Do No Harm. Matthew Webster

Чтение книги онлайн.

Читать онлайн книгу Do No Harm - Matthew Webster страница 22

Do No Harm - Matthew Webster

Скачать книгу

result, it has a very unique place within the arena of connected medical devices. Some of the applications of NFC include logical access to medical information, Intelligent ID bracelets, tagging of medications, physical access, and so on.28 The tagged ID bracelets and other such items do not store medical information. That reduces the risk considerably, which is a good thing because there is no authentication within NFC. The risks concerning NFC generally are around two devices in active mode—where information can be transferred. For many uses, NFC is typically in passive mode for tagging purposes. While it is a huge help for hospitals, from a connected medical device perspective, the risks tend to be lower, but not zero. For example, in 2019, Android devices had an NFC vulnerability that exposed the devices to malware attacks and, worse, privilege escalation (which means anyone can do almost anything to the device).29 In most settings this is not a huge risk, but if you had a device that uses NFC, that could be a risk to all the other systems the device was connected to. In some environments, this includes protected health information.

      Wired Connections

      The Cloud

      Twenty years ago, most companies had their own electronic infrastructure to store, process, and transmit information. They had independent servers that had a one-to-one relationship to the operating system. Later, virtualized operating systems hit the scene, so many servers could be on one system. Now, due to business advantages, many companies utilize cloud services for the same purpose. In the cloud, systems are divided virtually and logically in cloud environments. The economics of scale within the cloud make a great deal of sense for many companies due to a principle known as elasticity. This means that systems can spin up and down both servers and can add and/or remove compute power to meet immediate demands. While traditional systems have virtualization technology, what most virtualization technology accomplishes is the ease of scalability. Traditional systems have to purchase the computing power, storage, and memory maximum that are required. With the cloud, these maximums do not need to be purchased. In the end, for companies who need this kind of elasticity, the cloud makes perfect sense. Cloud has proven a lifesaver for companies that have had to shut down or reduce their footprint due to COVID-19. They don't have expensive equipment to power, thus saving money that is not possible with traditional infrastructure. They do not have to pay for processing power—only storage for keeping their virtualized systems powered down, which is a huge cost savings.

      The reason this is important to consider is that companies often store the information related to the connected medical devices in those buckets—often without the knowledge of the end users of those systems. All a physician cares about is ensuring their system works properly when they need it to. They are operating under the assumption the host company is doing the security properly.

      While AWS is the focus of this discussion, most of the major cloud providers have their own versions of the AWS S3 buckets. Since AWS is the largest player in the market (and one of the most mature of the cloud players), it is used by many and thus these issues are more prevalent. As the other cloud providers become more prevalent, these issues will pop up. There are numerous articles about some of their competitors.

      Another cloud native technology that is a challenge for some businesses is the portal to the clouds themselves. Think of that portal as an administrative gateway that provides full access to one or more virtual data centers. That access includes all cloud native infrastructure, and now, quite often, virtual computers used by everyday corporate employees.

Скачать книгу