Security Vulnerabilities Detected in Medical Devices

Aamna Alsuwaidi, Amna Hassan, Fatema Alkhatri, Hana Ali, Mohammad Qbeaah, Saed Alrabaee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

The increasingly close connection between medical devices and computer networks has given rise to novel cybersecurity threats. Due to the elevated number of connected medical devices, this means that more opportunities for security vulnerabilities exist. To safeguard against cybersecurity breaches in medical devices, understanding the complex nature of the operational surroundings is essential, and knowing about each technical susceptibility is valuable. The purpose of this paper is to discuss a network model of medical devices. Security vulnerabilities in the devices, as well as potential methods of attack, were examined. A solution is provided to improve the security of IT systems, due to essential role medical devices play in patient outcomes.

Original languageEnglish
Title of host publicationProceedings - 2020 12th Annual Undergraduate Research Conference on Applied Computing, URC 2020
EditorsOmar Alfandi
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728197890
DOIs
Publication statusPublished - Apr 2020
Event12th Annual Undergraduate Research Conference on Applied Computing, URC 2020 - Dubai, United Arab Emirates
Duration: Apr 15 2020Apr 16 2020

Publication series

NameProceedings - 2020 12th Annual Undergraduate Research Conference on Applied Computing, URC 2020

Conference

Conference12th Annual Undergraduate Research Conference on Applied Computing, URC 2020
Country/TerritoryUnited Arab Emirates
CityDubai
Period4/15/204/16/20

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems and Management
  • Agronomy and Crop Science

Fingerprint

Dive into the research topics of 'Security Vulnerabilities Detected in Medical Devices'. Together they form a unique fingerprint.

Cite this