Читать книгу Do No Harm - Matthew Webster - Страница 4
List of Illustrations
Оглавление1 Chapter 1Figure 1-1: Example types of attacks against internet-connected medical devi...Figure 1-2: Number of healthcare data breaches of 500 or more records
2 Chapter 2Figure 2-1: The interconnection of IoMT technologies
3 Chapter 3Figure 3-1: Relationship of data science to enablement technologies
4 Chapter 5Figure 5-1: Number of exposed records 2005 to 2019Figure 5-2: Average per record cost in a breachFigure 5-3: 2019 PHI breached systems dataFigure 5-4: The cyber kill chain in a nutshell
5 Chapter 6Figure 6-1: Example of a scytaleFigure 6-2: Top 7 reported types of identity theft and numbers (2019)Figure 6-3: Some key privacy laws affecting the United States
6 Chapter 7Figure 7-1: Comparison between traditional crime and cybercrimeFigure 7-2: Top 10 Countries generating cybercrime
7 Chapter 8Figure 8-1: Development of malware in millions
8 Chapter 10Figure 10-1: Network communication via the OSI model