SlideShare a Scribd company logo
1 of 1
Download to read offline
NIST Tech Beat for January 7, 2015
Cybersecurity Center Invites Feedback on Securing Medical Devices
Hospitals are increasingly using networked technology to improve the accuracy and efficiency of medical care by
connecting medical devices to a central system. A networked infusion pump—a device used to convey fluids, drugs and
nutrients into a patient’s bloodstream—can allow centralized control of the device’s programming as well as automated
cross checks against pharmacy records and patient data to ensure the right dose of fluids or medication are delivered at
the right time to the right patient. But these connected devices can introduce new risks in safety and security compared
with stand-alone devices.
To address the cybersecurity challenges of wireless infusion pumps, the National Cybersecurity Center of Excellence
(NCCoE) is inviting comments on a draft project to secure those devices. The challenges include vulnerabilities to
malware or hacking and access control.
The effort is a collaboration between the NCCoE at the National Institute of Standards and Technology and the
Technological Leadership Institute (TLI) at the University of Minnesota. Minnesota-based providers of services,
manufacturers and medical device industry associations helped to draft a use case, which provides a technical
description of the challenge of securing the devices and describes desired characteristics for solutions.
“This is the first medical device project for the National Cybersecurity Center of Excellence, and our second focused on
the healthcare sector,” says Nate Lesser, deputy director of the NCCoE. “Working with the Technological Leadership
Institute and the medical device community helped us identify this challenge and we look forward to continued
collaboration."
The draft use case identifies the people and systems that interact with infusion pumps, defines their interactions,
performs a risk assessment, identifies applicable security technologies and provides an example method or
implementation to secure the system.
After the use case is finalized, the NCCoE will invite organizations to participate in developing a practice guide, or a
collection of the materials and information needed to deploy an example solution of off-the-shelf products that address
the technical security problems. The guide will describe the hardware, software and configurations the project used to
address the issues presented in this use case so that others can replicate the approach.
The NCCoE works with industry, academic and government experts to find practical solutions for businesses’ most
pressing cybersecurity needs. The center was established in 2012 with the state of Maryland and Montgomery County,
Md. In 2014, MITRE Corp. was awarded a contract to support the center as a federally funded research and
development center, the first dedicated to cybersecurity.
The wireless infusion pump use case can be found on the NCCoE website. Comments should be submitted by Jan. 18,
2015.
Media Contact: Jennifer Huergo, jennifer.huergo@nist.gov, 301-975-6343

More Related Content

What's hot

Research/thesis poster
Research/thesis posterResearch/thesis poster
Research/thesis posterPavanPardeshi1
 
Table of Content - International Journal of Managing Information Technology (...
Table of Content - International Journal of Managing Information Technology (...Table of Content - International Journal of Managing Information Technology (...
Table of Content - International Journal of Managing Information Technology (...IJMIT JOURNAL
 
Supporting a Collaborative R&D Organization with a Dynamic Big Data Solution
Supporting a Collaborative R&D Organization with a Dynamic Big Data SolutionSupporting a Collaborative R&D Organization with a Dynamic Big Data Solution
Supporting a Collaborative R&D Organization with a Dynamic Big Data SolutionSaama
 
The role of the FAIR Guiding Principles in a Learning Health System
The role of the FAIR Guiding Principles in a Learning Health SystemThe role of the FAIR Guiding Principles in a Learning Health System
The role of the FAIR Guiding Principles in a Learning Health SystemMichel Dumontier
 
How data science can be used to break down the interoperability problem
How data science can be used to break down the interoperability problem How data science can be used to break down the interoperability problem
How data science can be used to break down the interoperability problem GlobalTechCouncil
 
KAMAS Health 2.0 Presentation
KAMAS Health 2.0 PresentationKAMAS Health 2.0 Presentation
KAMAS Health 2.0 Presentationatduskgreg
 
Conceptual Architecture for USDA and NSF Terrestrial Observation Network Inte...
Conceptual Architecture for USDA and NSF Terrestrial Observation Network Inte...Conceptual Architecture for USDA and NSF Terrestrial Observation Network Inte...
Conceptual Architecture for USDA and NSF Terrestrial Observation Network Inte...Brian Wee
 
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...Rihab Rahman
 
Big Data becomes Big Analysis
Big Data becomes Big Analysis Big Data becomes Big Analysis
Big Data becomes Big Analysis OSTHUS
 
