Do No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial
저자
Matthew Webster
출판사
Wiley
facebook twitter email printer
의학
정가
36,000원
판매가
34,000원
적립금
680원
발행일
2021-06-25
페이지수
400 Pages
 
ISBN13
 
9781119794028
제본형태
Softcover
배송비
결제금액이 25,000원 이상 무료배송
배송
해외주문이 필요한 도서입니다. (4~5주소요) 자세한 내용은 페이지하단 배송안내 참조바랍니다.
주문수량
updown

Discover the security risks that accompany the widespread adoption of new medical devices and how to mitigate them  

In Do No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States, cybersecurity expert Matthew Webster delivers an insightful synthesis of the health benefits of the Internet of Medical Things (IoMT), the evolution of security risks that have accompanied the growth of those devices, and practical steps we can take to protect ourselves,  our data, and our hospitals from harm. 

You’ll learn how the high barriers to entry for innovation in the field of healthcare are impeding necessary change and how innovation accessibility must be balanced against regulatory compliance and privacy to ensure safety. 

In this important book, the author describes: 

  • The increasing expansion of medical devices and the dark side of the high demand for medical devices 
  • The medical device regulatory landscape and the dilemmas hospitals find themselves in with respect medical devices 
  • Practical steps that individuals and businesses can take to encourage the adoption of safe and helpful medical devices or mitigate the risk of having insecure medical devices 
  • How to help individuals determine the difference between protected health information and the information from health devices--and protecting your data 
  • How to protect your health information from cell phones and applications that may push the boundaries of personal privacy 
  • Why cybercriminals can act with relative impunity against hospitals and other organizations 

Perfect for healthcare professionals, system administrators, and medical device researchers and developers, Do No Harm is an indispensable resource for anyone interested in the intersection of patient privacy, cybersecurity, and the world of Internet of Medical Things. 

