Medical device cybersecurity for engineers and manufacturers:
Cybersecurity for medical devices is no longer optional. We must not allow sensationalism or headlines to drive the discussion… Nevertheless, we must proceed with urgency. In the end, this is about preventing patient harm and preserving patient trust. A comprehensive guide to medical de...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Norwood, MA
Artech House
[2020]
|
Schriftenreihe: | Artech House information security and privacy series.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Cybersecurity for medical devices is no longer optional. We must not allow sensationalism or headlines to drive the discussion… Nevertheless, we must proceed with urgency. In the end, this is about preventing patient harm and preserving patient trust. A comprehensive guide to medical device secure lifecycle management, this is a book for engineers, managers, and regulatory specialists. Readers gain insight into the security aspects of every phase of the product lifecycle, including concept, design, implementation, supply chain, manufacturing, postmarket surveillance, maintenance, updates, and end of life. Learn how to mitigate or completely avoid common cybersecurity vulnerabilities introduced during development and production. Grow your awareness of cybersecurity development topics ranging from high-level concepts to practical solutions and tools. Get insight into emerging regulatory and customer expectations. Uncover how to minimize schedule impacts and accelerate time-to-market while still accomplishing the main goal: reducing patient and business exposure to cybersecurity risks. Medical Device Cybersecurity for Engineers and Manufacturers is designed to help all stakeholders lead the charge to a better medical device security posture and improve the resilience of our medical device ecosystem |
Beschreibung: | 1 online resource (xv, 285 pages) illustrations |
Bibliographie: | Includes bibliographical references and index |
ISBN: | 9781630818166 163081816X |
Internformat
MARC
LEADER | 00000cam a2200000 c 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1203946802 | ||
003 | OCoLC | ||
005 | 20240705115654.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 200829t20202020maua ob 001 0 eng d | ||
040 | |a UKAHL |b eng |e rda |e pn |c UKAHL |d YDX |d N$T |d EBLCP |d OCLCF |d OCLCO |d CUV |d OCLCO |d OCLCA |d SFB |d OCLCO |d IEEEE |d WAU |d OCLCO |d OCLCQ |d STF |d OCLCO |d OCLCA |d OCLCL |d TMA |d OCLCQ |d SXB | ||
019 | |a 1199584532 |a 1224365431 |a 1388675433 | ||
020 | |a 9781630818166 |q electronic bk. | ||
020 | |a 163081816X |q electronic bk. | ||
020 | |z 9781630818159 | ||
020 | |z 1630818151 | ||
035 | |a (OCoLC)1203946802 |z (OCoLC)1199584532 |z (OCoLC)1224365431 |z (OCoLC)1388675433 | ||
037 | |a 9220003 |b IEEE | ||
050 | 4 | |a R856.6 |b .W57 2020eb | |
060 | 4 | |a W 26 | |
072 | 0 | |a COM053000 | |
082 | 7 | |a 681.761 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Wirth, Axel |c (Security strategist), |e author. |1 https://id.oclc.org/worldcat/entity/E39PCjDMPr6Kxb4FVV93hTJRXb |0 http://id.loc.gov/authorities/names/no2020136787 | |
245 | 1 | 0 | |a Medical device cybersecurity for engineers and manufacturers |c Axel Wirth, Christopher Gates, Jason Smith |
264 | 1 | |a Norwood, MA |b Artech House |c [2020] | |
264 | 4 | |c ©2020 | |
300 | |a 1 online resource (xv, 285 pages) |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Artech House information security and privacy series | |
504 | |a Includes bibliographical references and index | ||
505 | 0 | |a Intro -- Foreword -- Why Secure Medical Devices? -- 1.1 The Inspiration for This Book -- 1.2 The Evolution of Cybersecurity in Health Care -- 1.3 The Unique Role of Medical Devices -- 1.4 Regulatory Environment -- 1.5 Looking Ahead -- References -- Establishing a Cybersecurity Focus -- 2.1 Security Governance -- 2.1.1 Effective Oversight -- 2.2 Building a Security-Capable Organization -- 2.2.1 Strong Governance -- 2.2.2 Ongoing Testing -- 2.2.3 Coordinated Vulnerability Disclosure -- 2.2.4 BOM: Commercial and Open-Source Software Governance -- 2.2.5 Maturity Road Map | |
