Cybersecurity for Hospitals and Healthcare Facilities (eBook)
XXIII, 129 Seiten
Apress (Verlag)
978-1-4842-2155-6 (ISBN)
This book is a wake-up call explaining how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. The vulnerability of the medical equipment inside the hospital to cyber-attacks far eclipses the actual building equipment. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical grade network. A medical grade network controls the diagnostic, treatment and life support equipment on which lives depend.
Recent news reports how hackers struck hospitals with ransomware that prevented staff from accessing patient records or scheduling appointments. Unfortunately, medical equipment can also be hacked and shut down remotely as a form of extortion. Criminal hackers will not ask for a $500 payment to unlock an MRI, PET, CT Scan, or X-Ray machine-they will ask for much more.
Litigation is bound to follow and the resulting punitive awards will drive up hospital insurance costs and healthcare costs in general. This will undoubtedly result in increased regulations for hospitals and higher costs for compliance. Unless hospitals and other healthcare facilities take the steps necessary now to secure their medical grade networks, they will be targeted for cyber-physical attack, possibly with life-threatening consequences.Cybersecurity for Hospitals and Healthcare Facilities shows what hackers can do, why hackers would target a hospital, the way they research a target, ways they can gain access to a medical grade network (cyber-attack vectors), and ways they hope to monetize their cyber-attack. By understanding and detecting the threats, hospital administrators can take action now - before their hospital becomes the next victim.
What you'll learn
- How to determine how vulnerable hospital and healthcare building equipment is to cyber-physical attack.
- How to identify possible ways hackers can hack hospital and healthcare facility equipment.
- How to recognize the cyber-attack vectors-or paths by which a hacker or cracker can gain access to a computer, a medical grade network server or expensive medical equipment in order to deliver a payload or malicious outcome.
- How to detect and prevent man-in-the-middle or denial of service cyber-attacks.
- How to detect and prevent hacking of the hospital database and hospital web application.
Who This Book Is For
Hospital Administrators, Healthcare professionals, Hospital & Healthcare Facility Engineers and Building Managers, Hospital & Healthcare Facility IT professionals, and HIPAA professionals.
Luis Ayala is a Senior Technical Expert in the Department of Defense responsible for design, construction, and operation of Intelligence Community facilities worldwide. He is a licensed architect and holds a classified Master of Science in Technology Intelligence Degree from the National Intelligence University.
Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support equipment on which lives depend.News reports inform us how hackers strike hospitals with ransomware that prevents staff from accessing patient records or scheduling appointments. Unfortunately, medical equipment also can be hacked and shut down remotely as a form of extortion. Criminal hackers will not ask for a $500 payment to unlock an MRI, PET or CT scan, or X-ray machine-they will ask for much more.Litigation is bound to follow and the resulting punitive awards will drive up hospital insurance costs and healthcare costs in general. This will undoubtedly result in increased regulations for hospitals and higher costs for compliance. Unless hospitals and other healthcare facilities take the steps necessary to secure their medical-grade networks, they will be targeted for cyber-physical attack, possibly with life-threatening consequences.Cybersecurity for Hospitals and Healthcare Facilities is a wake-up call explaining what hackers can do, why hackers would target a hospital, the way hackers research a target, ways hackers can gain access to a medical-grade network (cyber-attack vectors), and ways hackers hope to monetize their cyber-attack. By understanding and detecting the threats, you can take action now-before your hospital becomes the next victim.What You Will Learn:Determine how vulnerable hospital and healthcare building equipment is to cyber-physical attackIdentify possible ways hackers can hack hospital and healthcare facility equipmentRecognize the cyber-attack vectors or paths by which a hacker or cracker can gain access to a computer, a medical-grade network server, or expensive medical equipment in order to deliver a payload or malicious outcomeDetect and prevent man-in-the-middle or denial-of-service cyber-attacksFind and prevent hacking of the hospital database and hospital web applicationWho This Book Is For:Hospital administrators, healthcare professionals, hospital & healthcare facility engineers and building managers, hospital & healthcare facility IT professionals, and HIPAA professionals
Luis Ayala is a Senior Technical Expert in the Department of Defense responsible for design, construction, and operation of Intelligence Community facilities worldwide. He is a licensed architect and holds a classified Master of Science in Technology Intelligence Degree from the National Intelligence University.
Chapter 1: Hacker Reconnaissance of a Hospital Network .- Chapter 2: How Hackers Gain Access to a Hospital Network .- Chapter 3: Active Medical Device Cyber-Attacks.- Chapter 4: Medical Facility Cyber-Physical Attacks.- Chapter 5: Hospital Insider Threat.- Chapter 6: Detection of Cyber-Attacks.- Chapter 7: Preventing Cyber-Attacks.- Chapter 8: Cyber-Attack Response and Recovery Planning.- Chapter 9: Appendix. Cyber-Attack Response Procedures Template.-
Erscheint lt. Verlag | 6.9.2016 |
---|---|
Zusatzinfo | XXIII, 129 p. 7 illus., 6 illus. in color. |
Verlagsort | Berkeley |
Sprache | englisch |
Themenwelt | Mathematik / Informatik ► Informatik ► Betriebssysteme / Server |
Informatik ► Netzwerke ► Sicherheit / Firewall | |
Schlagworte | Account Harvesting Attack • Building control • Cyber-Attack Vector • Cyber-Physical Attack • cybersecurity • denial of service • Healthcare informatics • Hospital Database • Hospital Informatics • Hospital Insider Threat • Hospital Network • Hospital Web Application • Industrial Control Systems • IOT • Medical Equipment Attack • Medical Equipment Cyber Attack • Network Mapping • SCADA systems |
ISBN-10 | 1-4842-2155-9 / 1484221559 |
ISBN-13 | 978-1-4842-2155-6 / 9781484221556 |
Haben Sie eine Frage zum Produkt? |
Größe: 8,3 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich