Do No Harm. Matthew Webster

Чтение книги онлайн.

Читать онлайн книгу Do No Harm - Matthew Webster страница 21

Do No Harm - Matthew Webster

Скачать книгу

and human logic flaws are discovered. While tools are used, there is a human aspect to the assessment process.

      Software development has shifted considerably over the years. What is common now is an iterative approach to software development known as scrum. Many years ago, software was only created in versions. The first version was 1.0. Bug fixes could take it to 1.01. while minor revisions could take the software to 1.1. Larger revisions would go to 2.0. While versioning is still common and highly practiced, when it comes to the cloud aspects of development, an iterative model is much more common. Iterative means the product continually improves as part of the Software-as-a-Service. It is also a good business practice to ensure you continually evolve to meet the client's needs. The challenge here is for that development to be continually secure—assuming the software was secure to begin with. It takes time to perform the aforementioned penetration tests. Given that updates can now occur multiple times a day, it is a challenge for security to keep up.

      Wireless

      There are multiple types of wireless connections for medical devices. The full range of wireless connectivity includes Wi-Fi, near-field communications (NFC), cellular, Bluetooth, and occasionally RFID. All have their strengths and weaknesses—especially when you consider the potential 20-year life span.

      Wi-Fi is particularly attractive for many of the remote monitoring capabilities built into connected medical devices. There is an easy bridge to the internet, which means the system can be monitored in the cloud (more on the cloud in a while). From there, hospitals, doctors, and patients can be alerted in a moment's notice if there are any issues. As a result of COVID-19, the wireless technologies are gaining in popularity—especially as they relate to telemedicine. They are also important for some hospitals that have rooms that block cellular service (as a byproduct of blocking other systems).

      The SweynTooth family of vulnerabilities was linked in part to manufacturers of microchips. Think of a microchip as a tiny part of a motherboard. This means that the fault may not be with the makers of the motherboards, but with some of companies that help with subcomponents of the motherboards. The challenges from a security standpoint are widespread to say the least.

Скачать книгу