Do No Harm. Matthew Webster

Чтение книги онлайн.

Читать онлайн книгу Do No Harm - Matthew Webster страница 20

Do No Harm - Matthew Webster

Скачать книгу

the internet on the Eastern seaboard of the United States. A DDOS attack is caused when hundreds or thousands of IoT devices are compromised and then used to point internet traffic at one or more sources. In this case the hackers used the malware that, once it took over devices, then removed other pieces of malware that may be infecting the device so they could claim the device for themselves. All it took was to look for internet-exposed IoT devices to pull off the attack, along with a little ingenuity. In this case, the code had 61 usernames and passwords, which allowed the attackers to compromise devices such as cameras, home routers, and baby monitors. All of the devices were using a stripped-down version of the Linux operating systems, which the malware was looking for.15 These were just a few kids who had no intention of causing the extreme problems they did.

      While this story is not directly related to IoMT, it is indirectly related and serves as a strong cautionary tale. The security of these random internet-connected devices is very important. Lack of security can cause severe problems. The reality is governments and organized crime took note of what was going on. IoT was hitting center stage, and variants of Mirai were created after the fact—just looking for vulnerable devices to compromise.

      It may seem that 2017 was not that long ago, but from a technology perspective it was. Since then, the FDA has enacted new rules to help protect medical devices. Understanding that challenge, though, requires an understanding of the technology—the subject of the next section.

      Security and technology go hand in hand. To understand the security risks within the IoMT, it really helps to understand the technology. Because this book is aimed at a general audience and not a technical one, we are only going to go deep enough to explain what the general issues are from a security standpoint. Please keep in mind much of what is discussed here is not true across the entire spectrum of medical devices. Each piece of technology has its own specific applicability.

      Part of the reason it is so important to define what medical devices are is that it helps to determine what kinds of technology are built into the devices. Just as there is no one-size-fits-all in the medical device world, that is true for IoMT as well. Any generalizations made here are not meant to be applicable across the whole spectrum of IoMTs.

      Electronic Boards

      Operating Systems

      Software Development

      Secure software development is arguably one of the more important controls in information security—especially if data is accessed through that software. If you have a poorly written application, it can mean the difference between securing the data and not securing the data. The challenge with software development is that there can be ten ways, all legitimate, of accomplishing the same control. In many other parts of information technology, there is a button to press and you are done. From a historical perspective, there are some cultural challenges.

      Typically, developers use something called the software development lifecycle (SDLC). The SDLC includes methods of eliminating the various problems. These include peer review, unit testing, line testing, and a host of other techniques. What is missing from the SDLC processes of less mature organizations (from a security standpoint) is security. Depending on when and where you went to school, security may or may not have been a consideration. Oftentimes, it is up to organizations to train developers about security.

      Training developers on security can be a little like herding cats. Doing it right means you have to have several things in place. First, you need a set of guidelines and security standards for the team to follow. Just right-sizing the amount of information to provide the developers can be a daunting task for organizations. Providing too much information means it will not be retained right away. Not providing enough means other challenges for the organizations.

      Another aspect of a good coding environment is tooling. There are fantastic tools on the market that can detect problems before the product goes into production, and using them in the right way is one way to reduce the risks to the organization. However, the tools do have blind spots when it comes to human logic flaws. It is not something these kinds of applications are good at, and thus penetration tests are critical to the final product being secure. A penetration

Скачать книгу