In the past, medical devices were stand-alone instruments that interacted only with the patient. Today, medical devices have operating systems and communication hardware that allow them to connect to networks and other devices. While this technology has created more powerful tools and improved health care, it has led to additional safety and security risks. The goal of this use case is to help health care providers secure their medical devices on an enterprise network, with a specific focus on wireless infusion pumps. This use case begins the process to identify the actors interacting with infusion pumps, define the interactions between the actors and the system, perform a risk assessment, identify mitigating security technologies, and provide an example implementation.
In the past, medical devices were stand-alone instruments that interacted only with the patient. Today, medical devices have operating systems and communication hardware that allow them to connect to networks and other devices. While this technology has created more powerful tools and improved...
See full abstract
In the past, medical devices were stand-alone instruments that interacted only with the patient. Today, medical devices have operating systems and communication hardware that allow them to connect to networks and other devices. While this technology has created more powerful tools and improved health care, it has led to additional safety and security risks. The goal of this use case is to help health care providers secure their medical devices on an enterprise network, with a specific focus on wireless infusion pumps. This use case begins the process to identify the actors interacting with infusion pumps, define the interactions between the actors and the system, perform a risk assessment, identify mitigating security technologies, and provide an example implementation.
Hide full abstract