2020
DOI: 10.1007/s10278-020-00393-3
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity in PACS and Medical Imaging: an Overview

Abstract: This article provides an overview on the literature published on the topic of cybersecurity for PACS (Picture Archiving and Communications Systems) and medical imaging. From a practical perspective, PACS specific security measures must be implemented together with the measures applicable to the IT infrastructure as a whole, in order to prevent incidents such as PACS systems exposed to access from the Internet. Therefore, the article first offers an overview of the physical, technical and organizational mitigat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(20 citation statements)
references
References 37 publications
0
18
0
2
Order By: Relevance
“…By analyzing its database, the related characteristics of products can be understood, so as to provide decision support and enhance the competitive advantage of enterprises. A successful case is the classic "beer and diaper" example [17]. With a large number of scholars studying the scope of data mining applications, the application of data mining technology has become more extensive.…”
Section: Data Mining Overviewmentioning
confidence: 99%
“…By analyzing its database, the related characteristics of products can be understood, so as to provide decision support and enhance the competitive advantage of enterprises. A successful case is the classic "beer and diaper" example [17]. With a large number of scholars studying the scope of data mining applications, the application of data mining technology has become more extensive.…”
Section: Data Mining Overviewmentioning
confidence: 99%
“…Most of the 35 articles selected mentioned training as a key to better cyber practices ( 5 , 12 , 13 , 19 , 25 , 27 , 32 , 35 , 52 ). Training staff in cybersecurity principles has been shown to reduce the number of attacks ( 115 ).…”
Section: Discussionmentioning
confidence: 99%
“…The 13 other articles were used to incorporate trends around the world. These international articles were from the UK ( 9 , 11 15 ), Canada ( 16 ), Scandinavia ( 17 ), Europe ( 5 , 18 , 19 ), Middle East ( 20 ), and Asia ( 13 , 15 , 20 , 21 ). Except for Middle East, all these countries scored “high” on the Readiness for Frontier Technologies Index of the United Nations Conference on Trade and Development's 2021 Technology and Innovation Report ( 22 ).…”
Section: Methodsmentioning
confidence: 99%
“…The universality poses new challenges for personal privacy. With information leakage accidents emerging, it is urgent to protect important information in digital images 2 , 3 . Although the traditional cryptography, watermarking, and steganography techniques can protect sensitive information by encryption 4 , 5 , the encryption and decryption processes are computationally intensive and require a lot of effort to the keys in these schemes.…”
Section: Introductionmentioning
confidence: 99%