2021
DOI: 10.1016/j.acra.2020.09.001
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity Protection for PACS and Medical Imaging: Deployment Considerations and Practical Problems

Abstract: Cybersecurity is increasingly affecting the healthcare sector. In a recent article, the authors analyzed specific attacks against picture archiving and communications systems (PACS) and medical imaging networks and proposed security measures. This article discusses issues that require consideration when deploying these proposed measures and provides recommendations on how to implement them. Hospitals should deploy virus scanners on systems where permitted, with high priority on devices that are part of the cen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2025
2025

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 11 publications
0
7
0
Order By: Relevance
“…To this day ransomware has been affecting considerably in the health sector, these cybercriminals block the communication of medical devices that are being used, and these medical equipment are the ones with more vulnerability to attacks despite their importance to save lives [22], [33]- [35], have also led to the interruption of different scenarios such as the radiotherapies of thousands of patients, mostly on the impact of COVID-19 [36]- [38]. Similarly, the authors mention that there are numerous security concerns, such as denial of service, spoofing, and remote hijacking, these cyber-attacks are associated with internet connectivity in medical things, and such devices mostly have security and privacy issues as they have very limited computing power [39], [40].…”
Section: What Are the Most Frequent Cyberattacks In The Healthcare Se...mentioning
confidence: 99%
“…To this day ransomware has been affecting considerably in the health sector, these cybercriminals block the communication of medical devices that are being used, and these medical equipment are the ones with more vulnerability to attacks despite their importance to save lives [22], [33]- [35], have also led to the interruption of different scenarios such as the radiotherapies of thousands of patients, mostly on the impact of COVID-19 [36]- [38]. Similarly, the authors mention that there are numerous security concerns, such as denial of service, spoofing, and remote hijacking, these cyber-attacks are associated with internet connectivity in medical things, and such devices mostly have security and privacy issues as they have very limited computing power [39], [40].…”
Section: What Are the Most Frequent Cyberattacks In The Healthcare Se...mentioning
confidence: 99%
“…\end{equation*}$$ Scenario II . The second scenario is a hospital with high cyber protection by keeping devices updated with the most recent patches, using authentication credentials, removing default passwords, and implementing any other cybersecurity protection methods (Eichelberg et al., 2021). Multiple settings for the low probability of edge contagion are characterized by pi=qi$p_{i}=q_{i}$ for each component in the following pIMW=qIMW=0.10,pDW=qDW=0.15,pPM=qPM=0.20,pIP=qIP=0.25$$\begin{align*} &p_{IMW} = q_{IMW} = 0.10, &&p_{DW} = q_{DW} = 0.15, \\ &p_{PM} = q_{PM} = 0.20, &&p_{IP} = q_{IP} = 0.25 \end{align*}$$and varying values for the edges between the PACS and HIS system by having pPACSbadbreak=qPACS{0.40,0.35,0.30,0.25,0.20,0.15}$$\begin{equation*} p_{PACS} = q_{PACS} \in \lbrace 0.40, 0.35, 0.30, 0.25, 0.20, 0.15\rbrace \end{equation*}$$and between the HIS system and CNS by letting pCNSbadbreak=qCNS{0.35,0.30,0.25,0.20,0.15,0.10}.$$\begin{equation*} p_{CNS} = q_{CNS} \in \lbrace 0.35, 0.30, 0.25, 0.20, 0.15, 0.10 \rbrace .…”
Section: Numerical Implicationsmentioning
confidence: 99%
“…The second scenario is a hospital with high cyber protection by keeping devices updated with the most recent patches, using authentication credentials, removing default passwords, and implementing any other cybersecurity protection methods (Eichelberg et al, 2021). Multiple settings for the low probability of edge contagion are characterized by p i = q i for each component in the following p IMW = q IMW = 0.10, p DW = q DW = 0.15, p PM = q PM = 0.20, p IP = q IP = 0.25 and varying values for the edges between the PACS and HIS system by having p PACS = q PACS ∈ {0.40, 0.35, 0.30, 0.25, 0.20, 0.15} and between the HIS system and CNS by letting p CNS = q CNS ∈ {0.35, 0.30, 0.25, 0.20, 0.15, 0.10}.…”
Section: Scenario IImentioning
confidence: 99%
See 1 more Smart Citation
“…Our staff who were affected by fraudulent activity appreciated the timely notification, free credit check opportunities, names of contacts in our HR Department, resources for state and police reporting, for credit company notifications and freezes, and for bank notifications. If processes were not already in place to protect your data and that of your patients, these must be prioritized as widespread use of remote clinical, education and communication systems will subject you to cyberattacks (18). There have been a number of recent high profile, high impact attacks on University of California San Francisco (UCSF), Washington DC and U Vermont.…”
Section: Utilize Available Legal and Human Resource Staffmentioning
confidence: 99%