{"title":"17. 医疗设备的安全分析和监控","authors":"P. Koster","doi":"10.1561/9781680838237.ch17","DOIUrl":null,"url":null,"abstract":"This chapter outlines an approach for security monitoring powered by analytics to enhance the security posture of medical devices and its operational environment. Implementation experiences demonstrate feasibility. Empirical results show further that medical device security control status can be monitored with high accuracy and low false positive rate. Security monitoring of the operational environment is also promising. The approach demonstrates potential to integrate in larger cyber threat management systems. The perspective of the medical device nicely complements other monitoring solutions such as network monitoring. The expected impact on medical device security and its operating environment is very positive. Over time this can grow as medical device logging and log export capabilities are extended as part of their design, enabling more monitoring.","PeriodicalId":355449,"journal":{"name":"Cyber-Physical Threat Intelligence for Critical Infrastructures Security: Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"17. Security Analytics and Monitoring of Medical Devices\",\"authors\":\"P. Koster\",\"doi\":\"10.1561/9781680838237.ch17\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This chapter outlines an approach for security monitoring powered by analytics to enhance the security posture of medical devices and its operational environment. Implementation experiences demonstrate feasibility. Empirical results show further that medical device security control status can be monitored with high accuracy and low false positive rate. Security monitoring of the operational environment is also promising. The approach demonstrates potential to integrate in larger cyber threat management systems. The perspective of the medical device nicely complements other monitoring solutions such as network monitoring. The expected impact on medical device security and its operating environment is very positive. Over time this can grow as medical device logging and log export capabilities are extended as part of their design, enabling more monitoring.\",\"PeriodicalId\":355449,\"journal\":{\"name\":\"Cyber-Physical Threat Intelligence for Critical Infrastructures Security: Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Cyber-Physical Threat Intelligence for Critical Infrastructures Security: Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1561/9781680838237.ch17\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cyber-Physical Threat Intelligence for Critical Infrastructures Security: Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1561/9781680838237.ch17","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
17. Security Analytics and Monitoring of Medical Devices
This chapter outlines an approach for security monitoring powered by analytics to enhance the security posture of medical devices and its operational environment. Implementation experiences demonstrate feasibility. Empirical results show further that medical device security control status can be monitored with high accuracy and low false positive rate. Security monitoring of the operational environment is also promising. The approach demonstrates potential to integrate in larger cyber threat management systems. The perspective of the medical device nicely complements other monitoring solutions such as network monitoring. The expected impact on medical device security and its operating environment is very positive. Over time this can grow as medical device logging and log export capabilities are extended as part of their design, enabling more monitoring.