EconPapers    
Economics at your fingertips  
 

Hacking humans: A case study and analysis of vulnerabilities in the advancing medical device landscape

Gabrielle Hempel, Diane Brady Janosek and Donna Brady Raziano
Additional contact information
Gabrielle Hempel: Accenture, USA
Diane Brady Janosek: PO Box 292, Annapolis Junction, MD 20701, USA
Donna Brady Raziano: Mercy LIFE, USA

Cyber Security: A Peer-Reviewed Journal, 2020, vol. 3, issue 4, 351-362

Abstract: This paper analyses the findings and trends of discovered vulnerabilities in medical devices enabled with ‘smart’ technology. With today’s medical devices often being connected to the Internet or to an external monitoring source, the risks to people’s health increase. This paper suggests a path to mitigating known vulnerabilities to enable better informed healthcare decisions. The paper will first set the landscape discussing medical devices which enable connectivity and incorporate software, which causes increased cyber vulnerability. Secondly, it details how medical device recalls increased, due to software issues and vulnerabilities, which recalls were based on weaknesses discovered by government security entities and academic institutions. Third, the paper highlights the devices most at risk, which include implantable cardioverter defibrillators (ICDs)/pacemakers, infusion pumps, and magnetic resonance imaging (MRI) machines. Fourth, the cyber security vulnerabilities trends will be discussed with the corresponding health safety concerns. Finally, the government response in terms of risk mitigation guidance will be identified, to include a vulnerability scoring system which assesses impact and risk of exposure. The paper concludes with supporting a broader adoption of the health risk mitigation scoring system to achieve a diminished health risk of utilising connected medical devices.

Keywords: medical device; healthcare; cyber security; Internet of Things (IoT); vulnerabilities; data breach (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2020
References: Add references at CitEc
Citations:

Downloads: (external link)
https://hstalks.com/article/5814/download/ (application/pdf)
https://hstalks.com/article/5814/ (text/html)
Requires a paid subscription for full access.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2020:v:3:i:4:p:351-362

Access Statistics for this article

More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().

 
Page updated 2025-03-19
Handle: RePEc:aza:csj000:y:2020:v:3:i:4:p:351-362