MedDevRisk: Risk Analysis Methodology for Networked Medical Devices

被引:0
作者
Seale, Katherine A. [1 ]
McDonald, J. Todd [1 ]
Glisson, Willam B. [1 ]
Pardue, J. Harold [1 ]
Jacobs, Michael B. [1 ]
机构
[1] Univ South Alabam, Mobile, AL 36688 USA
来源
PROCEEDINGS OF THE 51ST ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS) | 2018年
基金
美国国家科学基金会;
关键词
SAFETY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The prolific integration of technology into medical environments is continuously generating new attack vectors. This continuous amalgamation of technology into the medical field prompted the idea that risk assessment models can be utilized to identify cyber security vulnerabilities in medical settings. This research presents an initial investigation into the application of risk assessment frame works, i.e., STRIDE, Common Vulnerabilities and Exposures, and a Common Vulnerability Scoring System to identified networked medical devices that are currently employed in an operational medical simulation lab. The contribution of this research is twofold and culminates in a novel proof-of-concept system known as MedDevRisk. First, it demonstrates an approach to incorporating existing threat models into a relational database schema based on Threat-Vulnerability-Asset (TVA) relationships. Second, it provides an initial empirical analysis of the risk associated with networked medical devices along with providing the foundation for future research.
引用
收藏
页码:3271 / 3280
页数:10
相关论文
共 39 条
[1]   Analysis of Safety-Critical Computer Failures in Medical Devices [J].
Alemzadeh, Homa ;
Iyer, Ravishankar K. ;
Kalbarczyk, Zbigniew ;
Raman, Jai .
IEEE SECURITY & PRIVACY, 2013, 11 (04) :14-26
[2]  
[Anonymous], 2016, Sql injection
[3]  
[Anonymous], 2015, HAW INT C SYST SCI H
[4]  
[Anonymous], 2013, HAW INT C SYST SCI H
[5]  
[Anonymous], 2002, Applied Social Research Methods Series
[6]  
[Anonymous], 2005, The STRIDE Threat Model'
[7]  
Aroms E., 2012, RISK MANAGEMENT GUID
[8]  
Brown A., 2007, CLIN RISK, V13, P56
[9]  
Cerkovnik J., 2015, THESIS
[10]   Beyond good practice: why HIPAA only addresses part of the data security problem [J].
Collmann, J ;
Lambert, D ;
Brummett, M ;
DeFord, D ;
Coleman, J ;
Cooper, T ;
McCall, K ;
Seymour, D ;
Alberts, C ;
Dorofee, A .
CARS 2004: COMPUTER ASSISTED RADIOLOGY AND SURGERY, PROCEEDINGS, 2004, 1268 :113-118