Selecting a Passive Network Monitoring Solution for Medical Device Cybersecurity Management

被引:1
|
作者
Upendra P. [1 ]
机构
[1] Sunnyvale, CA
来源
关键词
D O I
10.2345/0890-8205-55.4.121
中图分类号
学科分类号
摘要
The number of cyberattacks and information system breaches in healthcare have grown exponentially, as well as escalated from accidental incidents to targeted and malicious attacks. With medical devices representing a substantial repository of all the assets in a healthcare system, network security and monitoring are critical to ensuring cyber hygiene of these medical devices. Because of the unique challenges of connected medical devices, a passive network monitoring (PNM) solution is preferred for its overall cybersecurity management. This article is intended to provide guidance on selecting PNM solutions while reinforcing the importance of program assessment, project management, and use of leading practices that facilitate the selection and further implementation of PNM solutions for medical devices. The article provides a detailed introduction to connected medical devices and its role in effective care delivery, an overview of network security types and PNM, an overview of the National Institute of Standards and Technology Cybersecurity Framework and its application for program assessment, essentials of project management for PNM solution selection and implementation, key performance indicators for measuring a solution’s ability to meet critical cybersecurity needs for medical devices, and lessons learned from the author’s professional experience, selective literature review, and leading practices. Rather than describing a complete list of guidelines for selecting PNM solutions, the current work is intended to provide guidance based on the author’s experience and leading practices compiled from successful medical device cybersecurity programs. © Copyright AAMI 2021.
引用
收藏
页码:121 / 130
页数:9
相关论文
共 50 条
  • [21] Security monitoring as component of cybersecurity: Knowing what is happening in the network
    Heyde, Steffen
    BWK- Energie-Fachmagazin, 2021, 73 (9-10): : 18 - 20
  • [22] Self-Authentication in Medical Device Software An Approach To Include Cybersecurity In Legacy Medical Devices
    Jagannathan, Srinivasan
    Sorini, Adam
    2016 IEEE Symposium on Product Compliance Engineering (ISPCE), 2016,
  • [23] Monitoring, Management and Topological Display Device using wireless network managed clients
    Melo Torres, Oscar Javier
    Velandia, Julio Baron
    Daza Corredor, Alejandro Paolo
    TECCIENCIA, 2013, 8 (15) : 93 - 100
  • [24] Medical device morphs into multiple solution
    不详
    CONNECTOR SPECIFIER, 2007, 23 (05) : 1 - +
  • [25] Multilayering as a solution to medical device failure
    Mott, Renee
    Priefer, Ronny
    COLLOIDS AND SURFACES B-BIOINTERFACES, 2020, 193
  • [26] Passive Network State Monitoring for Dynamic Resource Management in Industry 4.0 Fog Architectures
    Orive, Adrian
    Agirre, Aitor
    Bilbao, Josu
    Marcos, Marga
    2018 IEEE 14TH INTERNATIONAL CONFERENCE ON AUTOMATION SCIENCE AND ENGINEERING (CASE), 2018, : 1414 - 1419
  • [27] Creating new-generation cybersecurity monitoring and management systems
    Kotenko, I. V.
    Saenko, I. B.
    HERALD OF THE RUSSIAN ACADEMY OF SCIENCES, 2014, 84 (06) : 424 - 431
  • [28] Creating new-generation cybersecurity monitoring and management systems
    Igor Vital’evich Kotenko
    Igor Borisovich Saenko
    Herald of the Russian Academy of Sciences, 2014, 84 : 424 - 431
  • [29] The implementation of Passive In-line Monitoring (PIM) device in tree-structured FTTH access network
    Ab-Rahman, Mohammad Syuhaimi
    Ng, Boonchuan
    Ismail, Rosmawati
    Ehsan, Abang Anuar
    Journal of Optical Communications, 2009, 30 (02) : 91 - 94
  • [30] Building and selecting mobile agents for network management
    Satoh, Ichiro
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2006, 14 (01) : 147 - 169