Cybersecurity for Hospitals and Healthcare Facilities A Guide to Det

Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade n

  • PDF / 8,466,229 Bytes
  • 147 Pages / 504.06 x 720 pts Page_size
  • 7 Downloads / 211 Views

DOWNLOAD

REPORT


Cybersecurity for Hospitals and Healthcare Facilities A Guide to Detection and Prevention

Luis Ayala

Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention Luis Ayala Fredericksburg, Virginia, USA ISBN-13 (pbk): 978-1-4842-2154-9 DOI 10.1007/978-1-4842-2155-6

ISBN-13 (electronic): 978-1-4842-2155-6

Library of Congress Control Number: 2016951946 Copyright © 2016 by Luis Ayala This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The information and opinions contained in this document are provided “as is” and without any warranties or guarantees. Prior to acting on recommendations herein, the user should consult with licensed engineers to determine if the actions are safe for the specific equipment in your building. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes. The statements of fact, opinion, or analysis expressed in this manuscript are those of the author and do not reflect the official policy or position of the Defense Intelligence Agency, the Department of Defense, or the U.S. Government. Review of the material does not imply DIA, DoD, or the U.S. Government endorsement of factual accuracy or opinion. Trademarked names, logos, and images may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, logo, or image we use the names, logos, and images only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein. Managing Director: Welmoed Spahr Acquisitions Editor: Susan McDermott Developmental Editor: Laura Berendson Technical Reviewer: Janie Gittleman Editorial Board: Steve Anglin, Pramila Balen, Laura Berendson, Aaron Black, Louise Corrigan, Jonathan Gennick, Robert Hutchinson, Celestin Suresh John, Nikhil Karkal, James Markham