Preface xviii

Introduction xxi

Part I Defining the Challenge 1

Chapter 1 The Darker Side of High Demand 3

Connected Medical Device Risks 4

Ransomware 4

Risks to Data 7

Escalating Demand 10

Types of Internet-Connected Medical Devices 11

COVID-19 Trending Influences 12

By the Numbers 13

Telehealth 15

Home Healthcare 15

Remote Patient Monitoring 16

The Road to High Risk 16

Innovate or Die 19

In Summary 26

Chapter 2 The Internet of Medical Things in Depth 27

What Are Medical Things? 28

Telemedicine 29

Data Analytics 30

Historical IoMT Challenges 31

IoMT Technology 36

Electronic Boards 36

Operating Systems 37

Software Development 38

Wireless 39

Wired Connections 43

The Cloud 43

Mobile Devices and Applications 46

Clinal Monitors 47

Websites 48

Putting the Pieces Together 48

Current IoMT Challenges 48

In Summary 50

Chapter 3 It is a Data-Centric World 53

The Volume of Health Data 53

Data is That Important 55

This is Data Aggregation? 57

Non-HIPAA Health Data? 59

Data Brokers 60

Big Data 63

Data Mining Automation 68

In Summary 70

Chapter 4 IoMT and Health Regulation 73

Health Regulation Basics 73

FDA to the Rescue? 77

The Veterans Affairs and UL 2900 81

In Summary 83

Chapter 5 Once More into the Breach 85

Grim Statistics 86

Breach Anatomy 89

Phishing, Pharming, Vishing, and Smishing 90

Web Browsing 92

Black-Hat Hacking 93

IoMT Hacking 94

Breach Locations 95

In Summary 95

Chapter 6 Say Nothing of Privacy 97

Why Privacy Matters 98

Privacy History in the United States 101

The 1990s Turning Point 103

HIPAA Privacy Rules 104

HIPAA and Pandemic Privacy 104

Contact Tracing 106

Corporate Temperature Screenings 107

A Step Backward 107

The New Breed of Privacy Regulations 108

California Consumer Privacy Act 108

CCPA, AB-713, and HIPAA 109

New York SHIELD Act 111

Nevada Senate Bill 220 111

Maine: An Act to Protect the Privacy of Online Consumer Information 112

States Striving for Privacy 112

International Privacy Regulations 113

Technical and Operational Privacy Considerations 114

Non-IT Considerations 115

Impact Assessments 115

Privacy, Technology, and Security 115

Privacy Challenges 117

Common Technologies 118

The Manufacturer’s Quandary 119

Bad Behavior 121

In Summary 122

Chapter 7 The Short Arm of the Law 123

Legal Issues with Hacking 124

White-Hat Hackers 125

Gray-Hat Hackers 125

Black-Hat Hackers 127

Computer Fraud and Abuse Act 127

The Electronic Communications Privacy Act 128

Cybercrime Enforcement 128

Results of Legal Shortcomings 131

In Summary 132

Chapter 8 Threat Actors and Their Arsenal 135

The Threat Actors 136

Amateur Hackers 136

Insiders 136

Hacktivists 137

Advanced Persistent Threats 138

Organized Crime 138

Nation-States 139

Nation-States’ Legal Posture 140

The Deep, Dark Internet 141

Tools of the Trade 143

Types of Malware 144

Malware Evolution 146

Too Many Strains 147

Malware Construction Kits 148

In Summary 148

Part II Contextual Challenges and Solutions 151

Chapter 9 Enter Cybersecurity 153

What is Cybersecurity? 154

Cybersecurity Basics 154

Cybersecurity Evolution 156

Key Disciplines in Cybersecurity 158

Compliance 158

Patching 160

Antivirus 161

Network Architecture 161

Application Architecture 162

Threat and Vulnerability 162

Identity and Access Management 163

Monitoring 164

Incident Response 165

Digital Forensics 166

Configuration Management 166

Training 168

Risk Management 168

In Summary 169

Chapter 10 Network Infrastructure and IoMT 171

In the Beginning 172

Networking Basics: The OSI Model 173

Mistake: The Flat Network 175

Resolving the Flat Network Mistake 177

Alternate Network Defensive Strategies 178

Network Address Translation 178

Virtual Private Networks 179

Network Intrusion Detection Protection Tools 179

Deep Packet Inspection 179

Web Filters 180

Threat Intelligence Gateways 180

Operating System Firewalls 181

Wireless Woes 181

In Summary 182

Chapter 11 Internet Services Challenges 185

Internet Services 186

Network Services 186

Websites 187

IoMT Services 189

Other Operating System Services 189

Open-Source Tools Are Safe, Right? 190

Cloud Services 193

Internet-Related Services Challenges 194

Domain Name Services 195

Deprecated Services 197

Internal Server as an Internet Servers 197

The Evolving Enterprise 198

In Summary 199

Chapter 12 IT Hygiene and Cybersecurity 201

The IoMT Blues 202

IoMT and IT Hygiene 202

Past Their Prime 203

Selecting IoMT 203

IoMT as Workstations 204

Mixing IoMT with IoT 204

The Drudgery of Patching 206

Mature Patching Process 207

IoMT Patching 208

Windows Patching 208

Linux Patching 209

Mobile Device Patching 209

Final Patching Thoughts 210

Antivirus is Enough, Right? 210

Antivirus Evolution 211

Solution Interconnectivity 211

Antivirus in Nooks and Crannies 212

Alternate Solutions 213

IoMT and Antivirus 214

The Future of Antivirus 215

Antivirus Summary 215

Misconfigurations Galore 215

The Process for Making Changes 216

Have a Configuration Strategy 217

IoMT Configurations 218

Windows System Configurations 218

Linux Configurations 219