Tutorial ESWC2011 Building Semantic Sensor Web - 01 - Introduction
Tutorial ESWC2011 Building Semantic Sensor Web - 01 - IntroductionTutorial ESWC2011 Building Semantic Sensor Web - 01 - Introduction
Tutorial ESWC2011 Building Semantic Sensor Web - 01 - IntroductionJean-Paul Calbimonte
 
Actsi bip overview jan 2011
Actsi bip overview jan 2011Actsi bip overview jan 2011
Actsi bip overview jan 2011Joel Saltz
 
Pistoia Alliance US Conference 2015 - 1.3.4 New member introductions - Genexyx
Pistoia Alliance US Conference 2015 - 1.3.4 New member introductions - GenexyxPistoia Alliance US Conference 2015 - 1.3.4 New member introductions - Genexyx
Pistoia Alliance US Conference 2015 - 1.3.4 New member introductions - GenexyxPistoia Alliance
 
Data lifecycle mgt across the enterprise
Data lifecycle mgt across the enterpriseData lifecycle mgt across the enterprise
Data lifecycle mgt across the enterpriseOSTHUS
 
OTN Gambia 2008
OTN Gambia 2008OTN Gambia 2008
OTN Gambia 2008Greg Fegan
 
Big data adoption: State of the art and Research challenges
Big data adoption: State of the art and Research challengesBig data adoption: State of the art and Research challenges
Big data adoption: State of the art and Research challengesNurul Mahfuz
 
From allotrope to reference master data management
From allotrope to reference master data management From allotrope to reference master data management
From allotrope to reference master data management OSTHUS
 

What's hot (20)

Research/thesis poster
Research/thesis posterResearch/thesis poster
Research/thesis poster
 
Table of Content - International Journal of Managing Information Technology (...
Table of Content - International Journal of Managing Information Technology (...Table of Content - International Journal of Managing Information Technology (...
Table of Content - International Journal of Managing Information Technology (...
 
2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit2015 iHT2 Health IT Beverly Hills Summit
2015 iHT2 Health IT Beverly Hills Summit
 
Supporting a Collaborative R&D Organization with a Dynamic Big Data Solution
Supporting a Collaborative R&D Organization with a Dynamic Big Data SolutionSupporting a Collaborative R&D Organization with a Dynamic Big Data Solution
Supporting a Collaborative R&D Organization with a Dynamic Big Data Solution
 
The role of the FAIR Guiding Principles in a Learning Health System
The role of the FAIR Guiding Principles in a Learning Health SystemThe role of the FAIR Guiding Principles in a Learning Health System
The role of the FAIR Guiding Principles in a Learning Health System
 
How data science can be used to break down the interoperability problem
How data science can be used to break down the interoperability problem How data science can be used to break down the interoperability problem
How data science can be used to break down the interoperability problem
 
KAMAS Health 2.0 Presentation
KAMAS Health 2.0 PresentationKAMAS Health 2.0 Presentation
KAMAS Health 2.0 Presentation
 
CVDI Benefits
CVDI BenefitsCVDI Benefits
CVDI Benefits
 
Conceptual Architecture for USDA and NSF Terrestrial Observation Network Inte...
Conceptual Architecture for USDA and NSF Terrestrial Observation Network Inte...Conceptual Architecture for USDA and NSF Terrestrial Observation Network Inte...
Conceptual Architecture for USDA and NSF Terrestrial Observation Network Inte...
 
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
Study on Cyber Security:Establishing a Sustainable Cyber Security Framework f...
 
Ashley Schramm Resume
Ashley Schramm ResumeAshley Schramm Resume
Ashley Schramm Resume
 
Big Data becomes Big Analysis
Big Data becomes Big Analysis Big Data becomes Big Analysis
Big Data becomes Big Analysis
 
Tutorial ESWC2011 Building Semantic Sensor Web - 01 - Introduction
Tutorial ESWC2011 Building Semantic Sensor Web - 01 - IntroductionTutorial ESWC2011 Building Semantic Sensor Web - 01 - Introduction
Tutorial ESWC2011 Building Semantic Sensor Web - 01 - Introduction
 
2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit2016 iHT2 San Diego Health IT Summit
2016 iHT2 San Diego Health IT Summit
 
Actsi bip overview jan 2011
Actsi bip overview jan 2011Actsi bip overview jan 2011
Actsi bip overview jan 2011
 
Pistoia Alliance US Conference 2015 - 1.3.4 New member introductions - Genexyx
Pistoia Alliance US Conference 2015 - 1.3.4 New member introductions - GenexyxPistoia Alliance US Conference 2015 - 1.3.4 New member introductions - Genexyx
Pistoia Alliance US Conference 2015 - 1.3.4 New member introductions - Genexyx
 
