Cargando…

Cybersecurity for hospitals and healthcare facilities : a guide to detection and prevention /

Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls th...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Ayala, Luis (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, NY : Springer Science+Business Media, [2016]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • At a Glance; Contents; About the Author; About the Technical Reviewer; Preface; Introduction; Chapter 1: Hacker Reconnaissance of a Hospital Network; Footprinting; Scanning; Enumeration; Network Mapping; Cyber-Threat Actors; Chapter 2: How Hackers Gain Access to a Healthcare Facility or Hospital Network; Phishing Attack; Email Phishing Attack; Man-in-The-Middle Attacks; Pharming Attack; Indirect Cyber-Attack; Scareware; Ransomware; USB Stick; Auto-Hacking Attack; Backdoors; Ad Hoc Network; Unpatched Vulnerabilities; Appliance Hacks; Password Cracker; Denial-of-Service Attack.
  • Black Hole AttackSecondary Entry Points; Modems; Rogue Access Points; Chapter 3: Active Medical Device Cyber-Attacks; Magnetic Resonance Imaging (MRI); X-ray Generator (X-ray); Infusion Pump; Positron Emission Tomography (PET) Scanner; X-ray Computed Tomography (CT) Scanner; Defibrillators; Medical Ventilator; Anesthetic Machine; Heart-Lung Machine; Extracorporeal Membrane Oxygenation (ECMO); Dialysis Machine; Medical Lasers; Robotic Surgical Machine; Medical Device Data Systems (MDDS); Active Patient Monitoring Devices; Interoperable Medical Devices; Medical Image Storage Devices.
  • Medical Image Communications DevicesMedical Laboratory; Electronic Health Records (EHR); Barcode Scanning Systems; Chapter 4: Medical Facility Cyber-Physical Attacks; Building Controls System; Facility Equipment Controlled by the BCS; BCS Network Vulnerabilities; Preventing Hospital Building Equipment Damage; Facility Equipment Cyber-Physical Attacks; Steam Boilers; Boiler Sequence Controller Hack; Hot Water Heater Explosion; Chillers; Cooling Tower; Backup Generator; Chapter 5: Hospital Insider Threat; Types of Insider Threats; Types of Insider Cyber-Attacks; Insider Hacking Tools; Software.
  • HardwareChapter 6: Detection of Cyber-Attacks; Indicators of a Possible Cyber-Attack; Cyber-Attack Detection Tools; Intrusion Detection Systems; Intrusion Detection System Alarms; Intrusion Prevention System; Firewalls; Antivirus Programs; Forensic Evidence of a Cyber-Attack; Rootkits; Run Intrusion Detection System; Chapter 7: Preventing Cyber-Attacks; Cyber-Hygiene; Step 1. Physical Access to Equipment and Workplace; Step 2. Eliminate Common MGN Vulnerabilities; Step 3. Monitor Access to the MGN; Network Procurement Documentation.
  • Discontinue Remote Connections to the Medical Equipment NetworkImplement Application Whitelisting; Systematic Patch Management Regimen; Reduce the Attack Surface; Build a Defendable Network Environment; Manage Authentication; Monitor and Respond; Do Not Use Medical Equipment Networks for Anything Else; Cybersecurity Analysis Tools; How to Avoid Phishing Scams; Chapter 8: Cyber-Attack Response and Recovery Planning; Developing a Response and Recovery Plan; Incident Response Teams; Recovery Phases; Phase 1: Detection; Phase 2: Mitigation; Phase 3: Recovery; The After Action Report.