505 | 8 | |a 2.2.6 Security Designed In -- 2.2.7 Section Summary -- 2.3 Regulations and Standards -- 2.3.1 Regulatory Considerations -- 2.3.2 Standards -- 2.4 Security and Lifecycle Management: High-Level Overview -- 2.4.1 Coordination between the Four Lifecycles -- 2.5 Regular Review of Security Maturity -- References -- Supply Chain Management -- 3.1 Upstream Supply Chain Management -- 3.1.1 Counterfeit Electronic Components -- 3.1.2 Third-Party Software Components -- 3.2 Security Criteria for Approved Supplier Lists -- 3.3 Downstream Supply Chain Management -- References | |
505 | 8 | |a Medical Device Manufacturers' Development Cycle -- 4.1 Introduction -- 4.2 Secure Lifecycle Diagram Overview -- 4.3 Threats vs. Vulnerabilities -- 4.4 Development Lifecycle: Concept Phase -- 4.4.1 Incremental Improvements and Secure Development -- 4.5 Development Lifecycle: Planning Phase -- 4.5.1 Security Goals -- 4.6 Development Lifecycle: Requirements Phase -- 4.6.1 Safe Harbor vs Full Encryption -- 4.7 Development Lifecycle: Design Phase -- 4.7.1 Design Phase Activities -- 4.7.2 Introduction to Vulnerability Scoring -- 4.7.3 Mitigations -- 4.7.4 Vulnerability Scoring -- 4.7.5 Scoring Rubrics | |
505 | 8 | |a 4.7.6 Alternative Approaches to Scoring -- 4.7.7 Informal Approaches to Vulnerability Assessment -- 4.8 Development Lifecycle: Implementation Phase -- 4.9 Development Lifecycle: Verification and Validation Phase -- 4.10 Development Lifecycle: Release Phase/Transfer to Production -- 4.10.1 Three Different Transfer Models -- 4.11 Development Lifecycle: Sales Phase -- 4.12 Development Lifecycle: End of Life Phase -- References -- Secure Production and Sales for Medical Device Manufacturers -- 5.1 Production -- 5.1.1 Production Line Functionality Left Enabled in a Shipped Device | |
505 | 8 | |a 5.1.2 Factory Service and Rework -- 5.1.3 Securing Production Infrastructure -- 5.2 Security Considerations in the Sales Process -- 5.2.1 MDS2 -- 5.3 Cybersecurity in Contracts -- 5.4 Managing End of Life -- References -- Medical Device Manufacturer Postmarket Lifecycle -- 6.1 Understanding FDA Expectations -- 6.2 Postmarket Surveillance and Related Activities -- 6.2.1 Monitoring TPSC Vulnerabilities -- 6.2.2 Coordinated Vulnerability Disclosures -- 6.2.3 Engagement with End-Users -- 6.2.4 ISAO -- 6.3 Updating Devices in the Field -- 6.4 Product Recalls -- References -- HDO Lifecycle | |
520 | |a Cybersecurity for medical devices is no longer optional. We must not allow sensationalism or headlines to drive the discussion… Nevertheless, we must proceed with urgency. In the end, this is about preventing patient harm and preserving patient trust. A comprehensive guide to medical device secure lifecycle management, this is a book for engineers, managers, and regulatory specialists. Readers gain insight into the security aspects of every phase of the product lifecycle, including concept, design, implementation, supply chain, manufacturing, postmarket surveillance, maintenance, updates, and end of life. Learn how to mitigate or completely avoid common cybersecurity vulnerabilities introduced during development and production. Grow your awareness of cybersecurity development topics ranging from high-level concepts to practical solutions and tools. Get insight into emerging regulatory and customer expectations. Uncover how to minimize schedule impacts and accelerate time-to-market while still accomplishing the main goal: reducing patient and business exposure to cybersecurity risks. Medical Device Cybersecurity for Engineers and Manufacturers is designed to help all stakeholders lead the charge to a better medical device security posture and improve the resilience of our medical device ecosystem | ||
588 | 0 | |a Description based on online resource, title from digital title page (viewed on March 10, 2021) | |
650 | 0 | |a Medical instruments and apparatus industry. |0 http://id.loc.gov/authorities/subjects/sh85082954 | |
650 | 0 | |a Medical instruments and apparatus |x Safety regulations. |0 http://id.loc.gov/authorities/subjects/sh85082952 | |
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 2 | |a Equipment and Supplies |x standards | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Médecine |x Appareils et instruments |x Industrie. | |
