Cybersecurity for hospitals and healthcare facilities : a guide to detection and prevention /
Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls th...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
New York, NY :
Springer Science+Business Media,
[2016]
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- At a Glance; Contents; About the Author; About the Technical Reviewer; Preface; Introduction; Chapter 1: Hacker Reconnaissance of a Hospital Network; Footprinting; Scanning; Enumeration; Network Mapping; Cyber-Threat Actors; Chapter 2: How Hackers Gain Access to a Healthcare Facility or Hospital Network; Phishing Attack; Email Phishing Attack; Man-in-The-Middle Attacks; Pharming Attack; Indirect Cyber-Attack; Scareware; Ransomware; USB Stick; Auto-Hacking Attack; Backdoors; Ad Hoc Network; Unpatched Vulnerabilities; Appliance Hacks; Password Cracker; Denial-of-Service Attack.
- Black Hole AttackSecondary Entry Points; Modems; Rogue Access Points; Chapter 3: Active Medical Device Cyber-Attacks; Magnetic Resonance Imaging (MRI); X-ray Generator (X-ray); Infusion Pump; Positron Emission Tomography (PET) Scanner; X-ray Computed Tomography (CT) Scanner; Defibrillators; Medical Ventilator; Anesthetic Machine; Heart-Lung Machine; Extracorporeal Membrane Oxygenation (ECMO); Dialysis Machine; Medical Lasers; Robotic Surgical Machine; Medical Device Data Systems (MDDS); Active Patient Monitoring Devices; Interoperable Medical Devices; Medical Image Storage Devices.
- Medical Image Communications DevicesMedical Laboratory; Electronic Health Records (EHR); Barcode Scanning Systems; Chapter 4: Medical Facility Cyber-Physical Attacks; Building Controls System; Facility Equipment Controlled by the BCS; BCS Network Vulnerabilities; Preventing Hospital Building Equipment Damage; Facility Equipment Cyber-Physical Attacks; Steam Boilers; Boiler Sequence Controller Hack; Hot Water Heater Explosion; Chillers; Cooling Tower; Backup Generator; Chapter 5: Hospital Insider Threat; Types of Insider Threats; Types of Insider Cyber-Attacks; Insider Hacking Tools; Software.
- HardwareChapter 6: Detection of Cyber-Attacks; Indicators of a Possible Cyber-Attack; Cyber-Attack Detection Tools; Intrusion Detection Systems; Intrusion Detection System Alarms; Intrusion Prevention System; Firewalls; Antivirus Programs; Forensic Evidence of a Cyber-Attack; Rootkits; Run Intrusion Detection System; Chapter 7: Preventing Cyber-Attacks; Cyber-Hygiene; Step 1. Physical Access to Equipment and Workplace; Step 2. Eliminate Common MGN Vulnerabilities; Step 3. Monitor Access to the MGN; Network Procurement Documentation.
- Discontinue Remote Connections to the Medical Equipment NetworkImplement Application Whitelisting; Systematic Patch Management Regimen; Reduce the Attack Surface; Build a Defendable Network Environment; Manage Authentication; Monitor and Respond; Do Not Use Medical Equipment Networks for Anything Else; Cybersecurity Analysis Tools; How to Avoid Phishing Scams; Chapter 8: Cyber-Attack Response and Recovery Planning; Developing a Response and Recovery Plan; Incident Response Teams; Recovery Phases; Phase 1: Detection; Phase 2: Mitigation; Phase 3: Recovery; The After Action Report.