The Key Elements of a Risk-based Product Security Program for Medical Devices: A Scoping Study

被引:0
|
作者
Lechner, Nadica Hrgarek [1 ]
机构
[1] Univ Zagreb, Fac Org & Informat, Pavlinska 2, Varazhdin 42000, Croatia
关键词
cybersecurity; FDA; medical devices; medical device software; privacy; product security program; security; security risk management;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
One of the main challenges facing medical device manufacturers is to design and develop secure products and services that can successfully withstand evolving cybersecurity threats. Building security and privacy considerations into medical devices and managing privacy and security risks proactively throughout the entire product life cycle requires a structured and systematic approach. The purpose of this paper is to identify in the existing research literature the key elements which are needed to establish a risk-based product security program in order to protect connected medical devices, the healthcare systems, and end users who use them against cybersecurity threats. A scoping study of available IEEE Xplore database literature was used to identify the key elements which are listed in this paper.
引用
收藏
页码:257 / 264
页数:8
相关论文
共 50 条
  • [41] Risk-based decisions: Implementing the asset integrity program
    Henao, Felipe A.
    PROCESS SAFETY PROGRESS, 2021, 40 : S24 - S31
  • [42] Establishing a Risk-Based Tomotherapy MLC QA Program
    Chen, Q.
    MEDICAL PHYSICS, 2017, 44 (06) : 3060 - 3061
  • [43] Risk-based systems security engineering: Stopping attacks with intention
    Evans, S
    Heinbuch, D
    Kyle, E
    Piorkowski, J
    Wallner, J
    IEEE SECURITY & PRIVACY, 2004, 2 (06) : 59 - 62
  • [44] Automated analysis of security requirements through risk-based argumentation
    Yu, Yijun
    Franqueira, Virginia N. L.
    Tun, Thein Than
    Wieringa, Roel J.
    Nuseibeh, Bashar
    JOURNAL OF SYSTEMS AND SOFTWARE, 2015, 106 : 102 - 116
  • [45] IT Security: Risk-Based Prediction Tool and Method for Critical Infrastructures
    Aubert, Jocelyn
    Incoul, Christophe
    Khadraoui, Djamel
    ERCIM NEWS, 2010, (81): : 50 - 51
  • [46] Risk-based constraint relaxation for security constrained economic dispatch
    Guo, Xian
    McCalley, James
    2015 NORTH AMERICAN POWER SYMPOSIUM (NAPS), 2015,
  • [47] Perceptions and Affective Responses to Alternative Risk-Based Airport Security
    Nguyen, Kenneth D.
    John, Richard S.
    ADVANCES IN HUMAN ASPECTS OF TRANSPORTATION, 2018, 597 : 27 - 37
  • [48] A review of risk-based security and its impact on TSA PreCheck
    Albert, Laura A.
    Nikolaev, Alexander
    Lee, Adrian J.
    Fletcher, Kenneth
    Jacobson, Sheldon H.
    IISE TRANSACTIONS, 2020, 53 (06) : 657 - 670
  • [49] Risk-based Security Assessment in Distribution Network with the Integration of Photovoltaic
    Sheng, Wanxing
    Liu, Keyan
    Cai, Yating
    Du, Songhuai
    2016 ASIA CONFERENCE ON POWER AND ELECTRICAL ENGINEERING (ACPEE 2016), 2016, 55
  • [50] Risk-Based Vulnerability Testing Using Security Test Patterns
    Botella, Julien
    Legeard, Bruno
    Peureux, Fabien
    Vernotte, Alexandre
    LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION AND VALIDATION: SPECIALIZED TECHNIQUES AND APPLICATIONS, PT II, 2014, 8803 : 337 - 352