Identifying Opportunities to Compromise Medical Environments

2016 
The amalgamation of computerized equipment into medical arenas is creating environments that are conducive to security breaches. While previous medical device research has been conducted on medical training equipment, wearable and implantable devices, and on telesurgical systems, there has been minimal research investigating cyber-security vulnerabilities in real-world computer-facilitated surgical environments. The research contribution is an initial empirical analysis of the viability of security vulnerabilities in a computer-facilitated surgical environment. The preliminary results of this investigation generated information that can be used to develop Security Criteria for Integrated Medical Devices.
    • Correction
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    2
    Citations
    NaN
    KQI
    []