650 | 6 | |a Médecine |x Appareils et instruments |x Sécurité |x Règlements. | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Medical instruments and apparatus industry |2 fast | |
650 | 7 | |a Medical instruments and apparatus |x Safety regulations |2 fast | |
655 | 4 | |a Electronic book. | |
700 | 1 | |a Gates, Christopher, |e author. |0 http://id.loc.gov/authorities/names/no2020136785 | |
700 | 1 | |a Smith, Jason |q (Jason L.), |e author. | |
758 | |i has work: |a Medical device cybersecurity for engineers and manufacturers (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGGR4pMfdcQ9dwDb7QYmv3 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Wirth, Axel |t Medical device cybersecurity for engineers and manufacturers |d Norwood, MA : Artech House, [2020] |z 9781630818159 |w (OCoLC)1156197077 |
830 | 0 | |a Artech House information security and privacy series. |0 http://id.loc.gov/authorities/names/no2007048455 | |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2646704 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2646704 |3 Volltext | |
938 | |a Askews and Holts Library Services |b ASKH |n AH37737720 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL6371470 | ||
938 | |a YBP Library Services |b YANK |n 301616965 | ||
938 | |a EBSCOhost |b EBSC |n 2646704 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1203946802 |
---|---|
_version_ | 1813901691976679426 |
adam_text | |
any_adam_object | |
author | Wirth, Axel (Security strategist) Gates, Christopher Smith, Jason (Jason L.) |
author_GND | http://id.loc.gov/authorities/names/no2020136787 http://id.loc.gov/authorities/names/no2020136785 |
author_facet | Wirth, Axel (Security strategist) Gates, Christopher Smith, Jason (Jason L.) |
author_role | aut aut aut |
author_sort | Wirth, Axel (Security strategist) |
author_variant | a w aw c g cg j s js |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | R - Medicine |
callnumber-label | R856 |
callnumber-raw | R856.6 .W57 2020eb |
callnumber-search | R856.6 .W57 2020eb |
callnumber-sort | R 3856.6 W57 42020EB |
callnumber-subject | R - General Medicine |
collection | ZDB-4-EBA |
contents | Intro -- Foreword -- Why Secure Medical Devices? -- 1.1 The Inspiration for This Book -- 1.2 The Evolution of Cybersecurity in Health Care -- 1.3 The Unique Role of Medical Devices -- 1.4 Regulatory Environment -- 1.5 Looking Ahead -- References -- Establishing a Cybersecurity Focus -- 2.1 Security Governance -- 2.1.1 Effective Oversight -- 2.2 Building a Security-Capable Organization -- 2.2.1 Strong Governance -- 2.2.2 Ongoing Testing -- 2.2.3 Coordinated Vulnerability Disclosure -- 2.2.4 BOM: Commercial and Open-Source Software Governance -- 2.2.5 Maturity Road Map 2.2.6 Security Designed In -- 2.2.7 Section Summary -- 2.3 Regulations and Standards -- 2.3.1 Regulatory Considerations -- 2.3.2 Standards -- 2.4 Security and Lifecycle Management: High-Level Overview -- 2.4.1 Coordination between the Four Lifecycles -- 2.5 Regular Review of Security Maturity -- References -- Supply Chain Management -- 3.1 Upstream Supply Chain Management -- 3.1.1 Counterfeit Electronic Components -- 3.1.2 Third-Party Software Components -- 3.2 Security Criteria for Approved Supplier Lists -- 3.3 Downstream Supply Chain Management -- References Medical Device Manufacturers' Development Cycle -- 4.1 Introduction -- 4.2 Secure Lifecycle Diagram Overview -- 4.3 Threats vs. Vulnerabilities -- 4.4 Development Lifecycle: Concept Phase -- 4.4.1 Incremental Improvements and Secure Development -- 4.5 Development Lifecycle: Planning Phase -- 4.5.1 Security Goals -- 4.6 Development Lifecycle: Requirements Phase -- 4.6.1 Safe Harbor vs Full Encryption -- 4.7 Development Lifecycle: Design Phase -- 4.7.1 Design Phase Activities -- 4.7.2 Introduction to Vulnerability Scoring -- 4.7.3 Mitigations -- 4.7.4 Vulnerability Scoring -- 4.7.5 Scoring Rubrics 4.7.6 Alternative Approaches to Scoring -- 4.7.7 Informal Approaches to Vulnerability Assessment -- 4.8 Development Lifecycle: Implementation Phase -- 4.9 Development Lifecycle: Verification and Validation Phase -- 4.10 Development Lifecycle: