Increase the security and resilience of medical devices

Assignment Help Computer Engineering
Reference no: EM133337829

Article from The Harvard Business Review

It reports that researchers in Belgium and the United Kingdom have demonstrated that it is possible to transmit life-threatening, and possibly fatal, signals to implanted medical devices. The list includes devices such as pacemakers, defibrillators, and insulin pumps. Malware has also been found in software devices such as x-ray machines and blood gas analyzers. A nursing inventory supply system was also found to have a vulnerability that could negatively impact patient care and safety and provide back door access to the organization's wider information system. Quality Hospital now wants to set up a Task Force to address these issues. 

Answer the following questions:

  1. One of the HCIC Task Force imperatives is to "increase the security and resilience of medical devices and health IT." Who should be involved in this initiative at Quality Hospital?
  2. Another of the HCIC Task Force imperatives is to "increase health care industry readiness through improved cybersecurity awareness and education." You are the Security Officer at Quality Hospital. How would you achieve this imperative relative to your workforce and the threats posed in this case?
  3. The HIPAA Security Rule requires that the following be maintained regarding. ePHI: confidentiality, integrity, and availability. In what order would you rank these concepts in terms of which is at greatest to lesser risk when medical devices are infiltrated? Explain your rationale.
  4. Do you think that risks to patient safety OR information security are greater in this case? Explain your answer.
  5. The Internet of Things (IoT) describes the relationship and connectivity between the Internet and everyday objects that contain computers that transmit and receive data. As described in this case, medical devices have become part of the IoT. In the interest of patient safety, do you think that medical devices should be removed from the IoT or would that represent a step backward in technological advancements (explain your answer)? Do technological advancements outweigh the risks presented in this case (explain your answer)? Can these risks be overcome (explain your answer)?

Reference no: EM133337829

Questions Cloud

Social movement create international political theory : How does the social movement create international political theory? Where are the women in international theory?
Did you use manual or automated approach for test management : SST3 6068 Fanshawe College What was your test management process during your project execution? Did you use manual or automated approach for test management
Nation-state since the Cold War era : Describe the evolution of conflict in Afghanistan as a nation-state since the Cold War era until the rise of Taliban in 2021.
What devices transfer packets across multiple networks : What devices transfer packets across multiple networks and use tables to store network addresses to determine the best destination?
Increase the security and resilience of medical devices : HIM 360 School of Professional Studies, increase the security and resilience of medical devices and health IT." Who should be involved in this initiative
Scientific diplomacy and digital diplimacy : Discuss how Malaysia has used scientific diplomacy and digital diplimacy in an effort to deal with Covid-19 pandemic in the country.
Cybersecurity requirements and the interagency guidelines : Cybersecurity Requirements and the Interagency Guidelines, can you comply with the 3rd party requirements in each law without a contract
Perspective of israeli diplomat : From the perspective of an Israeli diplomat, which would be the most and least suitable of the listed organizations for serving as the mediator
How are secure software update, management : CSC 120 Hampton University How are secure software update, management of trusted applications, and attestation used to automate security assurance verification

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd