References
- CraigenDDiakun-ThibaultNPurseRDefining CybersecurityTechnology Innovation Management Review20144101321
- Critical Infrastructure ProtectionCybersecurity and Critical Infrastructure ProtectionLewis JA2006 Available from: http://cip.management.dal.ca/publications/Cybersecurity%20and%20Critical%20Infrastructure%20Protection.pdfAccessed June 9, 2015
- SANS InstituteHealth Care Cyberthreat Report: Widespread Compromises Detected, Compliance Nightmare on HorizonFilkins B2014 Available from: http://www.sans.org/reading-room/whitepapers/firewalls/health-care-cyberthreat-report-widespread-compromises-detected-compliance-nightmare-horizon-34735Accessed June 9, 2015
- US Food Drug AdministrationContent of Premarket Submissions for Management of Cybersecurity in Medical DevicesUS Food and Drug Administration2014 Available from: http://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/UCM356190.pdfAccessed June 9, 2015
- US Food Drug AdministrationFDASIA Health IT Report: Proposed Strategy and Recommendations for a Risk-Based FrameworkFDA, FC, ONC2014 Available from: http://www.fda.gov/downloads/AboutFDA/CentersOffices/OfficeofMedicalProductsandTobacco/CDRH/CDRHReports/UCM391521.pdfAccessed June 9, 2015
- US Food and Drug Administration [homepage on the Internet]MDDS RuleFDA Federal Register2011 (76 FR 8637). Available from: http://www.fda.gov/MedicalDevices/ProductsandMedicalProcedures/GeneralHospitalDevicesandSupplies/MedicalDeviceDataSystems/ucm251897.htmAccessed June
- US Food and Drug Administration [homepage on the Internet]Is The Product A Medical Device?FDA2014 Available from: http://www.fda.gov/medicaldevices/deviceregulationandguidance/overview/classifyyourdevice/ucm051512.htmAccessed June 9, 2015
- International Medical Device Regulators Forum“Software as a Medical Device”: Possible Framework for Risk Categorization and Corresponding ConsiderationsIMDRF Software as a Medical Device (SaMD) Working Group2014 Available from: http://www.imdrf.org/docs/imdrf/final/technical/imdrf-tech-140918-samd-framework-risk-categorization-141013.pdfAccessed June 9, 2015
- HalperinDHeydt-BenjaminTSRansfordBPacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power DefensesPaper presented at: Security and Privacy, 2008. SP 2008. IEEE SymposiumOakland, California, USAMay 18–22, 2008
- KramerDBBakerMRansfordBSecurity and Privacy Qualities of Medical Devices: An Analysis of FDA Postmarket SurveillancePLoS One201277e4020022829874
- MaiselWHKohnoTImproving the Security and Privacy of Implantable Medical DevicesN Engl J Med2010362131164116620357279
- KuneDFBackesJClarkSSGhost Talk: Mitigating EMI Signal Injection Attacks against Analog SensorsPaper presented at: Security and Privacy (SP), 2013 IEEE SymposiumSan Francisco, California, USAMay 19–22, 2013
- BurlesonWClarkSSRansfordBFuKDesign challenges for secure implantable medical devicesProceedings of the 49th Annual Design Automation Conference2012San Francisco, CAJune 03–07, 2012
- spectrum.ieee.org [homepage on the Internet]PeckMEMedical devices are vulnerable to hacks, but risk is low overallIEEE Spectrum2011 Available from: http://spectrum.ieee.org/biomedical/devices/medical-devices-are-vulnerable-to-hacks-but-risk-is-low-overallAccessed June 9, 2015
- livesciencecom [homepage on the Internet]LewisTMedical Devices Vulnerable to Hackers, New Report Says. Live Science2013 Available from: http://www.livescience.com/39889-medical-devices-vulnerable-to-hackers.htmlAccessed June 9, 2015
- SeymourDMMedical device security as part of overall risk management. ISC2 Congress Strengthening Cybersecurity Defenders2014 Available from: https://congress.isc2.org/sites/default/files/Session2145-MedicalDeviceSecurityAsPartOverallRiskManagementProcess.pdfAccessed June 9, 2015
- Archimedes Ann Arbor Research Center For Medical Device Security [homepage on the Internet]Improving Medical Device Security2015 Available from: http://secure-medicine.org/Accessed June 9, 2015
- wired.com [homepage on the Internet]ZetterKIt’s Insanely Easy to Hack Hospital Equipment2014 Available from: http://www.wired.com/2014/04/hospital-equipment-vulnerable/Accessed June 9, 2015
- healthcareinfoseuritycom [homepage on the Internet]AndersonHMedical device security raises concerns. Healthcare Info Security2011 Available from: http://www.healthcareinfosecurity.com/medical-device-security-raises-concerns-a-3644Accessed April 11, 2015