Release Phase/Transfer to Production -- 4.10.1 Three Different Transfer Models -- 4.11 Development Lifecycle: Sales Phase -- 4.12 Development Lifecycle: End of Life Phase -- References -- Secure Production and Sales for Medical Device Manufacturers -- 5.1 Production -- 5.1.1 Production Line Functionality Left Enabled in a Shipped Device 5.1.2 Factory Service and Rework -- 5.1.3 Securing Production Infrastructure -- 5.2 Security Considerations in the Sales Process -- 5.2.1 MDS2 -- 5.3 Cybersecurity in Contracts -- 5.4 Managing End of Life -- References -- Medical Device Manufacturer Postmarket Lifecycle -- 6.1 Understanding FDA Expectations -- 6.2 Postmarket Surveillance and Related Activities -- 6.2.1 Monitoring TPSC Vulnerabilities -- 6.2.2 Coordinated Vulnerability Disclosures -- 6.2.3 Engagement with End-Users -- 6.2.4 ISAO -- 6.3 Updating Devices in the Field -- 6.4 Product Recalls -- References -- HDO Lifecycle |
ctrlnum | (OCoLC)1203946802 |
dewey-full | 681.761 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 681 - Precision instruments and other devices |
dewey-raw | 681.761 |
dewey-search | 681.761 |
dewey-sort | 3681.761 |
dewey-tens | 680 - Manufacture of products for specific uses |
discipline | Handwerk und Gewerbe / Verschiedene Technologien |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07817cam a2200733 c 4500</leader><controlfield tag="001">ZDB-4-EBA-on1203946802</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240705115654.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">200829t20202020maua ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UKAHL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">UKAHL</subfield><subfield code="d">YDX</subfield><subfield code="d">N$T</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">CUV</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCA</subfield><subfield code="d">SFB</subfield><subfield code="d">OCLCO</subfield><subfield code="d">IEEEE</subfield><subfield code="d">WAU</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">STF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCL</subfield><subfield code="d">TMA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SXB</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1199584532</subfield><subfield code="a">1224365431</subfield><subfield code="a">1388675433</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781630818166</subfield><subfield code="q">electronic bk.</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">163081816X</subfield><subfield code="q">electronic bk.</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781630818159</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1630818151</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1203946802</subfield><subfield code="z">(OCoLC)1199584532</subfield><subfield code="z">(OCoLC)1224365431</subfield><subfield code="z">(OCoLC)1388675433</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9220003</subfield><subfield code="b">IEEE</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">R856.6</subfield><subfield code="b">.W57 2020eb</subfield></datafield><datafield tag="060" ind1=" " ind2="4"><subfield code="a">W 26</subfield></datafield><datafield tag="072" ind1=" " ind2="0"><subfield code="a">COM053000</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">681.761</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wirth, Axel</subfield><subfield code="c">(Security strategist),</subfield><subfield code="e">author.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjDMPr6Kxb4FVV93hTJRXb</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2020136787</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Medical device cybersecurity for engineers and manufacturers</subfield><subfield code="c">Axel Wirth, Christopher Gates, Jason Smith</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Norwood, MA</subfield><subfield code="b">Artech House</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xv, 285 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Artech House information security and privacy series</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Intro -- Foreword -- Why Secure Medical Devices? -- 1.1 The