Healthcare Information-Safety Requirements-You Live or You Die, Based on IT


11-28-2017



Unit 7 Discussion 2 Response 1 to David Keller

Response from: Miss. Bayo Elizabeth Cary, AA, BA, MLIS



IoT security is a headache, a mess and several other flavors of annoying

 for any enterprise, but in healthcare, it can

be literally life and death. (Gold, 2017, p. 1)



         Healthcare information, pertains to a specific patient, and not to a general group of people. When a patient, goes to a hospital, for treatment, regarding their own personal healthcare needs-then, another person, can not be treated-as any substitute, with the same patient care information. Disease, and illnesses, are patient specific. Treating a patient, based n information, that is not applicable, because of; identity theft, or other data communications issues-is a life-threatening situation. Iot, and BYOD information security, is much more challenging-especially when combined, and, for a-number-of reasons:



The key difference between traditional security and IoT security is visibility, according to Xu Zou, CEO and cofounder at IoT security specialist ZingBox. IoT devices are purpose-built, non-standardized, and run a vast array of software, making them much more difficult to manage centrally. Even with the advent of BYOD, the number of different endpoint types an IT department has to manage is relatively limited compared to the panoply of IoT devices. (Gold, 2017, p. 1)



When information, is stolen from a US healthcare system, it is not always, for fraudulent treatment. Oft times, healthcare information, is stolen, for only the data, that is present, on healthcare information forms. Healthcare forms, contain a large amount, of personal data, and information, that can be converted, to steal, other valuable information, and money:



But medical IoT poses additional security risks. For one thing, connected records systems and anything that contains personal information are attractive targets for identity thieves - your Social Security number is all over your medical records. Compromising a medical IoT device and pivoting to other targets on the network could result in a breach of these records, researchers have found.

                                                                                                     (Gold, 2017, p. 1)





Although, I am not aware, of actual pills, that contain electronic tracers, to track the ingestion, of medicine-electronics, control medicine delivery systems, in hospitals.





          When computers, control anything-a thermostat, a computer, a TV, etc., then, the system can be hacked, and remotely controlled. In a hospital environment, there are many, medical devices, containing computer equipment-that, could be potentially controlled, by remote: “Under certain circumstances, an attacker could exercise direct control over medical equipment, with potentially fatal consequences - witness the infamous hacked insulin pump, which first made headlines all the way back in 2011” (Gold, 2017, p. 1). America is aware of the dangers, that a world built of computers presents, and-has not done enough, to ensure the safety, of anyone.





References





Gold, Jon. (2017). IoT security for healthcare is in critical condition. Network World (Online). p. 1-3. Retrieved from http://library.capella.edu/login?url=https://search.proquest.com/docview/19259113

07?accountid=27965

Comments

Popular posts from this blog

Unit 8 Assignment-Locked Out of Group Chat-Forced To Work Alone-Dr. Susan Ferebee-Capella University-Trying To Illegally Flunk Me!

Complaint RE: Dr. Susan Ferebee: Flunking Me-After an IP Address Lock Out, to: Academic Coach: Scribner at Capella University

Unit 2 Discussion 2