Suppr超能文献

医疗设备中的网络安全漏洞:一个复杂的环境和多方面的问题。

Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem.

作者信息

Williams Patricia Ah, Woodward Andrew J

机构信息

eHealth Research Group and Security Research Institute, Edith Cowan University, Perth, WA, Australia.

出版信息

Med Devices (Auckl). 2015 Jul 20;8:305-16. doi: 10.2147/MDER.S50048. eCollection 2015.

Abstract

The increased connectivity to existing computer networks has exposed medical devices to cybersecurity vulnerabilities from which they were previously shielded. For the prevention of cybersecurity incidents, it is important to recognize the complexity of the operational environment as well as to catalog the technical vulnerabilities. Cybersecurity protection is not just a technical issue; it is a richer and more intricate problem to solve. A review of the factors that contribute to such a potentially insecure environment, together with the identification of the vulnerabilities, is important for understanding why these vulnerabilities persist and what the solution space should look like. This multifaceted problem must be viewed from a systemic perspective if adequate protection is to be put in place and patient safety concerns addressed. This requires technical controls, governance, resilience measures, consolidated reporting, context expertise, regulation, and standards. It is evident that a coordinated, proactive approach to address this complex challenge is essential. In the interim, patient safety is under threat.

摘要

与现有计算机网络连接的增加,使医疗设备面临以前未曾遇到过的网络安全漏洞。为预防网络安全事件,认识运营环境的复杂性并梳理技术漏洞很重要。网络安全保护不仅仅是一个技术问题;它是一个更丰富、更复杂的待解决问题。审视导致这种潜在不安全环境的因素,并识别漏洞,对于理解这些漏洞为何持续存在以及解决方案应是什么样至关重要。如果要提供充分保护并解决患者安全问题,就必须从系统角度看待这个多方面的问题。这需要技术控制、治理、恢复措施、综合报告、背景专业知识、监管和标准。显然,采取协调一致的积极方法应对这一复杂挑战至关重要。在此期间,患者安全受到威胁。

相似文献

1
Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem.
Med Devices (Auckl). 2015 Jul 20;8:305-16. doi: 10.2147/MDER.S50048. eCollection 2015.
2
Cybersecurity in healthcare: A narrative review of trends, threats and ways forward.
Maturitas. 2018 Jul;113:48-52. doi: 10.1016/j.maturitas.2018.04.008. Epub 2018 Apr 22.
3
Are implanted electronic devices hackable?
Trends Cardiovasc Med. 2019 Nov;29(8):476-480. doi: 10.1016/j.tcm.2018.11.011. Epub 2018 Nov 22.
5
Cybersecurity in Hospitals: A Systematic, Organizational Perspective.
J Med Internet Res. 2018 May 28;20(5):e10059. doi: 10.2196/10059.
7
Smart Airport Cybersecurity: Threat Mitigation and Cyber Resilience Controls.
Sensors (Basel). 2018 Dec 21;19(1):19. doi: 10.3390/s19010019.
8
Cybersecurity in radiology: Cautionary Tales, Proactive Prevention, and What to do When You Get Hacked.
Curr Probl Diagn Radiol. 2025 Mar-Apr;54(2):245-250. doi: 10.1067/j.cpradiol.2024.07.010. Epub 2024 Jul 9.
9
Assessing Cyberbiosecurity Vulnerabilities and Infrastructure Resilience.
Front Bioeng Biotechnol. 2019 Mar 29;7:61. doi: 10.3389/fbioe.2019.00061. eCollection 2019.
10

引用本文的文献

1
Digital health technologies for improving the management of people with chronic obstructive pulmonary disease.
Front Digit Health. 2025 Aug 6;7:1640585. doi: 10.3389/fdgth.2025.1640585. eCollection 2025.
3
Design and implementation of mHealth applications for older people with cancer: A scoping review.
Asia Pac J Oncol Nurs. 2025 May 17;12:100726. doi: 10.1016/j.apjon.2025.100726. eCollection 2025 Dec.
6
GPT, ontology, and CAABAC: A tripartite personalized access control model anchored by compliance, context and attribute.
PLoS One. 2025 Jan 6;20(1):e0310553. doi: 10.1371/journal.pone.0310553. eCollection 2025.
7
Improving safety claims in digital health interventions using the digital health assessment method.
Digit Health. 2024 Jul 25;10:20552076241258756. doi: 10.1177/20552076241258756. eCollection 2024 Jan-Dec.
9
An Infrastructure Framework for Remote Patient Monitoring Interventions and Research.
J Med Internet Res. 2024 May 30;26:e51234. doi: 10.2196/51234.
10
Simulation-based research for digital health pathologies: A multi-site mixed-methods study.
Digit Health. 2024 May 17;10:20552076241247939. doi: 10.1177/20552076241247939. eCollection 2024 Jan-Dec.

本文引用的文献

1
Security and privacy qualities of medical devices: an analysis of FDA postmarket surveillance.
PLoS One. 2012;7(7):e40200. doi: 10.1371/journal.pone.0040200. Epub 2012 Jul 19.
2
Regulation of medical devices in the United States and European Union.
N Engl J Med. 2012 Mar 1;366(9):848-55. doi: 10.1056/NEJMhle1113918. Epub 2012 Feb 14.
3
Medical devices--balancing regulation and innovation.
N Engl J Med. 2011 Sep 15;365(11):975-7. doi: 10.1056/NEJMp1109094. Epub 2011 Aug 10.
4
Improving the security and privacy of implantable medical devices.
N Engl J Med. 2010 Apr 1;362(13):1164-6. doi: 10.1056/NEJMp1000745.
5
When trust defies common security sense.
Health Informatics J. 2008 Sep;14(3):211-21. doi: 10.1177/1081180X08092831.

文献AI研究员

20分钟写一篇综述,助力文献阅读效率提升50倍。

立即体验

用中文搜PubMed

大模型驱动的PubMed中文搜索引擎

马上搜索

文档翻译

学术文献翻译模型,支持多种主流文档格式。

立即体验