Healthcare Information-Safety Requirements-You Live or You Die, Based on IT
11-28-2017
Unit 7 Discussion 2 Response 1 to David Keller
Response from: Miss. Bayo Elizabeth Cary, AA, BA, MLIS
IoT
security is a headache, a mess and several other flavors of annoying
for any enterprise, but in healthcare, it can
be
literally life and death. (Gold, 2017, p. 1)
Healthcare information, pertains to a specific patient, and not to a
general group of people. When a patient, goes to a hospital, for treatment,
regarding their own personal healthcare needs-then, another person, can not be
treated-as any substitute, with the same patient care information. Disease, and
illnesses, are patient specific. Treating a patient, based n information, that
is not applicable, because of; identity theft, or other data communications
issues-is a life-threatening situation. Iot, and BYOD information security, is
much more challenging-especially when combined, and, for a-number-of reasons:
The
key difference between traditional security and IoT security is visibility,
according to Xu Zou, CEO and cofounder at IoT security specialist ZingBox. IoT
devices are purpose-built, non-standardized, and run a vast array of software,
making them much more difficult to manage centrally. Even with the advent of
BYOD, the number of different endpoint types an IT department has to manage is
relatively limited compared to the panoply of IoT devices. (Gold, 2017, p. 1)
When information, is stolen from a US healthcare
system, it is not always, for fraudulent treatment. Oft times, healthcare
information, is stolen, for only the data, that is present, on healthcare
information forms. Healthcare forms, contain a large amount, of personal data,
and information, that can be converted, to steal, other valuable information,
and money:
But
medical IoT poses additional security risks. For one thing, connected records
systems and anything that contains personal information are attractive targets
for identity thieves - your Social Security number is all over your medical
records. Compromising a medical IoT device and pivoting to other targets on the
network could result in a breach of these records, researchers have found.
(Gold, 2017, p. 1)
Although, I am not aware, of actual
pills, that contain electronic tracers, to track the ingestion, of medicine-electronics,
control medicine delivery systems, in hospitals.
When computers, control anything-a
thermostat, a computer, a TV, etc., then, the system can be hacked, and
remotely controlled. In a hospital environment, there are many, medical
devices, containing computer equipment-that, could be potentially controlled,
by remote: “Under certain circumstances, an attacker could exercise direct
control over medical equipment, with potentially fatal consequences - witness
the infamous hacked insulin pump, which first made headlines all the way back
in 2011” (Gold, 2017, p. 1). America is aware of the dangers, that a world
built of computers presents, and-has not done enough, to ensure the safety, of
anyone.
References
Gold, Jon. (2017). IoT security for
healthcare is in critical condition. Network World (Online). p. 1-3. Retrieved from
http://library.capella.edu/login?url=https://search.proquest.com/docview/19259113
07?accountid=27965
Comments
Post a Comment