Data lifecycle mgt across the enterprise
Data lifecycle mgt across the enterpriseData lifecycle mgt across the enterprise
Data lifecycle mgt across the enterprise
 
OTN Gambia 2008
OTN Gambia 2008OTN Gambia 2008
OTN Gambia 2008
 
Big data adoption: State of the art and Research challenges
Big data adoption: State of the art and Research challengesBig data adoption: State of the art and Research challenges
Big data adoption: State of the art and Research challenges
 
From allotrope to reference master data management
From allotrope to reference master data management From allotrope to reference master data management
From allotrope to reference master data management
 

Similar to Nist tech beat for january 7, 2015

Acus intel medical_devices
Acus intel medical_devicesAcus intel medical_devices
Acus intel medical_devicesatlanticcouncil
 
The Healthcare Internet of Things: Rewards and Risks
The Healthcare Internet of Things: Rewards and RisksThe Healthcare Internet of Things: Rewards and Risks
The Healthcare Internet of Things: Rewards and Risksatlanticcouncil
 
Wireless Medical Infusion Pumps- Medical Device Cybersecurity Issues
Wireless Medical Infusion Pumps- Medical Device Cybersecurity IssuesWireless Medical Infusion Pumps- Medical Device Cybersecurity Issues
Wireless Medical Infusion Pumps- Medical Device Cybersecurity IssuesDr Dev Kambhampati
 
Access-2022-21976_Proof_hi.pdf
Access-2022-21976_Proof_hi.pdfAccess-2022-21976_Proof_hi.pdf
Access-2022-21976_Proof_hi.pdfmokamojah
 
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...IJNSA Journal
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUIRJET Journal
 
Leveraging the Internet of Things to Improve Patient Outcomes
Leveraging the Internet of Things to Improve Patient OutcomesLeveraging the Internet of Things to Improve Patient Outcomes
Leveraging the Internet of Things to Improve Patient OutcomesAlex Taser
 
Best_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfBest_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfJacob Li
 
The Case Study of an Early Warning Models for the Telecare Patients in Taiwan
The Case Study of an Early Warning Models for the Telecare Patients in TaiwanThe Case Study of an Early Warning Models for the Telecare Patients in Taiwan
The Case Study of an Early Warning Models for the Telecare Patients in TaiwanIJERA Editor
 
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING Akshay Mittal
 
Make sure it is in APA 7 format and at least 3-4 paragraphs and refe.docx
Make sure it is in APA 7 format and at least 3-4 paragraphs and refe.docxMake sure it is in APA 7 format and at least 3-4 paragraphs and refe.docx
Make sure it is in APA 7 format and at least 3-4 paragraphs and refe.docxendawalling
 
Advancing the cybersecurity of the healthcare system with self- optimising an...
Advancing the cybersecurity of the healthcare system with self- optimising an...Advancing the cybersecurity of the healthcare system with self- optimising an...
Advancing the cybersecurity of the healthcare system with self- optimising an...Petar Radanliev
 
Cloud Computing: A Key to Effective & Efficient Disease Surveillance System
Cloud Computing: A Key to Effective & Efficient Disease Surveillance SystemCloud Computing: A Key to Effective & Efficient Disease Surveillance System
Cloud Computing: A Key to Effective & Efficient Disease Surveillance Systemidescitation
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud SolutionIRJET Journal
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...IJERA Editor
 
Healthcare Information Technology Trends.docx
Healthcare Information Technology Trends.docxHealthcare Information Technology Trends.docx
Healthcare Information Technology Trends.docxwrite4
 
PSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
PSQH July-Aug 2015 Simplified ST Model - Woods-PestotnikPSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
PSQH July-Aug 2015 Simplified ST Model - Woods-PestotnikMichael Woods, MD, MMM
 
Accessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of ThingsAccessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of ThingsIJARIIT
 

Similar to Nist tech beat for january 7, 2015 (20)

Acus intel medical_devices
Acus intel medical_devicesAcus intel medical_devices
Acus intel medical_devices
 
The Healthcare Internet of Things: Rewards and Risks
The Healthcare Internet of Things: Rewards and RisksThe Healthcare Internet of Things: Rewards and Risks
The Healthcare Internet of Things: Rewards and Risks
 
Wireless Medical Infusion Pumps- Medical Device Cybersecurity Issues
Wireless Medical Infusion Pumps- Medical Device Cybersecurity IssuesWireless Medical Infusion Pumps- Medical Device Cybersecurity Issues
Wireless Medical Infusion Pumps- Medical Device Cybersecurity Issues
 
