Do No Harm. Matthew Webster

Чтение книги онлайн.

Читать онлайн книгу Do No Harm - Matthew Webster страница 25

Do No Harm - Matthew Webster

Скачать книгу

style="font-size:15px;">      22 22 Jefferson B. Sessions II, 2018, https://www.wyden.senate.gov/imo/media/doc/08212018%20RW%20Stingray%20Jamming%20Letter%20to%20DOJ.pdf.

      23 23 Zack Whittaker, “New flaws in 4G, 5G allow attackers to intercept calls and track phone locations,” 2019, https://techcrunch.com/2019/02/24/new-4g-5g-security-flaws/.

      24 24 Wikipedia, https://en.wikipedia.org/wiki/Bluetooth, accessed October 24, 2020.

      25 25 “Common Vulnerabilities Exposures,” https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=Bluetooth, accessed October 24, 2020.

      26 26 “FDA News Release FDA Informs Patients, Providers and Manufacturers About Potential Cybersecurity Vulnerabilities in Certain Medical Devices with Bluetooth Low Energy,” March 3, 2020, https://www.fda.gov/news-events/press-announcements/fda-informs-patients-providers-and-manufacturers-about-potential-cybersecurity-vulnerabilities-0.

      27 27 Ibid.

      28 28 Cristina Ardila, “Six Ways NFC Helps Healthcare,” 2015, https://www.nxp.com/company/blog/six-ways-nfc-helps-healthcare:BL-6-WAYS-NFC-HELPS-HEALTHCARE.

      29 29 Zak Doffman, “New Google Android Threat: NFC Exposes Devices To Malware Attack—Update Settings Now,” 2019, https://www.forbes.com/sites/zakdoffman/2019/11/02/new-android-threat-contactless-payment-technology-open-to-attackchange-your-settings/#4ed6ccf45cde.

      30 30 Marc Laliberte, “How data breaches forced Amazon to update S3 bucket security,” 2019, https://www.helpnetsecurity.com/2019/09/23/s3-bucket-security/.

      31 31 Truffle Bot, “An API Worm In The Making: Thousands of Secrets Found In Open S3 Buckets,” 2020, https://trufflesecurity.com/blog/an-s3-bucket-worm-in-the-making-thousands-of-secrets-found-in-open-s3-buckets.

      32 32 Spencer Gietzen, “S3 Ransomware Part 1: Attack Vector,” https://rhinosecuritylabs.com/aws/s3-ransomware-part-1-attack-vector/.

      33 33 HyTrust, “HyTrust Cloud Survey Finds 25% of Healthcare Organizations Are Putting Patient Data at Risk in the Public Cloud,” February 15, 2017, https://www.hytrust.com/news-item/hytrust-cloud-survey-finds-quarter-healthcare-orgs-putting-patient-data-risk/.

      34 34 Marianne Kolbasuk McGee, “Attack on Billing Vendor Results in Massive Breach: Atrium Health Says Attack on Accudoc Affected 2.65 Million Individuals,” 2018, https://www.bankinfosecurity.com/attack-on-billing-vendor-results-in-massive-breach-a-11740.

      35 35 Nick G., “35 Outrageous Hacking Statistics & Predictions [2020 Update],” accessed October 24, 2020, https://review42.com/hacking-statistics/#:~:text=The%20cost%20of%20a%20data,high-risk%20apps%20in%202018.

      36 36 “Unprecedented privacy risk with popular health apps: Clinicians and consumers warned of privacy risks,” University of Sydney, 2019, https://www.sciencedaily.com/releases/2019/03/190321092207.htm.

      37 37 Marianne Kolbasuk McGee, “Patient Monitoring Software Vulnerabilities Identified Philips and DHS Issue Advisories; Mitigation Tips Offered,” 2020, https://www.databreachtoday.com/patient-monitoring-software-vulnerabilities-identified-a-14991.

      38 38 Ibid.

      39 39 Kate Fazzini, “FDA issues cybersecurity warning on GE medical equipment that monitors patients,” 2020, https://www.cnbc.com/2020/01/23/fda-issues-cybersecurity-warning-on-ge-medical-equipment-that-monitors-patients.html.

      40 40 GE Healthcare Product Security Portal, accessed October 12, 2020, https://www.gehealthcare.com/security.

       The price of light is less than the cost of darkness.

      —Arthur C. Nielsen, Market Researcher & Founder of ACNielsen

      In the last few years, we have seen an explosion of data unlike anything in history. Most of that data is in electronic format, meaning that it is more accessible than ever before. On one level it has provided us with an opportunity to not only advance our scientific (and medical) understanding, but it has allowed us to apply new technologies such as artificial intelligence to further our understanding faster and more thoroughly.

      That data has a dark side and a cost, however, as the data is dispersed in more directions than most people are aware of. With modern technology and data analysis, it is becoming easier to link people to data that is supposedly anonymous. There are tremendous

Скачать книгу