Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cybersecurity for Hospitals and Heal...
~
SpringerLink (Online service)
Cybersecurity for Hospitals and Healthcare Facilities = A Guide to Detection and Prevention /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Cybersecurity for Hospitals and Healthcare Facilities/ by Luis Ayala.
Reminder of title:
A Guide to Detection and Prevention /
Author:
Ayala, Luis.
Description:
XXIII, 129 p. 7 illus., 6 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Data protection. -
Online resource:
https://doi.org/10.1007/978-1-4842-2155-6
ISBN:
9781484221556
Cybersecurity for Hospitals and Healthcare Facilities = A Guide to Detection and Prevention /
Ayala, Luis.
Cybersecurity for Hospitals and Healthcare Facilities
A Guide to Detection and Prevention /[electronic resource] :by Luis Ayala. - 1st ed. 2016. - XXIII, 129 p. 7 illus., 6 illus. in color.online resource.
Chapter 1: Hacker Reconnaissance of a Hospital Network -- Chapter 2: How Hackers Gain Access to a Hospital Network -- Chapter 3: Active Medical Device Cyber-Attacks -- Chapter 4: Medical Facility Cyber-Physical Attacks -- Chapter 5: Hospital Insider Threat -- Chapter 6: Detection of Cyber-Attacks -- Chapter 7: Preventing Cyber-Attacks -- Chapter 8: Cyber-Attack Response and Recovery Planning -- Chapter 9: Appendix. Cyber-Attack Response Procedures Template -- .
Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support equipment on which lives depend. News reports inform us how hackers strike hospitals with ransomware that prevents staff from accessing patient records or scheduling appointments. Unfortunately, medical equipment also can be hacked and shut down remotely as a form of extortion. Criminal hackers will not ask for a $500 payment to unlock an MRI, PET or CT scan, or X-ray machine—they will ask for much more. Litigation is bound to follow and the resulting punitive awards will drive up hospital insurance costs and healthcare costs in general. This will undoubtedly result in increased regulations for hospitals and higher costs for compliance. Unless hospitals and other healthcare facilities take the steps necessary to secure their medical-grade networks, they will be targeted for cyber-physical attack, possibly with life-threatening consequences. Cybersecurity for Hospitals and Healthcare Facilities is a wake-up call explaining what hackers can do, why hackers would target a hospital, the way hackers research a target, ways hackers can gain access to a medical-grade network (cyber-attack vectors), and ways hackers hope to monetize their cyber-attack. By understanding and detecting the threats, hospital administrators can take action now—before their hospital becomes the next victim. This book shows you how to: Determine how vulnerable hospital and healthcare building equipment is to cyber-physical attack. Identify possible ways hackers can hack hospital and healthcare facility equipment. Recognize the cyber-attack vectors—or paths by which a hacker or cracker can gain access to a computer, a medical-grade network server, or expensive medical equipment in order to deliver a payload or malicious outcome. Detect and prevent man-in-the-middle or denial-of-service cyber-attacks. Detect and prevent hacking of the hospital database and hospital web application.
ISBN: 9781484221556
Standard No.: 10.1007/978-1-4842-2155-6doiSubjects--Topical Terms:
557764
Data protection.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Cybersecurity for Hospitals and Healthcare Facilities = A Guide to Detection and Prevention /
LDR
:04037nam a22003855i 4500
001
974817
003
DE-He213
005
20200702092811.0
007
cr nn 008mamaa
008
201211s2016 xxu| s |||| 0|eng d
020
$a
9781484221556
$9
978-1-4842-2155-6
024
7
$a
10.1007/978-1-4842-2155-6
$2
doi
035
$a
978-1-4842-2155-6
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Ayala, Luis.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1110923
245
1 0
$a
Cybersecurity for Hospitals and Healthcare Facilities
$h
[electronic resource] :
$b
A Guide to Detection and Prevention /
$c
by Luis Ayala.
250
$a
1st ed. 2016.
264
1
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2016.
300
$a
XXIII, 129 p. 7 illus., 6 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Chapter 1: Hacker Reconnaissance of a Hospital Network -- Chapter 2: How Hackers Gain Access to a Hospital Network -- Chapter 3: Active Medical Device Cyber-Attacks -- Chapter 4: Medical Facility Cyber-Physical Attacks -- Chapter 5: Hospital Insider Threat -- Chapter 6: Detection of Cyber-Attacks -- Chapter 7: Preventing Cyber-Attacks -- Chapter 8: Cyber-Attack Response and Recovery Planning -- Chapter 9: Appendix. Cyber-Attack Response Procedures Template -- .
520
$a
Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support equipment on which lives depend. News reports inform us how hackers strike hospitals with ransomware that prevents staff from accessing patient records or scheduling appointments. Unfortunately, medical equipment also can be hacked and shut down remotely as a form of extortion. Criminal hackers will not ask for a $500 payment to unlock an MRI, PET or CT scan, or X-ray machine—they will ask for much more. Litigation is bound to follow and the resulting punitive awards will drive up hospital insurance costs and healthcare costs in general. This will undoubtedly result in increased regulations for hospitals and higher costs for compliance. Unless hospitals and other healthcare facilities take the steps necessary to secure their medical-grade networks, they will be targeted for cyber-physical attack, possibly with life-threatening consequences. Cybersecurity for Hospitals and Healthcare Facilities is a wake-up call explaining what hackers can do, why hackers would target a hospital, the way hackers research a target, ways hackers can gain access to a medical-grade network (cyber-attack vectors), and ways hackers hope to monetize their cyber-attack. By understanding and detecting the threats, hospital administrators can take action now—before their hospital becomes the next victim. This book shows you how to: Determine how vulnerable hospital and healthcare building equipment is to cyber-physical attack. Identify possible ways hackers can hack hospital and healthcare facility equipment. Recognize the cyber-attack vectors—or paths by which a hacker or cracker can gain access to a computer, a medical-grade network server, or expensive medical equipment in order to deliver a payload or malicious outcome. Detect and prevent man-in-the-middle or denial-of-service cyber-attacks. Detect and prevent hacking of the hospital database and hospital web application.
650
0
$a
Data protection.
$3
557764
650
0
$a
Computer security.
$3
557122
650
0
$2
lc
$a
Operating systems (Computers).
$3
868175
650
1 4
$a
Security.
$3
1114130
650
2 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Operating Systems.
$3
669804
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9781484221549
776
0 8
$i
Printed edition:
$z
9781484221563
856
4 0
$u
https://doi.org/10.1007/978-1-4842-2155-6
912
$a
ZDB-2-CWD
912
$a
ZDB-2-SXPC
950
$a
Professional and Applied Computing (SpringerNature-12059)
950
$a
Professional and Applied Computing (R0) (SpringerNature-43716)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login