Application Configurations 219

Firewall Configurations 220

Mobile Device Misconfigurations 220

Database Configurations 221

Configuration Drift 222

Configuration Tools 222

Exception Management 223

Enterprise Considerations 224

In Summary 224

Chapter 13 Identity and Access Management 227

Minimal Identity Practices 228

Local Accounts 229

Domain/Directory Accounts 229

Service Accounts 230

IoMT Accounts 230

Physical Access Accounts 231

Cloud Accounts 231

Consultants, Contractors, and Vendor Accounts 232

Identity Governance 232

Authentication 233

Password Pain 233

Multi-factor Authentication 236

Hard Tokens 236

Soft Tokens 237

Authenticator Applications 238

Short Message Service 238

QR Codes 238

Other Authentication Considerations 239

Dealing with Password Pain 239

MFA Applicability 240

Aging Systems 240

Privileged Access Management 240

Roles 241

Password Rotation 242

MFA Access 242

Adding Network Security 242

Other I&AM Technologies 243

Identity Centralization 243

Identity Management 244

Identity Governance Tools 244

Password Tools 244

In Summary 245

Chapter 14 Threat and Vulnerability 247

Vulnerability Management 248

Traditional Infrastructure Vulnerability Scans 248

Traditional Application Vulnerability Scans 249

IoMT Vulnerability Challenges 249

Rating Vulnerabilities 250

Vulnerability Management Strategies 251

Asset Exposure 251

Importance 252

Compensating Controls 252

Zero-Day Vulnerabilities 252

Less-Documented Vulnerabilities 253

Putting It All Together 253

Additional Vulnerability Management Uses 254

Penetration Testing 254

What Color Box? 255

What Color Team? 255

Penetration Testing Phases 256

Scope 256

Reconnaissance 256

Vulnerability Assessments 257

The Actual Penetration Test 257

Reporting 258

Penetration Testing Strategies 258

Cloud Considerations 258

New Tools of an Old Trade 259

MITRE ATT&CK Framework 259

Breach and Attack Simulation 259

Crowd Source Penetration Testing 260

Calculating Threats 260

In Summary 261

Chapter 15 Data Protection 263

Data Governance 264

Data Governance: Ownership 264

Data Governance: Lifecycle 265

Data Governance: Encryption 265

Data Governance: Data Access 267

Closing Thoughts 268

Data Loss Prevention 268

Fragmented DLP Solutions 269

DLP Challenges 270

Enterprise Encryption 270

File Encryption 271

Encryption Gateways 271

Data Tokenization 272

In Summary 273

Chapter 16 Incident Response and Forensics 275

Defining the Context 276

Logs 277

Alerts 278

SIEM Alternatives 279

Incidents 280

Breaches 281

Incident Response 281

Evidence Handling 282

Forensic Tools 283

Automation 283

EDR and MDR 284

IoMT Challenges 284

Lessons Learned 285

In Summary 285

Chapter 17 A Matter of Life, Death, and Data 287

Organizational Structure 288

Board of Directors 288

Chief Executive Officer 289

Chief Information Officer 289

General Counsel 290

Chief Technology Officer 290

Chief Medical Technology Officer 290

Chief Information Security Officer 291

Chief Compliance Officer 291

Chief Privacy Officer 291

Reporting Structures 292

Committees 293

Risk Management 294

Risk Frameworks 294

Determining Risk 295

Third-Party Risk 296

Risk Register 297

Enterprise Risk Management 297

Final Thoughts on Risk Management 298

Mindset Challenges 298

The Compliance-Only Mindset 298

Cost Centers 299

Us Versus Them 300

The Shiny Object Syndrome 300

Never Disrupt the Business 301

It’s Just an IT Problem 301

Tools over People 303

We Are Not a Target 303

The Bottom Line 304

Final Mindset Challenges 304

Decision-Making 304

A Measured View 305

Communication is Key 306

Enterprise Risk Management 307

Writing and Sign-Off 308

Data Protection Considerations 308

In Summary 309

Part III Looking Forward 311

Chapter 18 Seeds of Change 313

The Shifting Legal Landscape 314

Attention on Data Brokers 314

Data Protection Agency 316

IoT Legislation 317

Privacy Legislation 318

A Ray of Legal Light 318

International Agreements 319

Public-Private Partnerships 319

Better National Coordination 320

International Cooperation 322

Technology Innovation 323

Threat Intelligence 323

Machine Learning Revisited 323

Zero Trust 324

Final Technology Thoughts 325

Leadership Shakeups 325

Blended Approaches 326

In Summary 327

Chapter 19 Doing Less Harm 329

What IoMT Manufacturers Can Do 330

Cybersecurity as Differentiator 332

What Covered Entities Can Do 332

Cybersecurity Decision Making 333

Compliance Anyone? 334

The Tangled Web of Privacy 335

Aggregation of Influence 335

Cybersecurity Innovators 337

Industrial Control Systems Overlap 338

What You Can Do 339

Personal Cybersecurity 339

Politics 341

In Summary 342

Chapter 20 Changes We Need 343

International Cooperation 344

Covered Entities 344

Questions a Board Should Ask 345

More IoMT Security Assurances 346

Active Directory Integration 347

Software Development 347

Independent Measures 348

In Summary 348

Glossary 351

Index 367

배송안내

당일출고
List
구분 13시 이전 13시 이후
군자도서 당일출고 1일 추가
타사도서 1일 ~ 2일 추가 2일 ~ 3일 추가

고객님께서 급히 필요하신 상품은 별도로 나누어 주문하시면 수령시간이 절약됩니다.

