HOME  |  NEWS  |  BLOGS  |  MESSAGES  |  FEATURES  |  VIDEOS  |  WEBINARS  |  INDUSTRIES  |  FOCUS ON FUNDAMENTALS
  |  REGISTER  |  LOGIN  |  HELP
Blogs
Guest Blogs

Medical Device Vulnerabilities: What to Protect & How to Protect It

NO RATINGS
1 saves
Page 1 / 2 Next >
View Comments: Oldest First|Newest First|Threaded View
<<  <  Page 2/2
Alan Walsh
User Rank
Iron
Re: Secure OS?
Alan Walsh   4/4/2013 2:36:01 PM
NO RATINGS
Charles, first off apologies for the delay in responding.  I lost track of when the article was going live.  The level of level of security depends on the safetly classification of the device.  In cases of lowest patient risk something like SELinux or SEAndroid (Security Ehanced) may be appropriate.  In cases of higher risk most closed source OS options that offer packages specifically for medical device development will be closed-source, and provide an appropriate level of security as a starting point.  In terms of networked devices one aspect of security outside scope of my post is IT policy.  The range and nature of devices that connect to your network, and whether or not persistent storage is all encrypted, and whether it's possible to install new apps, etc all contribute to overall security.

Alan Walsh
User Rank
Iron
Re: Malicious Intent
Alan Walsh   4/4/2013 2:41:11 PM
NO RATINGS
Greg, first off apologies for the delay in responding.  I lost track of when the article was going live.  I agree completely.  The focus of the article was intended to be FDA regulated devices, not so much data protection that would be governed by HIPAA.  In fact I was motivated to write because of the reports in 2011 that an insulin pump had been successfully hacked, and was able to be programmed maliciously over a wireless connection.

Alan Walsh
User Rank
Iron
Re: Layered Strategies and the Need For It
Alan Walsh   4/4/2013 2:43:53 PM
NO RATINGS
Nancy, first off apologies for the delay in responding.  I lost track of when the article was going live.  Absolutely most of what I described is generally applicable to consumer devices as well as medical devices.  Device and information security is generally a fairly mature and active area of development, and I was trying to illustrate some of the areas where medical device designers and manufacturers should be paying more attention to security, in an environment that historically has had fewer security concerns (non-networked devices, used in controlled environments, by trained health care professionals).

Alan Walsh
User Rank
Iron
Regarding cost of medical devices
Alan Walsh   4/4/2013 2:50:17 PM
NO RATINGS
Thanks all for your comments on the article.  Apologies for the delay in responding.  I lost track of when the article was going live.  I think there are three main contributors to the cost of medical devices.  One is definitely the higher development costs to meet regulatory and safety requirements.  However the "typical" medical device takes much less overall cost to develop than the iPhone for example.  Liability is another big piece, and I think the third important piece is the relatively low volumes.  At Logic PD I have worked with a variety of very recognizable device manufacturers, and volumes for some of the devices that we've worked on with large-scale development efforts can be in the 100's per year.  If you sell only about 1,000 in ten years every million you spend on development adds $1000 to the cost of each unit.  Such low volumes also increases the cost of the components that go into the device (buying a million memory chips is a much lower unit cost than buying 100).

Nancy Golden
User Rank
Platinum
Re: Layered Strategies and the Need For It
Nancy Golden   4/4/2013 2:53:19 PM
NO RATINGS
I certainly see your point, Alan. Current trends are taking technology usage out of the hands of specialists and into those of less technical users who may inadvertently create a security breach that allows sensitive information to either be accessed or corrupted. Networking is definitely on the increase in medical applications for easier sharing of data - I can see how this increases the need for security...

tekochip
User Rank
Platinum
Unique Data Format
tekochip   4/4/2013 3:29:45 PM
NO RATINGS
Using a unique data format is an often overlooked area of security. Simply packing bytes and using bit fields not only makes the data packet smaller, but does prevent all bit the technically savvy from monitoring the data.


<<  <  Page 2/2
Partner Zone
More Blogs from Guest Blogs
Iterative design — the cycle of prototyping, testing, analyzing, and refining a product — existed long before additive manufacturing, but it has never been as efficient and approachable as it is today with 3D printing.
People usually think of a time constant as the time it takes a first order system to change 63% of the way to the steady state value in response to a step change in the input -- it’s basically a measure of the responsiveness of the system. This is true, but in reality, time constants are often not constant. They can change just like system gains change as the environment or the geometry of the system changes.
At its core, sound is a relatively simple natural phenomenon caused by pressure pulsations or vibrations propagating through various mediums in the world around us. Studies have shown that the complete absence of sound can drive a person insane, causing them to experience hallucinations. Likewise, loud and overwhelming sound can have the same effect. This especially holds true in manufacturing and plant environments where loud noises are the norm.
The tech industry is no stranger to crowdsourcing funding for new projects, and the team at element14 are no strangers to crowdsourcing ideas for new projects through its design competitions. But what about crowdsourcing new components?
It has been common wisdom of late that anything you needed to manufacture could be made more cost-effectively on foreign shores. Following World War II, the label “Made in Japan” was as ubiquitous as is the “Made in China” version today and often had very similar -- not always positive -- connotations. Along the way, Korea, Indonesia, Malaysia, and other Pacific-rim nations have each had their turn at being the preferred low-cost alternative to manufacturing here in the US.
Design News Webinar Series
11/19/2014 11:00 a.m. California / 2:00 p.m. New York
11/6/2014 11:00 a.m. California / 2:00 p.m. New York
10/7/2014 8:00 a.m. California / 11:00 a.m. New York
12/11/2014 8:00 a.m. California / 11:00 a.m. New York
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
Dec 1 - 5, An Introduction to Embedded Software Architecture and Design
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  6


Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Last Archived Class
Sponsored by Littelfuse
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Sponsored Content

Technology Marketplace

Copyright © 2014 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service