Cargando…

Cybersecurity for hospitals and healthcare facilities : a guide to detection and prevention /

Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls th...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Ayala, Luis (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer Science+Business Media, [2016]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Mi 4500
001 OR_ocn960041280
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |||||||||||
008 160823t20162016nyua o 001 0 eng d
040 |a IDEBK  |b eng  |e rda  |e pn  |c IDEBK  |d COO  |d OCLCO  |d OCLCF  |d OCLCQ  |d YDX  |d N$T  |d EBLCP  |d GW5XE  |d BTCTA  |d UPM  |d IUL  |d QCL  |d VT2  |d IDB  |d UAB  |d UMI  |d IOG  |d K6U  |d MERUC  |d IAD  |d JBG  |d ICW  |d ILO  |d ICN  |d OCLCO  |d GZM  |d OCLCO  |d OCLCQ  |d OCLCO  |d ESU  |d OCLCQ  |d OCLCO  |d OCLCA  |d IDEBK  |d U3W  |d CEF  |d KSU  |d OCLCQ  |d OCLCO  |d DEBBG  |d AU@  |d OCLCO  |d OCLCQ  |d OCLCA  |d UKMGB  |d OCLCO  |d OCLCA  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCA  |d OCLCQ  |d OCLCO  |d OCLCQ 
015 |a GBB8M4432  |2 bnb 
016 7 |a 019139915  |2 Uk 
019 |a 958077860  |a 958354057  |a 958413255  |a 961851678  |a 962008435  |a 962434963  |a 962691106  |a 963359910  |a 967615620  |a 971245720  |a 985033513 
020 |a 1484221559  |q (ebk) 
020 |a 9781484221556 
020 |a 9781484221549 
020 |a 1484221540 
020 |z 1484221540 
024 7 |a 10.1007/978-1-4842-2155-6  |2 doi 
029 1 |a AU@  |b 000058837926 
029 1 |a AU@  |b 000059451861 
029 1 |a CHNEW  |b 000885980 
029 1 |a CHVBK  |b 374446806 
029 1 |a GBVCP  |b 897166159 
029 1 |a UKMGB  |b 019139915 
035 |a (OCoLC)960041280  |z (OCoLC)958077860  |z (OCoLC)958354057  |z (OCoLC)958413255  |z (OCoLC)961851678  |z (OCoLC)962008435  |z (OCoLC)962434963  |z (OCoLC)962691106  |z (OCoLC)963359910  |z (OCoLC)967615620  |z (OCoLC)971245720  |z (OCoLC)985033513 
037 |a 953950  |b MIL 
050 4 |a QA76.9.A25 
060 4 |a W 26.5 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 004  |2 23 
049 |a UAMI 
100 1 |a Ayala, Luis,  |e author. 
245 1 0 |a Cybersecurity for hospitals and healthcare facilities :  |b a guide to detection and prevention /  |c Luis Ayala. 
264 1 |a New York, NY :  |b Springer Science+Business Media,  |c [2016] 
264 4 |c ©2016 
300 |a 1 online resource (147 pages) :  |b illustrations (some color) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a At a Glance; Contents; About the Author; About the Technical Reviewer; Preface; Introduction; Chapter 1: Hacker Reconnaissance of a Hospital Network; Footprinting; Scanning; Enumeration; Network Mapping; Cyber-Threat Actors; Chapter 2: How Hackers Gain Access to a Healthcare Facility or Hospital Network; Phishing Attack; Email Phishing Attack; Man-in-The-Middle Attacks; Pharming Attack; Indirect Cyber-Attack; Scareware; Ransomware; USB Stick; Auto-Hacking Attack; Backdoors; Ad Hoc Network; Unpatched Vulnerabilities; Appliance Hacks; Password Cracker; Denial-of-Service Attack. 
505 8 |a Black Hole AttackSecondary Entry Points; Modems; Rogue Access Points; Chapter 3: Active Medical Device Cyber-Attacks; Magnetic Resonance Imaging (MRI); X-ray Generator (X-ray); Infusion Pump; Positron Emission Tomography (PET) Scanner; X-ray Computed Tomography (CT) Scanner; Defibrillators; Medical Ventilator; Anesthetic Machine; Heart-Lung Machine; Extracorporeal Membrane Oxygenation (ECMO); Dialysis Machine; Medical Lasers; Robotic Surgical Machine; Medical Device Data Systems (MDDS); Active Patient Monitoring Devices; Interoperable Medical Devices; Medical Image Storage Devices. 
