HOME  |  NEWS  |  BLOGS  |  MESSAGES  |  FEATURES  |  VIDEOS  |  WEBINARS  |  INDUSTRIES  |  FOCUS ON FUNDAMENTALS
  |  REGISTER  |  LOGIN  |  HELP
Blogs
Guest Blogs

Medical Device Vulnerabilities: What to Protect & How to Protect It

NO RATINGS
1 saves
Page 1 / 2 Next >
View Comments: Oldest First|Newest First|Threaded View
Page 1/2  >  >>
Ann R. Thryft
User Rank
Blogger
Valuable information
Ann R. Thryft   2/19/2013 3:43:36 PM
NO RATINGS
Thanks for this article. We've had several discussions on the site about hacking medical devices, and this is valuable info on several ways they can be vulnerable.

Cabe Atwell
User Rank
Blogger
Re: Valuable information
Cabe Atwell   2/19/2013 5:09:57 PM
NO RATINGS
This is why medical devices are so expensive, the copious levels protection. When it comes to lives at risk, everything should be considered for testing. I'm not a big advocate of IP protection, but foreign companies are always looking to copy top-dollar products.

C

Charles Murray
User Rank
Blogger
Secure OS?
Charles Murray   2/19/2013 7:51:12 PM
NO RATINGS
Alan, I'm curious how important it is to have a secure operating system for some of these medical devices. We often see operating systems decribed in terms of levels or security -- what level of security should designers aspire to?

Nancy Golden
User Rank
Platinum
Layered Strategies and the Need For It
Nancy Golden   2/20/2013 9:32:23 AM
NO RATINGS
Interesting article - the layered strategy makes good sense as well as not advertising any specifics about the security methods that are in place. A lot of what was said applies to technology in general as well. Too bad we can't direct the energy and innovation that must be used to make products secure to enhance perofrmance instead. Malicious attacks on medical devices is a sad statement of our society - but then, I have never understood why so many hackers waste so much time and energy to cause problems when they could direct their abilities towards doing good and contributing to society with their accomplishments...

TJ McDermott
User Rank
Blogger
Re: Valuable information
TJ McDermott   2/20/2013 10:07:00 AM
NO RATINGS
Cabe, I would posit that it is overall cost of liability that makes medical equipment so expensive.  The risk of ANY failure is too great.

Having some personal data get out poses a very low risk to life.

NadineJ
User Rank
Platinum
Re: Valuable information
NadineJ   2/20/2013 4:13:14 PM
NO RATINGS
I agree.  This very valuable info and very timely.  

The general public may be more comfortable with less privacy in social media but not with their medical data.

Cabe Atwell
User Rank
Blogger
Re: Valuable information
Cabe Atwell   2/20/2013 4:51:06 PM
NO RATINGS
If medical history wasn't important, politicians wouldn't get so worried over it. I say leaked data is a big deal.

C

Ann R. Thryft
User Rank
Blogger
Re: Valuable information
Ann R. Thryft   2/20/2013 5:38:28 PM
NO RATINGS
The high cost of medical devices is due in part to a longer history of liability problems than of leaked data, a much more recent concern. Other factors like very high performance and the high cost of middlemen no doubt contribute yet more cost. But I think Cabe's point about leaked data is a good one--that's probably going to be a contributing factor to higher device costs in the near future.

Charles Murray
User Rank
Blogger
Re: Valuable information
Charles Murray   2/25/2013 7:47:58 PM
Good point, NadineJ. Hackers could misuse information about communicable diseases and psychiatric treatment (among other things) to cause to a great deal of trouble for unsuspecting patients.  

Greg M. Jung
User Rank
Platinum
Malicious Intent
Greg M. Jung   2/27/2013 8:18:27 PM
NO RATINGS
From a patient safety standpoint, I'm not as concerned with the pirating of medical information as I am about a hacker who infiltrates the medical device with malicious intent.  I think we should consider ways to mitigate hacker risk if a medical device is connected to a network and could be vulnerable to an attack on its operating system (where applicable).

Page 1/2  >  >>
Partner Zone
More Blogs from Guest Blogs
Transient-voltage-suppression diode technology eliminates surges and enhances vehicle safety.
Industrial workplaces are governed by OSHA rules, but this isn’t to say that rules are always followed. While injuries happen on production floors for a variety of reasons, of the top 10 OSHA rules that are most often ignored in industrial settings, two directly involve machine design: lockout/tagout procedures (LO/TO) and machine guarding.
Load dump occurs when a discharged battery is disconnected while the alternator is generating current and other loads remain on the alternator circuit. If left alone, the electrical spikes and transients will be transmitted along the power line, leading to malfunctions in individual electronics/sensors or permanent damage to the vehicle’s electronic system. Bottom line: An uncontrolled load dump threatens the overall safety and reliability of the vehicle.
While risk management sounds like one activity, in order to be conducted effectively, it must be broken down into three sub-components: risk assessment, risk monitoring, and response planning.
While many larger companies are still reluctant to rely on wireless networks to transmit important information in industrial settings, there is an increasing acceptance rate of the newer, more robust wireless options that are now available.
Design News Webinar Series
3/31/2015 11:00 a.m. California / 2:00 p.m. New York
2/25/2015 11:00 a.m. California / 2:00 p.m. New York
12/11/2014 8:00 a.m. California / 11:00 a.m. New York
12/10/2014 8:00 a.m. California / 11:00 a.m. New York
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
Mar 30 - Apr3, Getting Hands-On with Cypress’ PSoC
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  67


Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Sponsored Content

Technology Marketplace

Copyright © 2015 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service