Inspiration for This Book -- 1.2 The Evolution of Cybersecurity in Health Care -- 1.3 The Unique Role of Medical Devices -- 1.4 Regulatory Environment -- 1.5 Looking Ahead -- References -- Establishing a Cybersecurity Focus -- 2.1 Security Governance -- 2.1.1 Effective Oversight -- 2.2 Building a Security-Capable Organization -- 2.2.1 Strong Governance -- 2.2.2 Ongoing Testing -- 2.2.3 Coordinated Vulnerability Disclosure -- 2.2.4 BOM: Commercial and Open-Source Software Governance -- 2.2.5 Maturity Road Map</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2.2.6 Security Designed In -- 2.2.7 Section Summary -- 2.3 Regulations and Standards -- 2.3.1 Regulatory Considerations -- 2.3.2 Standards -- 2.4 Security and Lifecycle Management: High-Level Overview -- 2.4.1 Coordination between the Four Lifecycles -- 2.5 Regular Review of Security Maturity -- References -- Supply Chain Management -- 3.1 Upstream Supply Chain Management -- 3.1.1 Counterfeit Electronic Components -- 3.1.2 Third-Party Software Components -- 3.2 Security Criteria for Approved Supplier Lists -- 3.3 Downstream Supply Chain Management -- References</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Medical Device Manufacturers' Development Cycle -- 4.1 Introduction -- 4.2 Secure Lifecycle Diagram Overview -- 4.3 Threats vs. Vulnerabilities -- 4.4 Development Lifecycle: Concept Phase -- 4.4.1 Incremental Improvements and Secure Development -- 4.5 Development Lifecycle: Planning Phase -- 4.5.1 Security Goals -- 4.6 Development Lifecycle: Requirements Phase -- 4.6.1 Safe Harbor vs Full Encryption -- 4.7 Development Lifecycle: Design Phase -- 4.7.1 Design Phase Activities -- 4.7.2 Introduction to Vulnerability Scoring -- 4.7.3 Mitigations -- 4.7.4 Vulnerability Scoring -- 4.7.5 Scoring Rubrics</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4.7.6 Alternative Approaches to Scoring -- 4.7.7 Informal Approaches to Vulnerability Assessment -- 4.8 Development Lifecycle: Implementation Phase -- 4.9 Development Lifecycle: Verification and Validation Phase -- 4.10 Development Lifecycle: Release Phase/Transfer to Production -- 4.10.1 Three Different Transfer Models -- 4.11 Development Lifecycle: Sales Phase -- 4.12 Development Lifecycle: End of Life Phase -- References -- Secure Production and Sales for Medical Device Manufacturers -- 5.1 Production -- 5.1.1 Production Line Functionality Left Enabled in a Shipped Device</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">5.1.2 Factory Service and Rework -- 5.1.3 Securing Production Infrastructure -- 5.2 Security Considerations in the Sales Process -- 5.2.1 MDS2 -- 5.3 Cybersecurity in Contracts -- 5.4 Managing End of Life -- References -- Medical Device Manufacturer Postmarket Lifecycle -- 6.1 Understanding FDA Expectations -- 6.2 Postmarket Surveillance and Related Activities -- 6.2.1 Monitoring TPSC Vulnerabilities -- 6.2.2 Coordinated Vulnerability Disclosures -- 6.2.3 Engagement with End-Users -- 6.2.4 ISAO -- 6.3 Updating Devices in the Field -- 6.4 Product Recalls -- References -- HDO Lifecycle</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cybersecurity for medical devices is no longer optional. We must not allow sensationalism or headlines to drive the discussion&hellip; Nevertheless, we must proceed with urgency. In the end, this is about preventing patient harm and preserving patient trust. A comprehensive guide to medical device secure lifecycle management, this is a book for engineers, managers, and regulatory specialists. Readers gain insight into the security aspects of every phase of the product lifecycle, including concept, design, implementation, supply chain, manufacturing, postmarket surveillance, maintenance, updates, and end of life. Learn how to mitigate or completely avoid common cybersecurity vulnerabilities introduced during development and production. Grow your awareness of cybersecurity development topics ranging from high-level concepts to practical solutions and tools. Get insight into emerging regulatory and customer expectations. Uncover how to minimize schedule impacts and accelerate time-to-market while still accomplishing the main goal: reducing patient and business exposure to cybersecurity risks. Medical Device Cybersecurity for Engineers and Manufacturers is designed to help all stakeholders lead the charge to a better medical device security posture and improve the resilience of our medical device ecosystem</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource, title from digital title page (viewed on March 10, 2021)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Medical instruments and apparatus industry.