Читать книгу Do No Harm - Matthew Webster - Страница 2

Table of Contents

Оглавление

Cover

Title Page

Introduction What Does This Book Cover?

Part I: Defining the Challenge Chapter 1: The Darker Side of High Demand Connected Medical Device Risks Escalating Demand By the Numbers The Road to High Risk Innovate or Die In Summary Notes Chapter 2: The Internet of Medical Things in Depth What Are Medical Things? Historical IoMT Challenges IoMT Technology Current IoMT Challenges In Summary Notes Chapter 3: It Is a Data-Centric World The Volume of Health Data Data Is That Important This Is Data Aggregation? Non-HIPAA Health Data? Data Brokers Big Data Data Mining Automation In Summary Notes Chapter 4: IoMT and Health Regulation Health Regulation Basics FDA to the Rescue? The Veterans Affairs and UL 2900 In Summary Notes Chapter 5: Once More into the Breach Grim Statistics Breach Anatomy In Summary Notes Chapter 6: Say Nothing of Privacy Why Privacy Matters Privacy History in the United States The New Breed of Privacy Regulations Technical and Operational Privacy Considerations Privacy, Technology, and Security The Manufacturer's Quandary Bad Behavior In Summary Notes Chapter 7: The Short Arm of the Law Legal Issues with Hacking Cybercrime Enforcement Results of Legal Shortcomings In Summary Notes Chapter 8: Threat Actors and Their Arsenal The Threat Actors The Deep, Dark Internet Tools of the Trade In Summary Notes

Part II: Contextual Challenges and Solutions Chapter 9: Enter Cybersecurity What Is Cybersecurity? Key Disciplines in Cybersecurity In Summary Notes Chapter 10: Network Infrastructure and IoMT In the Beginning Networking Basics: The OSI Model Mistake: The Flat Network Alternate Network Defensive Strategies Wireless Woes In Summary Notes Chapter 11: Internet Services Challenges Internet Services Internet-Related Services Challenges The Evolving Enterprise In Summary Notes Chapter 12: IT Hygiene and Cybersecurity The IoMT Blues The Drudgery of Patching Antivirus Is Enough, Right? Misconfigurations Galore In Summary Notes Chapter 13: Identity and Access Management Minimal Identity Practices Authentication Privileged Access Management Other I&AM Technologies In Summary Notes Chapter 14: Threat and Vulnerability Vulnerability Management Vulnerability Management Strategies Penetration Testing New Tools of an Old Trade In Summary Note Chapter 15: Data Protection Data Governance Data Loss Prevention Enterprise Encryption Data Tokenization In Summary Chapter 16: Incident Response and Forensics Defining the Context Incident Response In Summary Note Chapter 17: A Matter of Life, Death, and Data Organizational Structure Risk Management Mindset Challenges Decision-Making In Summary

Part III: Looking Forward Chapter 18: Seeds of Change The Shifting Legal Landscape International Agreements Technology Innovation Leadership Shakeups In Summary Notes Chapter 19: Doing Less Harm What IoMT Manufacturers Can Do What Covered Entities Can Do Cybersecurity Innovators What You Can Do In Summary Notes Chapter 20: Changes We Need International Cooperation Covered Entities More IoMT Security Assurances In Summary Note

Glossary

Index

Copyright

10  Dedication

11  About the Author

12  Acknowledgments

13  Preface

14  End User License Agreement

Do No Harm

Подняться наверх