Access-2022-21976_Proof_hi.pdf
Access-2022-21976_Proof_hi.pdfAccess-2022-21976_Proof_hi.pdf
Access-2022-21976_Proof_hi.pdf
 
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
 
Leveraging the Internet of Things to Improve Patient Outcomes
Leveraging the Internet of Things to Improve Patient OutcomesLeveraging the Internet of Things to Improve Patient Outcomes
Leveraging the Internet of Things to Improve Patient Outcomes
 
Tt511 iot letter-1.0
Tt511 iot letter-1.0Tt511 iot letter-1.0
Tt511 iot letter-1.0
 
N018138696
N018138696N018138696
N018138696
 
Best_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdfBest_practices-_Access_controls_for_medical_devices (1).pdf
Best_practices-_Access_controls_for_medical_devices (1).pdf
 
The Case Study of an Early Warning Models for the Telecare Patients in Taiwan
The Case Study of an Early Warning Models for the Telecare Patients in TaiwanThe Case Study of an Early Warning Models for the Telecare Patients in Taiwan
The Case Study of an Early Warning Models for the Telecare Patients in Taiwan
 
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
 
Make sure it is in APA 7 format and at least 3-4 paragraphs and refe.docx
Make sure it is in APA 7 format and at least 3-4 paragraphs and refe.docxMake sure it is in APA 7 format and at least 3-4 paragraphs and refe.docx
Make sure it is in APA 7 format and at least 3-4 paragraphs and refe.docx
 
Advancing the cybersecurity of the healthcare system with self- optimising an...
Advancing the cybersecurity of the healthcare system with self- optimising an...Advancing the cybersecurity of the healthcare system with self- optimising an...
Advancing the cybersecurity of the healthcare system with self- optimising an...
 
Cloud Computing: A Key to Effective & Efficient Disease Surveillance System
Cloud Computing: A Key to Effective & Efficient Disease Surveillance SystemCloud Computing: A Key to Effective & Efficient Disease Surveillance System
Cloud Computing: A Key to Effective & Efficient Disease Surveillance System
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud Solution
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
 
Healthcare Information Technology Trends.docx
Healthcare Information Technology Trends.docxHealthcare Information Technology Trends.docx
Healthcare Information Technology Trends.docx
 
PSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
PSQH July-Aug 2015 Simplified ST Model - Woods-PestotnikPSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
PSQH July-Aug 2015 Simplified ST Model - Woods-Pestotnik
 
Accessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of ThingsAccessing Information of Emergency Medical Services through Internet of Things
Accessing Information of Emergency Medical Services through Internet of Things
 

More from Charles McNeil

Case Study: Internet Televison vs Satellite TV Cost Comparison
Case Study: Internet Televison vs Satellite TV Cost ComparisonCase Study: Internet Televison vs Satellite TV Cost Comparison
Case Study: Internet Televison vs Satellite TV Cost ComparisonCharles McNeil
 
2014 updated editable hipaa hitech policy and procedures
2014 updated editable hipaa hitech policy and procedures2014 updated editable hipaa hitech policy and procedures
2014 updated editable hipaa hitech policy and proceduresCharles McNeil
 
MBM Managed Security Services
MBM Managed Security ServicesMBM Managed Security Services
MBM Managed Security ServicesCharles McNeil
 
Premier announces new supplier agreements
Premier announces new supplier agreementsPremier announces new supplier agreements
Premier announces new supplier agreementsCharles McNeil
 
Premier contracted supplier
Premier contracted supplierPremier contracted supplier
Premier contracted supplierCharles McNeil
 
Kensington i pad air chassis story
Kensington i pad air chassis storyKensington i pad air chassis story
Kensington i pad air chassis storyCharles McNeil
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products MatrixCharles McNeil
 
How MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH Requirements
How MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH RequirementsHow MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH Requirements
How MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH RequirementsCharles McNeil
 
MBM's Revenue Cycle Analyzer Tool
MBM's Revenue Cycle Analyzer ToolMBM's Revenue Cycle Analyzer Tool
MBM's Revenue Cycle Analyzer ToolCharles McNeil
 
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk Analysis
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk AnalysisMBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk Analysis
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk AnalysisCharles McNeil
 
MBM's InterGuard Security Suite
MBM's InterGuard Security SuiteMBM's InterGuard Security Suite
MBM's InterGuard Security SuiteCharles McNeil
 