- US Federal Bureau of Investigation Cyber DivisionHealth Care Systems and Medical Devices at Risk for Increased Cyber Intrusions for Financial GainFBI Cyber Division Private Industry Notification2014 Available from: https://info.publicintelligence.net/FBI-HealthCareCyberIntrusions.pdfAccessed June 9, 2015
- Coles-KempLWilliamsPAHChanging Places: the Need to Change the Start Point for Information Security DesignElectronic Journal of Health Informatics201482e13
- WilliamsPAWhen trust defies common security senseHealth Informatics Journal200814321122118775827
- RinaldiSMPeerenboomJPKellyTKIdentifying, understanding, and analyzing critical infrastructure interdependenciesControl Systems, IEEE20012161125
- CurfmanGDRedbergRFMedical Devices – Balancing Regulation and InnovationN Engl J Med20113651197597721830959
- KramerDBXuSKesselheimASRegulation of Medical Devices in the United States and European UnionN Engl J Med2012366984885522332952
- Healthcare IT News [homepage on the Internet]MaliardMSafety demands better device integrationHealthcare IT News2013 Available from: http://www.healthcareitnews.com/print/61021Accessed March 31, 2015
- Medical Device and Diagnostic Industry [homepage on the Internet]FDA Guidance on Wireless Devices: What You Need To KnowMDDI2013 Available from: http://www.mddionline.com/article/fda-guidance-wireless-devices-what-you-need-knowAccessed June 9, 2015
- cnet.com [homepage on the Internet]MillsEConficker infected critical hospital equipment, expert saysCNET2009 Available from: http://www.cnet.com/news/conficker-infected-critical-hospital-equipment-expert-says/Accessed June
- KshetriNCybercrime and cybersecurity issues associated with China: some economic and institutional considerationsElectronic Commerce Research20131314169
- LangnerRStuxnet: Dissecting a cyberwarfare weaponSecurity and Privacy, IEEE2011934951
- HampsonNHacktivism, Anonymous and a new breed of protest in a networked worldBoston College International and Comparative Law Review2012356511
- reuters.com [homepage on the Internet]FinkleJUS Government Probes Medical Devices for Possible Cyber FlawsReuters2014 Available from: http://www.reuters.com/article/2014/10/22/us-cybersecurity-medicaldevices-insight-idUSKCN0IB0DQ20141022Accessed June 9, 2015
- spectrum.ieee.org [homepage on the Internet]HsuJFeds Probe Cybersecurity Dangers in Medical DevicesIEEE Spectrum20141 Available from: http://spectrum.ieee.org/tech-talk/biomedical/devices/feds-probe-cybersecurity-dangers-in-medical-devicesAccessed June 9, 2015
- HaffejeeJIrwinBTesting antivirus engines to determine their effectiveness as a security layerPaper presented at: Information Security for South Africa (ISSA); 13th International Information Security for South Africa conferenceJohannesburg, South AfricaAugust 13–14; 2014
- McCauleyVWilliamsPAHTrusted interoperability and the patient safety issues of parasitic health care softwareWilliamsPAH9th Australian Information Security Management ConferencePerthsecau-Security Research Centre, Edith Cowan University2011189194
- healthcareinfoseuritycom [homepage on the Internet]AndersonHVA Addresses medical device securityHealthcare Info Security2011 Available form: http://www.healthcareinfosecurity.com/interviews.php?interviewID=1163Accessed April 11, 2015
- ClarkSSFuKRecent results in computer security for medical devicesInternational ICST Conference on Wireless Mobile Communication and Healthcare (MobiHealth)Kos Island, Kardamena, GreeceOctober 05–07, 2011
- Deloitte Center for Health SolutionsNetworked Medical Device Cyber Security on Patient Safety: Perspectives of Healthcare Information Cybersecurity Executives201316 http://www2.deloitte.com/content/dam/Deloitte/us/Documents/risk/us-risk-networked-medical-device-11102014.pdfAccessed March 1, 2015
- DarkMThinking about CybersecuritySecurity and Privacy, IEEE20151316165
- WhitmanMMattordHManagement of Information Security3rd edBoston, MassCourse Technology, Cengage Learning2010
- US Food Drug AdministrationUnderstanding Barriers to Medical Device QualityFDA2011 Available from: http://www.fda.gov/downloads/AboutFDA/CentersOffices/CDRH/CDRHReports/UCM277323.pdfAccessed April 11, 2015