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85082954</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Medical instruments and apparatus</subfield><subfield code="x">Safety regulations.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85082952</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh90001862</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Equipment and Supplies</subfield><subfield code="x">standards</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Médecine</subfield><subfield code="x">Appareils et instruments</subfield><subfield code="x">Industrie.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Médecine</subfield><subfield code="x">Appareils et instruments</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Règlements.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Medical instruments and apparatus industry</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Medical instruments and apparatus</subfield><subfield code="x">Safety regulations</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic book.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gates, Christopher,</subfield><subfield code="e">author.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2020136785</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Smith, Jason</subfield><subfield code="q">(Jason L.),</subfield><subfield code="e">author.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Medical device cybersecurity for engineers and manufacturers (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGGR4pMfdcQ9dwDb7QYmv3</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Wirth, Axel</subfield><subfield code="t">Medical device cybersecurity for engineers and manufacturers</subfield><subfield code="d">Norwood, MA : Artech House, [2020]</subfield><subfield code="z">9781630818159</subfield><subfield code="w">(OCoLC)1156197077</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Artech House information security and privacy series.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2007048455</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2646704</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2646704</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH37737720</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL6371470</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">301616965</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2646704</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield></record></collection> |
genre | Electronic book. |
genre_facet | Electronic book. |
id | ZDB-4-EBA-on1203946802 |
illustrated | Illustrated |
indexdate | 2024-10-25T15:50:55Z |
institution | BVB |
isbn | 9781630818166 163081816X |
language | English |
oclc_num | 1203946802 |
open_access_boolean | |
owner | MAIN |
owner_facet | MAIN |
physical | 1 online resource (xv, 285 pages) illustrations |
psigel | ZDB-4-EBA |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Artech House |
record_format | marc |
series | Artech House information security and privacy series. |
series2 | Artech House information security and privacy series |
