A Method of Assessing Data Quality in Publicly Available Cybersecurity Data Sources for Use in Medical Device Cybersecurity Risk Management

被引:0
作者
Curran, Barry [1 ]
Egan, James [1 ]
机构
[1] South East Technol Univ, Dept Comp, Carlow, Ireland
来源
2023 CYBER RESEARCH CONFERENCE-IRELAND, CYBER-RCI 2023 | 2023年
关键词
medical devices; healthcare; 4.0; cybersecurity; patient safety; harm; risk; quantitative; data quality;
D O I
10.1109/Cyber-RCI59474.2023.10671424
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper addresses the growing risk of cybersecurity threats in the healthcare industry, fueled by Healthcare 4.0 and the proliferation of connected medical devices. Existing risk methodologies primarily focus on identifying risk after a product has been designed, which poses challenges for implementing security by design early in the development lifecycle. Inadequate security measures in medical devices not only pose a risk of patient data exposure but also the potential for patient harm, including serious injury or death. The healthcare industry faces resource and expertise challenges in executing risk analysis early and ensuring that product security protects patient safety. To address these issues, this paper has sought the opinions of industry professionals to find out what are the main issues that were affecting the development of early product risk assessments and proposes a Risk Intelligence Framework that utilizes publicly available data sources to support the assessment.
引用
收藏
页数:9
相关论文
共 67 条
[31]  
Eckhart Matthias, 2019, J. Internet Serv. Inf. Secur. (JISIS), V9, P52
[32]  
European Union Agency for Cybersecurity, 2022, ENISA Threat Landscape 2022: July 2021 to July 2022, DOI DOI 10.2824/764318
[33]  
FBI, 2022, 2022 Internet Crime Report, P2023
[34]   An information systems security risk assessment model under uncertain environment [J].
Feng, Nan ;
Li, Minqiang .
APPLIED SOFT COMPUTING, 2011, 11 (07) :4332-4340
[35]   A Security Argument Pattern for Medical Device Assurance Cases [J].
Finnegan, Anita ;
McCaffery, Fergal .
2014 IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW), 2014, :220-225
[36]  
Gov.uk, 2022, The cyber security breaches survey 2022
[37]  
IBM, 2022, Cost of a data breach report
[38]   Multidisciplinary management of an external cervical resorption and cemental tear [J].
Iqbal Nathani, Tousif ;
Angel Carreno, Miguel ;
Cabezas Morente, Manuel ;
Nart, Jose ;
Duran-Sindreu Terol, Fernando Salvador ;
Abella Sans, Francesc .
GIORNALE ITALIANO DI ENDODONZIA, 2021, 35 (01) :10-15
[39]  
Jagannathan S, 2015, 2015 IEEE SYMPOSIUM ON PRODUCT COMPLIANCE ENGINEERING (ISPCE 2015)
[40]  
Ji X, 2016, 2016 17TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), P693, DOI 10.1109/SNPD.2016.7515980