Medical Device Safety Management Using Cybersecurity Risk Analysis
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Dong-Won | - |
dc.contributor.author | Choi, Jin-Young | - |
dc.contributor.author | Han, Keun-Hee | - |
dc.date.accessioned | 2021-08-31T16:03:30Z | - |
dc.date.available | 2021-08-31T16:03:30Z | - |
dc.date.created | 2021-06-19 | - |
dc.date.issued | 2020 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/58974 | - |
dc.description.abstract | Hospital biomedical engineering teams are responsible for establishing and regulating medical equipment management programs (MEMPs); these programs ensure the safety and reliability of medical devices. Concomitant with rapid technological advancements, medical devices have been developed that are now being integrated with information and communication technology. However, with the convergence of such diverse technologies, internal and external security threats are continuously increasing. Thus, to reduce medical device security threats, important devices must be identified and prioritized. In this study, we propose a multicriteria decision-making model that prioritizes medical devices by extending the Fennigkoh and Smith model to include security threats. First, we formulate criteria for evaluating medical device functions based on the classification of the medical devices according to their unique functions, connections, and data types. Then, through threat modeling, we develop a method of identifying and evaluating security threats to these devices. We discuss establishing a safer MEMP by analyzing the attack occurrence probability (AOP) and attack success probability (ASP) of medical devices and the inherent security threats that these devices face, none of which are considered in the existing model. Thus, by using the enhanced Fennigkoh and Smith model, our proposed approach enables the development of improved security-enhanced MEMPs, including cybersecurity risk assessments. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.subject | SECURITY | - |
dc.title | Medical Device Safety Management Using Cybersecurity Risk Analysis | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Choi, Jin-Young | - |
dc.identifier.doi | 10.1109/ACCESS.2020.3003032 | - |
dc.identifier.scopusid | 2-s2.0-85093844669 | - |
dc.identifier.wosid | 000547515900001 | - |
dc.identifier.bibliographicCitation | IEEE ACCESS, v.8, pp.115370 - 115382 | - |
dc.relation.isPartOf | IEEE ACCESS | - |
dc.citation.title | IEEE ACCESS | - |
dc.citation.volume | 8 | - |
dc.citation.startPage | 115370 | - |
dc.citation.endPage | 115382 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | SECURITY | - |
dc.subject.keywordAuthor | Medical devices | - |
dc.subject.keywordAuthor | Computer security | - |
dc.subject.keywordAuthor | Medical services | - |
dc.subject.keywordAuthor | Safety | - |
dc.subject.keywordAuthor | Standards | - |
dc.subject.keywordAuthor | Risk management | - |
dc.subject.keywordAuthor | Biomedical equipment | - |
dc.subject.keywordAuthor | cybercare | - |
dc.subject.keywordAuthor | security management | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.