Qidong
    Dianwang Jishu/Power System Technology, 2015, 39 (09): : 2565 - 2570
  • [29] Risk-based security engineering through the eyes of the adversary
    Evans, S
    Wallner, J
    Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics Information Assurance Workshop, 2005, : 158 - 165
  • [30] Key Elements to Contextualize AI-Driven Condition Monitoring Systems towards Their Risk-Based Evaluation
    Dadfarnia, Mehdi
    Sharp, Michael
    2022 5TH INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE FOR INDUSTRIES, AI4I, 2022, : 38 - 41