| Literature DB >> 33915932 |
Thiago Poleto1, Maisa Mendonça Silva2, Thárcylla Rebecca Negreiros Clemente3, Ana Paula Henriques de Gusmão4, Ana Paula de Barros Araújo2, Ana Paula Cabral Seixas Costa2.
Abstract
The purpose of this paper is to propose a framework for cybersecurity risk management in telemedicine. The framework, which uses a bow-tie approach for medical image diagnosis sharing, allows the identification, analysis, and assessment of risks, considering the ISO/TS 13131:2014 recommendations. The bow-tie method combines fault tree analysis (FTA) and event tree analysis (ETA). The literature review supported the identification of the main causes and forms of control associated with cybersecurity risks in telemedicine. The main finding of this paper is that it is possible, through a structured model, to manage risks and avoid losses for everyone involved in the process of exchanging medical image information through telemedicine services. Through the framework, those responsible for the telemedicine services can identify potential risks in cybersecurity and act preventively, recognizing the causes even as, in a mitigating way, identifying viable controls and prioritizing investments. Despite the existence of many studies on cybersecurity, the paper provides theoretical contributions to studies on cybersecurity risks and features a new methodological approach, which incorporates both causes and consequences of the incident scenario.Entities:
Keywords: bow-tie analysis; cyberattack; cybersecurity; decision-making; image and diagnosis medical security
Mesh:
Year: 2021 PMID: 33915932 PMCID: PMC8037815 DOI: 10.3390/s21072426
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Communication types in telemedicine services [29].
| Communication Types | Telemedicine Tools | Telemedicine Services |
|---|---|---|
| Doctor to Doctor or Medical Center | E-mail and/or video | Dermatology, radiology, surgical peer mentoring, emergency trauma, and ICU care |
| Doctors to Patient | Video, phone, e-mail, remote wireless monitoring, Internet | Care for chronic conditions, medication management, wound care, counseling, post-discharge follow-up, mental health |
| Patient to Mobile Health Technology | Wearable monitors, smartphones, mobile apps, video, e-mail, web portals, games | Health education, monitoring of physical activity, monitoring of diet, medication adherence, cognitive fitness |
Figure 1Cyberattacks in telemedicine services.
Figure 2General fault tree.
Figure 3General event tree.
Figure 4Three steps of the risk assessment process (Source: ISO/TS 13131:2014).
Figure 5Proposed framework for cybersecurity in telemedicine.
Failure events of cyberattacks in telemedicine.
| Causes | References | Index | Failure Events of Cyberattacks in Telemedicine |
|---|---|---|---|
| Routing Table Poisoning Attacks | [ | B1 | Lack of node authentication |
| B2 | Updating routing table | ||
| B3 | Lack of verifying peers in index table | ||
| Denial of Service Attack | [ | D1 | Smurf attack |
| D2 | SYN flood | ||
| D3 | Botnets | ||
| DNS Hacking Attacks | [ | H1 | Cybersquatting |
| H2 | Human attacks | ||
| H3 | Authentication vulnerability | ||
| Cyber-Physical Electric Power | [ | P1 | Inadequate periodic security audits |
| P2 | Inadequate incident response process | ||
| P3 | Insufficient redundancy | ||
| Employers’ Intentional Attacks | [ | E1 | Insufficient trained personnel |
| E2 | Inadequate security awareness program | ||
| E3 | Third party as an agent of the utility having access to patient |
Preventive and mitigating cybersecurity.