505 8 |a Medical Image Communications DevicesMedical Laboratory; Electronic Health Records (EHR); Barcode Scanning Systems; Chapter 4: Medical Facility Cyber-Physical Attacks; Building Controls System; Facility Equipment Controlled by the BCS; BCS Network Vulnerabilities; Preventing Hospital Building Equipment Damage; Facility Equipment Cyber-Physical Attacks; Steam Boilers; Boiler Sequence Controller Hack; Hot Water Heater Explosion; Chillers; Cooling Tower; Backup Generator; Chapter 5: Hospital Insider Threat; Types of Insider Threats; Types of Insider Cyber-Attacks; Insider Hacking Tools; Software. 
505 8 |a HardwareChapter 6: Detection of Cyber-Attacks; Indicators of a Possible Cyber-Attack; Cyber-Attack Detection Tools; Intrusion Detection Systems; Intrusion Detection System Alarms; Intrusion Prevention System; Firewalls; Antivirus Programs; Forensic Evidence of a Cyber-Attack; Rootkits; Run Intrusion Detection System; Chapter 7: Preventing Cyber-Attacks; Cyber-Hygiene; Step 1. Physical Access to Equipment and Workplace; Step 2. Eliminate Common MGN Vulnerabilities; Step 3. Monitor Access to the MGN; Network Procurement Documentation. 
505 8 |a Discontinue Remote Connections to the Medical Equipment NetworkImplement Application Whitelisting; Systematic Patch Management Regimen; Reduce the Attack Surface; Build a Defendable Network Environment; Manage Authentication; Monitor and Respond; Do Not Use Medical Equipment Networks for Anything Else; Cybersecurity Analysis Tools; How to Avoid Phishing Scams; Chapter 8: Cyber-Attack Response and Recovery Planning; Developing a Response and Recovery Plan; Incident Response Teams; Recovery Phases; Phase 1: Detection; Phase 2: Mitigation; Phase 3: Recovery; The After Action Report. 
520 |a Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support equipment on which lives depend. News reports inform us how hackers strike hospitals with ransomware that prevents staff from accessing patient records or scheduling appointments. Unfortunately, medical equipment also can be hacked and shut down remotely as a form of extortion. Criminal hackers will not ask for a $500 payment to unlock an MRI, PET or CT scan, or X-ray machine--they will ask for much more. Litigation is bound to follow and the resulting punitive awards will drive up hospital insurance costs and healthcare costs in general. This will undoubtedly result in increased regulations for hospitals and higher costs for compliance. Unless hospitals and other healthcare facilities take the steps necessary to secure their medical-grade networks, they will be targeted for cyber-physical attack, possibly with life-threatening consequences. Cybersecurity for Hospitals and Healthcare Facilities is a wake-up call explaining what hackers can do, why hackers would target a hospital, the way hackers research a target, ways hackers can gain access to a medical-grade network (cyber-attack vectors), and ways hackers hope to monetize their cyber-attack. By understanding and detecting the threats, hospital administrators can take action now--before their hospital becomes the next victim. This book shows you how to: Determine how vulnerable hospital and healthcare building equipment is to cyber-physical attack. Identify possible ways hackers can hack hospital and healthcare facility equipment. Recognize the cyber-attack vectors--or paths by which a hacker or cracker can gain access to a computer, a medical-grade network server, or expensive medical equipment in order to deliver a payload or malicious outcome. Detect and prevent man-in-the-middle or denial-of-service cyber-attacks. Detect and prevent hacking of the hospital database and hospital web application. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Internet  |x Security measures. 
650 0 |a Health facilities  |x Security measures. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Internet  |x Sécurité  |x Mesures. 
650 6 |a Équipements sanitaires  |x Sécurité  |x Mesures. 
650 7 |a Computer security.  |2 bicssc 
650 7 |a Operating systems.  |2 bicssc 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Health facilities  |x Security measures.  |2 fast  |0 (OCoLC)fst00953060 
650 7 |a Internet  |x Security measures.  |2 fast  |0 (OCoLC)fst01751426 
776 0 8 |i Print version:  |a Ayala, Luis.  |t Cybersecurity for hospitals and healthcare facilities : a guide to detection and prevention.  |d New York, NY : Springer Science+Business Media, [2016]  |z 9781484221549  |w (DLC) 19240999 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484221556/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Baker and Taylor  |b BTCP  |n BK0019720237 
938 |a EBL - Ebook Library  |b EBLB  |n EBL4674429 
938 |a EBSCOhost  |b EBSC  |n 1288565 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis35834541 
938 |a YBP Library Services  |b YANK  |n 13155969 
994 |a 92  |b IZTAP