| Literature DB >> 33123867 |
Marco Eichelberg1, Klaus Kleber2, Marc Kämmerer2.
Abstract
This article provides an overview on the literature published on the topic of cybersecurity for PACS (Picture Archiving and Communications Systems) and medical imaging. From a practical perspective, PACS specific security measures must be implemented together with the measures applicable to the IT infrastructure as a whole, in order to prevent incidents such as PACS systems exposed to access from the Internet. Therefore, the article first offers an overview of the physical, technical and organizational mitigation measures that are proposed in literature on cybersecurity in healthcare information technology in general, followed by an overview on publications discussing specific cybersecurity topics that apply to PACS and medical imaging and present the "building blocks" for a secure PACS environment available in the literature. These include image de-identification, transport security, the selective encryption of the DICOM (Digital Imaging and Communications in Medicine) header, encrypted DICOM files, digital signatures and watermarking techniques. The article concludes with a discussion of gaps in the body of published literature and a summary.Entities:
Keywords: Cybersecurity; DICOM; Medical imaging; PACS
Mesh:
Year: 2020 PMID: 33123867 PMCID: PMC7728878 DOI: 10.1007/s10278-020-00393-3
Source DB: PubMed Journal: J Digit Imaging ISSN: 0897-1889 Impact factor: 4.056
Summary of cybersecurity mitigation measures proposed in literature. CIA, confidentiality, integrity, availability
| Keep file servers in secure areas safeguarded from unauthorized access and environmental threats | U | (CIA) | [ |
| install security cameras in server rooms | U | (CIA) | [ |
| Perform regular backups | U/V | A | [ |
| Use firewalls and network segmentation to prevent network intrusion | U | (CIA) | [ |
| Disable unused physical network and USB ports | U | (CIA) | [ |
| Use whitelisting for permitted applications | U/V | (CIA) | [ |
| Implement user authentication and define and enforce access rights | U/V | C | [ |
| Install updates and patches on a regular basis | U/V | (CIA) | [ |
| Install antivirus software | U/V | (CIA) | [ |
| Use encrypted network transmissions | U/(V) | CI | [ |
| Use encrypted document storage | U/V | CI | [ |
| Deploy an audit trail | U/V | (CI) | [ |
| Deploy network monitoring and intrusion detection tools | U | (CIA) | [ |
| Define and enforce a mobile device policy | U | (CIA) | [ |
| Deploy automated asset inventory discovery tools | U | (CIA) | [ |
| Ensure that system configurations are updated to remain secure over time | U/V | (CIA) | [ |
| Deploy a public key infrastructure providing client certificates | U/V | CI | [ |
| Enforce remote administration to be performed over secure channels | U | C | [ |
| Perform regular user training and simulate cybersecurity incidents | U | (CIA) | [ |
| Perform regular penetration testing | U | (CIA) | [ |
| Define and implement incident management procedures | U | (CIA) | [ |
| Use de-identified images where possible | U/V | C | [ |
| Implement DICOM transport security or selective encryption of DICOM headers | U/(V) | C | [ |
| Store DICOM files in encrypted format | U/V | C | [ |
| Use digital signatures or watermarking techniques to protect image integrity | U/V | I | [ |
| Cleanse file preamble when handling DICOM files | U/V | (CIA) | [ |