2020
DOI: 10.1016/j.acra.2020.03.026
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity Challenges for PACS and Medical Imaging

Abstract: Cybersecurity issues have been on the rise for years, increasingly affecting the healthcare sector. In 2019, several attacks have been published that specifically aim at medical network protocols and file formats, in particular digital imaging and communications in medicine. This article describes five attack scenarios on picture archiving and communications systems (PACS) and medical imaging networks: the import of patient data from storage media containing malware, a compromise of the hospital network, malwa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
18
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 28 publications
(19 citation statements)
references
References 9 publications
0
18
0
1
Order By: Relevance
“…Such threats, commonly categorised as “social engineering”, allow the attacker to exploit the large amount of public information hosted on social media platforms to gather the personal information of healthcare professionals [ 15 ]. Social engineering attacks are designed to circumvent traditional cybersecurity measures [ 18 ]. A well-known social engineering method is phishing.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Such threats, commonly categorised as “social engineering”, allow the attacker to exploit the large amount of public information hosted on social media platforms to gather the personal information of healthcare professionals [ 15 ]. Social engineering attacks are designed to circumvent traditional cybersecurity measures [ 18 ]. A well-known social engineering method is phishing.…”
Section: Resultsmentioning
confidence: 99%
“…A well-known social engineering method is phishing. The role and impact of phishing attacks have been well studied in the literature [ 8 , 9 , 10 , 13 , 15 , 16 , 17 , 18 , 41 , 43 , 55 , 56 ].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…It also enables the PACS to maintain an audit trail that documents which actions were performed by which user À information that will be important in the case of an unauthorized disclosure of patient data. The deployment of such an audit trail, based on the IHE integration profile "Audit Trail and Node Authentication" (ATNA, see Section Product Support), is one of the apparent omissions in (1).…”
Section: Access Rightsmentioning
confidence: 99%
“…In the recent years, there has been dramatic increase in cybersecurity incidents in the healthcare sector, such as computer virus infections, ransomware, and the theft and publication of patient data. We have recently analyzed specific cybersecurity challenges affecting medical imaging and PACS networks (1), and also proposed a specific list of security measures. A synopsis of these security measures is shown in Table 1.…”
mentioning
confidence: 99%