Читать книгу Do No Harm - Matthew Webster - Страница 43
Notes
Оглавление1 1 Trevor Harwood, “Internet of Things (IoT) History: A closer look at who coined the term and the background evolution into today's trending topic.” November 12, 2019, https://www.postscapes.com/iot-history/.
2 2 Alison DeNisco Rayome, “How the term ‘Internet of Things’ was invented,” 2018, https://www.techrepublic.com/article/how-the-term-internet-of-things-was-invented/.
3 3 “How to Determine if Your Product Is a Medical Device,” https://www.fda.gov/medical-devices/classify-your-medical-device/how-determine-if-your-product-medical-device.
4 4 OWASP Internet of Things Project 2018 https://wiki.owasp.org/index.php/OWASP_Internet_of_Things_Project.
5 5 Ibid.
6 6 Ibid.
7 7 Ibid.
8 8 Ibid.
9 9 Ibid.
10 10 Ibid.
11 11 Ibid.
12 12 Ibid.
13 13 Ibid.
14 14 Ibid.
15 15 Josh Fruhlinger, “The Mirai botnet explained: How teen scammers and CCTV cameras almost brough down the internet,” 2018, https://www.csoonline.com/article/3258748/the-mirai-botnet-explained-how-teen-scammers-and-cctv-cameras-almost-brought-down-the-internet.html.
16 16 “Cybersecurity Vulnerabilities Identified in St. Jude Medical's Implantable Cardiac Devices and Merlin@home Transmitter: FDA Safety Communication,” https://www.fda.gov/medical-devices/safety-communications/cybersecurity-vulnerabilities-identified-st-jude-medicals-implantable-cardiac-devices-and-merlinhome.
17 17 “Securing the Internet of Medical Things (IoMT),” https://802secure.com/wp-content/themes/802secure/pdf/AIRSHIELD-Health-Data-Sheet.pdf.
18 18 “Clearwater Medical Device Security and CIO Insomnia,” https://clearwatercompliance.com/blog/medical-device-security-and-cio-insomnia/.
19 19 Ibid.
20 20 “CVE Detail,” https://www.cvedetails.com/product/739/Microsoft-Windows-Xp.html?vendor_id=26.
21 21 Matthew Humphries, “FBI Warns Against Using Hotel Wi-Fi for Work: The FBI says hotels in cities across the US have lax security allowing for easy exploitation by malicious actors,” 2020, https://www.entrepreneur.com/article/357524.
22 22 Jefferson B. Sessions II, 2018, https://www.wyden.senate.gov/imo/media/doc/08212018%20RW%20Stingray%20Jamming%20Letter%20to%20DOJ.pdf.
23 23 Zack Whittaker, “New flaws in 4G, 5G allow attackers to intercept calls and track phone locations,” 2019, https://techcrunch.com/2019/02/24/new-4g-5g-security-flaws/.
24 24 Wikipedia, https://en.wikipedia.org/wiki/Bluetooth, accessed October 24, 2020.
25 25 “Common Vulnerabilities Exposures,” https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=Bluetooth, accessed October 24, 2020.
26 26 “FDA News Release FDA Informs Patients, Providers and Manufacturers About Potential Cybersecurity Vulnerabilities in Certain Medical Devices with Bluetooth Low Energy,” March 3, 2020, https://www.fda.gov/news-events/press-announcements/fda-informs-patients-providers-and-manufacturers-about-potential-cybersecurity-vulnerabilities-0.
27 27 Ibid.
28 28 Cristina Ardila, “Six Ways NFC Helps Healthcare,” 2015, https://www.nxp.com/company/blog/six-ways-nfc-helps-healthcare:BL-6-WAYS-NFC-HELPS-HEALTHCARE.
29 29 Zak Doffman, “New Google Android Threat: NFC Exposes Devices To Malware Attack—Update Settings Now,” 2019, https://www.forbes.com/sites/zakdoffman/2019/11/02/new-android-threat-contactless-payment-technology-open-to-attackchange-your-settings/#4ed6ccf45cde.
30 30 Marc Laliberte, “How data breaches forced Amazon to update S3 bucket security,” 2019, https://www.helpnetsecurity.com/2019/09/23/s3-bucket-security/.
31 31 Truffle Bot, “An API Worm In The Making: Thousands of Secrets Found In Open S3 Buckets,” 2020, https://trufflesecurity.com/blog/an-s3-bucket-worm-in-the-making-thousands-of-secrets-found-in-open-s3-buckets.
32 32 Spencer Gietzen, “S3 Ransomware Part 1: Attack Vector,” https://rhinosecuritylabs.com/aws/s3-ransomware-part-1-attack-vector/.
33 33 HyTrust, “HyTrust Cloud Survey Finds 25% of Healthcare Organizations Are Putting Patient Data at Risk in the Public Cloud,” February 15, 2017, https://www.hytrust.com/news-item/hytrust-cloud-survey-finds-quarter-healthcare-orgs-putting-patient-data-risk/.
34 34 Marianne Kolbasuk McGee, “Attack on Billing Vendor Results in Massive Breach: Atrium Health Says Attack on Accudoc Affected 2.65 Million Individuals,” 2018, https://www.bankinfosecurity.com/attack-on-billing-vendor-results-in-massive-breach-a-11740.
35 35 Nick G., “35 Outrageous Hacking Statistics & Predictions [2020 Update],” accessed October 24, 2020, https://review42.com/hacking-statistics/#:~:text=The%20cost%20of%20a%20data,high-risk%20apps%20in%202018.
36 36 “Unprecedented privacy risk with popular health apps: Clinicians and consumers warned of privacy risks,” University of Sydney, 2019, https://www.sciencedaily.com/releases/2019/03/190321092207.htm.
37 37 Marianne Kolbasuk McGee, “Patient Monitoring Software Vulnerabilities Identified Philips and DHS Issue Advisories; Mitigation Tips Offered,” 2020, https://www.databreachtoday.com/patient-monitoring-software-vulnerabilities-identified-a-14991.
38 38 Ibid.
39 39 Kate Fazzini, “FDA issues cybersecurity warning on GE medical equipment that monitors patients,” 2020, https://www.cnbc.com/2020/01/23/fda-issues-cybersecurity-warning-on-ge-medical-equipment-that-monitors-patients.html.
40 40 GE Healthcare Product Security Portal, accessed October 12, 2020, https://www.gehealthcare.com/security.