5 Hidden Benefits of an EHR Adoption
 5 Hidden Benefits of an EHR Adoption 5 Hidden Benefits of an EHR Adoption
5 Hidden Benefits of an EHR AdoptionCharles McNeil
 

More from Charles McNeil (14)

Case Study: Internet Televison vs Satellite TV Cost Comparison
Case Study: Internet Televison vs Satellite TV Cost ComparisonCase Study: Internet Televison vs Satellite TV Cost Comparison
Case Study: Internet Televison vs Satellite TV Cost Comparison
 
2014 updated editable hipaa hitech policy and procedures
2014 updated editable hipaa hitech policy and procedures2014 updated editable hipaa hitech policy and procedures
2014 updated editable hipaa hitech policy and procedures
 
MBM Managed Security Services
MBM Managed Security ServicesMBM Managed Security Services
MBM Managed Security Services
 
Premier announces new supplier agreements
Premier announces new supplier agreementsPremier announces new supplier agreements
Premier announces new supplier agreements
 
Premier contracted supplier
Premier contracted supplierPremier contracted supplier
Premier contracted supplier
 
Kensington i pad air chassis story
Kensington i pad air chassis storyKensington i pad air chassis story
Kensington i pad air chassis story
 
Healthcare solutions
Healthcare solutionsHealthcare solutions
Healthcare solutions
 
Healthcare brochure
Healthcare brochureHealthcare brochure
Healthcare brochure
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
 
How MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH Requirements
How MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH RequirementsHow MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH Requirements
How MBM eHealthCare Solutions Help Businesses Meet HIPAA / HITECH Requirements
 
MBM's Revenue Cycle Analyzer Tool
MBM's Revenue Cycle Analyzer ToolMBM's Revenue Cycle Analyzer Tool
MBM's Revenue Cycle Analyzer Tool
 
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk Analysis
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk AnalysisMBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk Analysis
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk Analysis
 
MBM's InterGuard Security Suite
MBM's InterGuard Security SuiteMBM's InterGuard Security Suite
MBM's InterGuard Security Suite
 
5 Hidden Benefits of an EHR Adoption
 5 Hidden Benefits of an EHR Adoption 5 Hidden Benefits of an EHR Adoption
5 Hidden Benefits of an EHR Adoption
 

Nist tech beat for january 7, 2015

  • 1. NIST Tech Beat for January 7, 2015 Cybersecurity Center Invites Feedback on Securing Medical Devices Hospitals are increasingly using networked technology to improve the accuracy and efficiency of medical care by connecting medical devices to a central system. A networked infusion pump—a device used to convey fluids, drugs and nutrients into a patient’s bloodstream—can allow centralized control of the device’s programming as well as automated cross checks against pharmacy records and patient data to ensure the right dose of fluids or medication are delivered at the right time to the right patient. But these connected devices can introduce new risks in safety and security compared with stand-alone devices. To address the cybersecurity challenges of wireless infusion pumps, the National Cybersecurity Center of Excellence (NCCoE) is inviting comments on a draft project to secure those devices. The challenges include vulnerabilities to malware or hacking and access control. The effort is a collaboration between the NCCoE at the National Institute of Standards and Technology and the Technological Leadership Institute (TLI) at the University of Minnesota. Minnesota-based providers of services, manufacturers and medical device industry associations helped to draft a use case, which provides a technical description of the challenge of securing the devices and describes desired characteristics for solutions. “This is the first medical device project for the National Cybersecurity Center of Excellence, and our second focused on the healthcare sector,” says Nate Lesser, deputy director of the NCCoE. “Working with the Technological Leadership Institute and the medical device community helped us identify this challenge and we look forward to continued collaboration." The draft use case identifies the people and systems that interact with infusion pumps, defines their interactions, performs a risk assessment, identifies applicable security technologies and provides an example method or implementation to secure the system. After the use case is finalized, the NCCoE will invite organizations to participate in developing a practice guide, or a collection of the materials and information needed to deploy an example solution of off-the-shelf products that address the technical security problems. The guide will describe the hardware, software and configurations the project used to address the issues presented in this use case so that others can replicate the approach. The NCCoE works with industry, academic and government experts to find practical solutions for businesses’ most pressing cybersecurity needs. The center was established in 2012 with the state of Maryland and Montgomery County, Md. In 2014, MITRE Corp. was awarded a contract to support the center as a federally funded research and development center, the first dedicated to cybersecurity. The wireless infusion pump use case can be found on the NCCoE website. Comments should be submitted by Jan. 18, 2015. Media Contact: Jennifer Huergo, jennifer.huergo@nist.gov, 301-975-6343