Manufacturers must improve the security features of these devices, making them more difficult for hackers to break into. And there needs to be close coordination between the manufacturers and healthcare providers to further enhance security. Also, hospitals and medical facilities must make sure that all the software running these devices is up-to-date and any updates have been installed. Finally, these devices must be blocked from Internet access. Answer the following questions in a Microsoft® Word document and save the file on your computer with your last name in the file. (Example: module_05_case1_Jones.doc) 1. What are three examples of devices that could be attacked by computer viruses? 2. What are the risks related to using electronic health records in hospitals and medical facilities? 3. What are three pieces of advice for reducing the risk associated with using these devices?

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

I attached pictures of my homework

Medical devices that are controlled by computer software- from heart monitors and pacemakers to mammogram and X-ray machines-are new targets for computer
viruses and malware. This could put patients at risk, although no injuries or deaths have been reported so far. A recent survey reveals some interesting facts:
• The global market for medical device technologies is expected to exceed $674 billion by 2022.
• Connected medical devices, also called Internet of Medical Things (loMT), are becoming a key part of healthcare infrastructure, with the average hospital room
containing nearly 15-20 of them.
• The number of loMT devices in a hospital can be more than twice the number of traditional networked devices, such as laptops and smartphones.
• 18 percent of providers reported that their medical devices were affected by malware or ransomware.
The U.S. Food and Drug Administration (FDA) is warning the manufacturers of medical devices about the problem and is requesting them to review the parts of their
security plans that are related to these devices when they seek approval from the government agency. In October 2016, Johnson & Johnson warned patients that use its
insulin pumps to exercise caution, as it had learned of a security vulnerability that a hacker could exploit to overdose diabetic patients with insulin, although the risk is low.
A Department of Veterans Affairs (VA) report has shown that 327 devices at VA hospitals have been infected by malware since 2009. In January 2010, a VA
catheterization laboratory was temporarily closed due to infected computer equipment that is used to open blocked arteries. And in a case at a private Boston Hospital,
computer viruses exposed sensitive patient data by sending it to outside servers. The increased applications of electronic record systems as a part of the 2009 stimulus
package is adding to this risk. In addition to privacy issues, hackers can change patients' medical records and treatment plans. If the system does not have a strong login
access, some patients can access a system and alter their own medications, such as those taking narcotic substances. Hackers could use Shodan, a search engine for
locating Internet-connected devices, using terms such as "radiology" and "X-ray."
Transcribed Image Text:Medical devices that are controlled by computer software- from heart monitors and pacemakers to mammogram and X-ray machines-are new targets for computer viruses and malware. This could put patients at risk, although no injuries or deaths have been reported so far. A recent survey reveals some interesting facts: • The global market for medical device technologies is expected to exceed $674 billion by 2022. • Connected medical devices, also called Internet of Medical Things (loMT), are becoming a key part of healthcare infrastructure, with the average hospital room containing nearly 15-20 of them. • The number of loMT devices in a hospital can be more than twice the number of traditional networked devices, such as laptops and smartphones. • 18 percent of providers reported that their medical devices were affected by malware or ransomware. The U.S. Food and Drug Administration (FDA) is warning the manufacturers of medical devices about the problem and is requesting them to review the parts of their security plans that are related to these devices when they seek approval from the government agency. In October 2016, Johnson & Johnson warned patients that use its insulin pumps to exercise caution, as it had learned of a security vulnerability that a hacker could exploit to overdose diabetic patients with insulin, although the risk is low. A Department of Veterans Affairs (VA) report has shown that 327 devices at VA hospitals have been infected by malware since 2009. In January 2010, a VA catheterization laboratory was temporarily closed due to infected computer equipment that is used to open blocked arteries. And in a case at a private Boston Hospital, computer viruses exposed sensitive patient data by sending it to outside servers. The increased applications of electronic record systems as a part of the 2009 stimulus package is adding to this risk. In addition to privacy issues, hackers can change patients' medical records and treatment plans. If the system does not have a strong login access, some patients can access a system and alter their own medications, such as those taking narcotic substances. Hackers could use Shodan, a search engine for locating Internet-connected devices, using terms such as "radiology" and "X-ray."
Manufacturers must improve the security features of these devices, making them more difficult for hackers to break into. And there needs to be close coordination
between the manufacturers and healthcare providers to further enhance security. Also, hospitals and medical facilities must make sure that all the software running these
devices is up-to-date and any updates have been installed. Finally, these devices must be blocked from Internet access.
Answer the following questions in a Microsoft® Word document and save the file on your computer with your last name in the file. (Example:
module_05_case1_Jones.doc)
1. What are three examples of devices that could be attacked by computer viruses?
2. What are the risks related to using electronic health records in hospitals and medical facilities?
3. What are three pieces of advice for reducing the risk associated with using these devices?
Transcribed Image Text:Manufacturers must improve the security features of these devices, making them more difficult for hackers to break into. And there needs to be close coordination between the manufacturers and healthcare providers to further enhance security. Also, hospitals and medical facilities must make sure that all the software running these devices is up-to-date and any updates have been installed. Finally, these devices must be blocked from Internet access. Answer the following questions in a Microsoft® Word document and save the file on your computer with your last name in the file. (Example: module_05_case1_Jones.doc) 1. What are three examples of devices that could be attacked by computer viruses? 2. What are the risks related to using electronic health records in hospitals and medical facilities? 3. What are three pieces of advice for reducing the risk associated with using these devices?
Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Threats
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education