Many medical devices use wireless technology, yet they lack the necessary securi
ID: 3777559 • Letter: M
Question
Many medical devices use wireless technology, yet they lack the necessary security protections. At a recent security conference a security researcher, who was himself a diabetic, demonstrated a wireless attack on an insulin pump that could change the delivery of insulin to the patient. A security vendor found that they could scan a public space from up to 300 feet (91 meters) away, find vulnerable pumps made by a specific medical device manufacturer, and then force these devices to dispense fatal insulin doses. And another researcher “hacked” into a defibrillator used to stabilize a heartbeat and reprogrammed it. He also disabled its power-save mode so the battery ran down in hours instead of years. These attacks on wireless medical devices have prompted different areas of the federal government, such as the national Information Security and Privacy Advisory Board (ISPAB), the Food and Drug Administration (FDA), the National Institute of Standards and Technology (NIST), and Department of Homeland Security (DHS) to issue warnings.
Use the Internet to research the current state of these attacks and proposed defenses. Should the vendors who make these wireless medical devices be forced to add security features to their devices? What should be the penalty if they do not? And what should be the penalty for an attacker who manipulates a wireless medical device?
Explanation / Answer
The current state of these attacks varies in concept of how the device is reconfigured and assembled and the type of security assigned to protect the programming code of these devices.
The orthogonally of these security issues is more difficult while analyzing the cyber security issue when device failure is concerned.
Medical device flows the information in unidirectional form using internet of things so all the issue related to the IoT are now become the prime concern of wireless medical devices.
How it would be if we start making the schema of data transfer in wireless medical deviuce to be more secure by adding more authorizing steps in transferring the data.
We can also introduce block chaining in this to advance the security steps.
Yes the main point here is to enforce the manufacturing companies to go with the standards defined by the ISO in the same route to protect the life of many human beings.
Penalty should be according the cyber laws in any country because it would be taken as offended by some organizations to put the suggestions forward regarding this.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.