DICOM Images Have Been Hacked! Now What?

被引:35
作者
Desjardins, Benoit [1 ]
Mirsky, Yisroel [2 ,3 ]
Ortiz, Markel Picado [4 ]
Glozman, Zeev [5 ]
Tarbox, Lawrence [6 ]
Horn, Robert [7 ]
Horii, Steven C. [1 ]
机构
[1] Univ Penn, Dept Radiol, 3400 Spruce St, Philadelphia, PA 19104 USA
[2] Ben Gurion Univ Negev, Dept Software & Informat Syst Engn, Beer Sheva, Israel
[3] Georgia Inst Technol, Inst Informat Secur & Privacy, Atlanta, GA 30332 USA
[4] Cylera, Cybersecur Labs, New York, NY USA
[5] Brainlab AG, Munich, Germany
[6] Univ Arkansas Med Sci, Dept Biomed Informat, Little Rock, AR 72205 USA
[7] Fairhaven Technol, Maynard, MA USA
关键词
confidentiality; DICOM; encryption; integrity; mitigation; security; vulnerabilities; RADIOLOGY;
D O I
10.2214/AJR.19.21958
中图分类号
R8 [特种医学]; R445 [影像诊断学];
学科分类号
1002 ; 100207 ; 1009 ;
摘要
OBJECTIVE. As health care moves into a new era of increasing information vulnerability, radiologists should understand that they may be using systems that are exposed to altered data or data that contain malicious elements. This article explains the vulnerabilities of DICOM images and discusses requirements to properly secure these images from cyberattacks. CONCLUSION. There is an important need to properly secure DICOM images from attacks and tampering. The solutions described in this article will go a long way to achieving this goal.
引用
收藏
页码:727 / 735
页数:9
相关论文
共 23 条
[1]  
[Anonymous], 2019, NY TIMES
[2]  
[Anonymous], 1996, HDB APPL CRYPTOGRAPH
[3]  
Beek C., MCAFEE RES FIND POOR
[4]   Understanding and using DICOM, the data interchange standard for biomedical imaging [J].
Bidgood, WD ;
Horii, SC ;
Prior, FW ;
VanSyckle, DE .
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 1997, 4 (03) :199-212
[5]  
Clunie David A, 2019, J Pathol Inform, V10, P12, DOI 10.4103/jpi.jpi_93_18
[6]   Cybersecurity in healthcare: A narrative review of trends, threats and ways forward [J].
Coventry, Lynne ;
Branley, Dawn .
MATURITAS, 2018, 113 :48-52
[7]  
Dierks T., 2008, The Transport Layer Security (TLS) Protocol V 1.2
[8]  
Greenberg Andy, Wired
[9]  
Health Care Industry Cybersecurity Task Force, REP IMPR CYB HLTH CA
[10]  
Mirsky Y, CT GAN MALICIOUS TAM