  • - 당일 13시 이전에 주문과 결제가 확인된 주문건에 대해서 당일출고를 진행합니다. (단, 타사도서, 원서 제외되며 군자출판사에서 출간된 도서로 이뤄진 주문건에 한합니다.)
  • - 월요일 ~ 금요일 사이에 출고가 진행되며, 토요일과 일요일, 연휴기간에는 배송업무가 없으므로 구매에 참고 바랍니다.
  • - 도서수령일의 경우 제품이 출고된 후 하루에서 이틀정도 추가되며, 배송시간은 안내가 어렵습니다.
해외원서의 경우

국내에서 재고를 보유한 업체가 없는 경우 해외주문을 해야 하는 상황이 생깁니다.
이 경우 4~5주 안에 공급이 가능하며 현지 출판사 사정에 따라 구입이 어려운 경우 2~3주 안에 공지해 드립니다.
# 재고 유무는 주문 전 사이트 상에서 배송 안내 문구로 구분 가능하며, 필요에 따라 전화 문의 주시면 거래처를 통해 다시 한번 국내재고를 확인해 드립니다.

배송비 안내

  • - 25,000원 이상 구매시 무료배송 (결제금액이 25,000원 미만일 경우 2,500원의 배송료가 자동으로 추가됩니다.
  • - 반품/취소.환불 시 배송비는 최소 무료 배송이 되었을 경우, 처음 발생한 배송비까지 소급 적용될 수 있으며, 상품 하자로 인한 도서 교환시에는 무료로 가능합니다.

반품안내

전자상거래에 의한 소비자보호에 관한 법률에 의거 반품 가능 기간내에는 반품을 요청하실 수 있습니다.

반품가능기간
  • - 단순변심 : 물품 수령 후 14일 이내 (단, 고객님의 요청으로 주문된 해외원서 제외)
교환이나 반품, 환불이 가능한 경우
  • - 주문하신 것과 다른 상품을 받으신 경우
  • - 파본인 상품을 받으신 경우
  • - 배송과정에서 손상된 상품을 받으신 경우
교환이나 반품, 환불이 불가능한 경우
  • - 개봉된 DVD, CD-ROM, 카세트테이프 (단, 배송 중 파손된 상품 제외)
  • - 탐독의 흔적이 있는 경우
  • - 소비자의 실수로 상품이 훼손된 경우
  • - 고객님의 주문으로 수입된 해외 도서인 경우
  • - 수령일로 14일 지난 상품의 경우

반품절차

3일 이내에 알려주세요.
  • - 책을 받으신 3일 이내에 고객센터 031-943-1888 혹은 1:1 문의게시판을 통해 반품의사를 알려주세요.
  • - 도서명과 환불 계좌를 알려주시면 빠른 처리 가능합니다.
  • - 도서는 택배 또는 등기우편으로 보내주시기 바랍니다.
참고
  • - 14일 이내에 교환/반품/환불 받으실 상품이 회수되어야 하며, 반품과 환불의 경우 상품주문시 면제받으셨던 배송비와 반품배송비까지 고객님께서 부담하시게 됩니다.
반품주소

(10881) 경기도 파주시 회동길 338 (서패동 474-1) 군자출판사빌딩 4층

환불방법
  • - 카드결제 시 카드 승인취소절차를 밟게 되며 무통장입금시 현금 환불 혹은 적립금으로 변환 가능합니다.
  • - 반품도서와 함께 주문번호와 환불계좌번호를 알려주시면 빠른 처리 가능합니다.
Total 0
List
No 제목 글쓴이 등록일 상태
상품문의 작성

이 분야의 베스트도서

이 분야의 베스트원서

이 분야의 신간도서