Start Date
11-8-2016
Description
The amalgamation of computerized equipment into medical arenas is creating environments that are conducive to security breaches. While previous medical device research has been conducted on medical training equipment, wearable and implantable devices, and on telesurgical systems, there has been minimal research investigating cyber-security vulnerabilities in real-world computer-facilitated surgical environments. The research contribution is an initial empirical analysis of the viability of security vulnerabilities in a computer-facilitated surgical environment. The preliminary results of this investigation generated information that can be used to develop Security Criteria for Integrated Medical Devices.
Recommended Citation
Van Devender, Maureen; Glisson, William; Campbell, Matt; and Finan, Michael, "Identifying Opportunities to Compromise Medical Devices" (2016). AMCIS 2016 Proceedings. 18.
https://aisel.aisnet.org/amcis2016/Health/Presentations/18
Identifying Opportunities to Compromise Medical Devices
The amalgamation of computerized equipment into medical arenas is creating environments that are conducive to security breaches. While previous medical device research has been conducted on medical training equipment, wearable and implantable devices, and on telesurgical systems, there has been minimal research investigating cyber-security vulnerabilities in real-world computer-facilitated surgical environments. The research contribution is an initial empirical analysis of the viability of security vulnerabilities in a computer-facilitated surgical environment. The preliminary results of this investigation generated information that can be used to develop Security Criteria for Integrated Medical Devices.