| Category | References | Preventive and Mitigating Cybersecurity |
|
|---|---|---|---|
| Access Control | [ | Notification of System Use | Granting access to the system that provides privacy and consistent security notices. |
| Previous Logon (Access) Notification | Applicable to logons to information systems via human user interfaces. | ||
| Session Termination | System automatically terminates a user session | ||
| Remote Access | Establishes usage restrictions, configuration/connection requirement, privileged commands, monitoring for unauthorized connections, disable access. | ||
| Awareness and Training | [ | Security Awareness Training | Provides basic security awareness training to information system users. |
| Role-Based Security Training | Provides role-based security training to personnel with assigned security roles and responsibilities. | ||
| Audit and Accountability | [ | Audit Events, Review, Analysis, and Reporting | Generates audit records containing information that establishes what type of event occurred, when the event occurred, and where the event occurred. |
| Monitoring for Information Disclosure | Organization monitors evidence of unauthorized disclosure of organizational information. | ||
| Security Assessment and Authorization | [ | System Interconnections | Control applies to dedicated connections between information systems and does not apply to transitory, user-controlled connections such as e-mail and website browsing. |
| Security Authorization | Management decisions, conveyed through authorization decision documents. | ||
| Continuous Monitoring | Programs facilitate ongoing awareness of threats, vulnerabilities, and information security to support organizational risk management decisions. | ||
| Penetration Testing | Specialized type of assessment conducted on information systems or individual system components to identify vulnerabilities that could be exploited by adversaries. | ||
| Configuration Management | [ | Information System Component Inventory | Control includes changes to baseline configurations for components and configuration items of information systems, changes to configuration settings for information technology products (e.g., operating systems, applications, firewalls, routers, and mobile devices), unscheduled/unauthorized changes, and changes to remediate vulnerabilities. |
| Software Usage Restrictions | Provided under software license agreements that permit individuals to study, change, and improve the software. | ||
| Security Impact Analysis | Organization analyzes changes to the information system to determine potential security impacts prior to change implementation. | ||
| Identification and Authentication | [ | Device Identification and Authentication | Organizational devices requiring unique device-to-device identification and authentication may be defined by type, by device, or by a combination of type/device. |
| Service Identification and Authentication | Architectural approaches requiring the identification and authentication of information system services. | ||
| Cryptographic Module Authentication | Information system implements mechanisms for authentication to a cryptographic module. | ||
| Physical and Environmental Protection | [ | Physical Access Authorizations | Control applies to organizational employees and visitors; individuals (e.g., employees, contractors, and others) with permanent physical access authorization credentials are not considered visitors. |
| Fire Protection | Fire suppression and detection devices/systems for the information system that are supported by an independent energy source. | ||
| Emergency Power | Provides a short-term uninterruptible power supply to facilitate in the event of a primary power source loss. | ||
| Temperature and Humidity Controls | Control applies primarily to facilities containing concentrations of information system resources, for example, data centers, server rooms, and mainframe computer rooms | ||
| System and Communications Protection | [ | Trusted Path | Information system establishes a trusted communications path between the user and the following security functions of the system. |
| Cryptographic Protection | Establishes and manages cryptographic keys for required cryptography employed within the information system. | ||
| Mobile Code | Information systems are based on the potential for the code to cause damage to the systems if used maliciously. |
Figure 6Bow-tie risk analysis for cybersecurity in telemedicine.
Probability of causes that lead to cyberattacks in telemedicine.
| Intermediate Causes | Index | Basic Failure Events | Gate Type | Probability |
|---|---|---|---|---|
| Routing Table Poisoning Attacks | B1 | Lack of node authentication |
|
|
| B2 | Updating routing table | |||
| B3 | Lack of verifying peers in index table | |||
| Denial of Service Attack | D1 | Smurf attack |
|
|
| D2 | SYN flood | |||
| D3 | Botnets | |||
| DNS Hacking Attacks | H1 | Cybersquatting |
|
|
| H2 | Human attacks | |||
| H3 | Authentication vulnerability | |||
| Cyber-Physical Electric Power | P1 | Inadequate periodic security audits |
|
|
| P2 | Inadequate incident response process | |||
| P3 | Insufficient redundancy | |||
| Employers’ Intentional Attacks | E1 | Insufficient trained personnel |
|
|
| E2 | Inadequate security awareness program | |||
| E3 | Third party as an agent of the utility having access to patient |
Failure events of cyberattacks in telemedicine.
| Incident Scenarios | Incident Events | Gate Type |
|---|---|---|
| Minor mishap |
Cyberattack discovery Specification of a solution |
|
| Congestion at the router of domain |
Cyberattack discovery Implementation of the right source Maturation of measurement capabilities |
|
| Resolution modification of medical image |
Cyberattack discovery Implementation of the right source |
|
| Significant delays |
Cyberattack discovery Ensuring operational success solution Maturation of measurement capabilities |
|
| Malicious activity undetected |
Cyberattack discovery Ensuring operational success solution |
|
| Replication of medical image |
Cyberattack discovery Maturation of measurement capabilities |
|
| Loss of medical image |
Cyberattack discovery |
|
| Denial of service (DoS) |
Failure in cybersecurity of medical image |
|
Figure 7A 5 × 5 risk matrix for cybersecurity in telemedicine.