2018
DOI: 10.6028/nist.sp.1800-8
|View full text |Cite
|
Sign up to set email alerts
|

Securing Wireless Infusion Pumps In Healthcare Delivery Organizations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 0 publications
0
9
0
Order By: Relevance
“…The current TOF-Cuff architecture considered in this paper includes an Ethernet output, but an optional Wi-Fi output should be available for the new device. In this case some guidance for securing wireless medical devices, such as [24], should be considered. • The clear diagrams with stakeholder viewpoints are very helpful for the understanding of all stakeholders.…”
Section: Discussion and Learned Lessonsmentioning
confidence: 99%
“…The current TOF-Cuff architecture considered in this paper includes an Ethernet output, but an optional Wi-Fi output should be available for the new device. In this case some guidance for securing wireless medical devices, such as [24], should be considered. • The clear diagrams with stakeholder viewpoints are very helpful for the understanding of all stakeholders.…”
Section: Discussion and Learned Lessonsmentioning
confidence: 99%
“…Medical devices, such as IPs, may not allow for the addition of third‐party software, such as antivirus or antimalware programs, because the protection could negatively impact the medical device's ability to operate effectively (O'Brien et al., 2018). Because of this, it is imperative that hospitals apply the medical device's patching and updates from the manufacturer as soon as possible (Forescout Research Labs, 2020; O'Brien et al., 2018) since a compromised medical device may lead to more severe risks (Somasundaram & Thirugnanam, 2021) and thus higher losses. Therefore, the vulnerabilities of interconnected medical devices in a hospital network pose serious cyber risks.…”
Section: Medical Devices Of a Hospital Their Connections And Cybersec...mentioning
confidence: 99%
“…Typically, once a contagion infects one component of the network, the other connected components may be compromised (Kunreuther & Heal, 2003). And so, the integration of new endpoint devices such as medical components with outdated, legacy, or unsupported operating systems increases the cyber risk of healthcare networks (Coventry & Branley, 2018; He et al., 2021; Kruse et al., 2017; O'Brien et al., 2018). To account for this, we investigate how a compromised medical component due to low cybersecurity protection can jeopardize the overall cybersecurity profile of the hospital.…”
Section: Numerical Implicationsmentioning
confidence: 99%
“…The National Institute of Standards and Technology (NIST) has release documentation designed to assist medical providers with securing their devices on an enterprise level network. SP 1800-8 focuses on wireless infusion pumps and lists the multiple security guidelines designed to help secure these devices [50]. While written specifically for wireless infusion pumps, the guidelines are applicable throughout the entire medical implant device ecosystem.…”
Section: Known Cybersecurity Vulnerabilities Acknowledged By the Governing Authoritymentioning
confidence: 99%