spelling | Wirth, Axel (Security strategist), author. https://id.oclc.org/worldcat/entity/E39PCjDMPr6Kxb4FVV93hTJRXb http://id.loc.gov/authorities/names/no2020136787 Medical device cybersecurity for engineers and manufacturers Axel Wirth, Christopher Gates, Jason Smith Norwood, MA Artech House [2020] ©2020 1 online resource (xv, 285 pages) illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Artech House information security and privacy series Includes bibliographical references and index Intro -- Foreword -- Why Secure Medical Devices? -- 1.1 The Inspiration for This Book -- 1.2 The Evolution of Cybersecurity in Health Care -- 1.3 The Unique Role of Medical Devices -- 1.4 Regulatory Environment -- 1.5 Looking Ahead -- References -- Establishing a Cybersecurity Focus -- 2.1 Security Governance -- 2.1.1 Effective Oversight -- 2.2 Building a Security-Capable Organization -- 2.2.1 Strong Governance -- 2.2.2 Ongoing Testing -- 2.2.3 Coordinated Vulnerability Disclosure -- 2.2.4 BOM: Commercial and Open-Source Software Governance -- 2.2.5 Maturity Road Map 2.2.6 Security Designed In -- 2.2.7 Section Summary -- 2.3 Regulations and Standards -- 2.3.1 Regulatory Considerations -- 2.3.2 Standards -- 2.4 Security and Lifecycle Management: High-Level Overview -- 2.4.1 Coordination between the Four Lifecycles -- 2.5 Regular Review of Security Maturity -- References -- Supply Chain Management -- 3.1 Upstream Supply Chain Management -- 3.1.1 Counterfeit Electronic Components -- 3.1.2 Third-Party Software Components -- 3.2 Security Criteria for Approved Supplier Lists -- 3.3 Downstream Supply Chain Management -- References Medical Device Manufacturers' Development Cycle -- 4.1 Introduction -- 4.2 Secure Lifecycle Diagram Overview -- 4.3 Threats vs. Vulnerabilities -- 4.4 Development Lifecycle: Concept Phase -- 4.4.1 Incremental Improvements and Secure Development -- 4.5 Development Lifecycle: Planning Phase -- 4.5.1 Security Goals -- 4.6 Development Lifecycle: Requirements Phase -- 4.6.1 Safe Harbor vs Full Encryption -- 4.7 Development Lifecycle: Design Phase -- 4.7.1 Design Phase Activities -- 4.7.2 Introduction to Vulnerability Scoring -- 4.7.3 Mitigations -- 4.7.4 Vulnerability Scoring -- 4.7.5 Scoring Rubrics 4.7.6 Alternative Approaches to Scoring -- 4.7.7 Informal Approaches to Vulnerability Assessment -- 4.8 Development Lifecycle: Implementation Phase -- 4.9 Development Lifecycle: Verification and Validation Phase -- 4.10 Development Lifecycle: Release Phase/Transfer to Production -- 4.10.1 Three Different Transfer Models -- 4.11 Development Lifecycle: Sales Phase -- 4.12 Development Lifecycle: End of Life Phase -- References -- Secure Production and Sales for Medical Device Manufacturers -- 5.1 Production -- 5.1.1 Production Line Functionality Left Enabled in a Shipped Device 5.1.2 Factory Service and Rework -- 5.1.3 Securing Production Infrastructure -- 5.2 Security Considerations in the Sales Process -- 5.2.1 MDS2 -- 5.3 Cybersecurity in Contracts -- 5.4 Managing End of Life -- References -- Medical Device Manufacturer Postmarket Lifecycle -- 6.1 Understanding FDA Expectations -- 6.2 Postmarket Surveillance and Related Activities -- 6.2.1 Monitoring TPSC Vulnerabilities -- 6.2.2 Coordinated Vulnerability Disclosures -- 6.2.3 Engagement with End-Users -- 6.2.4 ISAO -- 6.3 Updating Devices in the Field -- 6.4 Product Recalls -- References -- HDO Lifecycle Cybersecurity for medical devices is no longer optional. We must not allow sensationalism or headlines to drive the discussion… Nevertheless, we must proceed with urgency. In the end, this is about preventing patient harm and preserving patient trust. A comprehensive guide to medical device secure lifecycle management, this is a book for engineers, managers, and regulatory specialists. Readers gain insight into the security aspects of every phase of the product lifecycle, including concept, design, implementation, supply chain, manufacturing, postmarket surveillance, maintenance, updates, and end of life. Learn how to mitigate or completely avoid common cybersecurity vulnerabilities introduced during development and production. Grow your awareness of cybersecurity development topics ranging from high-level concepts to practical solutions and tools. Get insight into emerging regulatory and customer expectations. Uncover how to minimize schedule impacts and accelerate time-to-market while still accomplishing the main goal: reducing patient and business exposure to cybersecurity risks. Medical Device Cybersecurity for Engineers and Manufacturers is designed to help all stakeholders lead the charge to a better medical device security posture and improve the resilience of our medical device ecosystem Description based on online resource, title from digital title page (viewed on March 10, 2021) Medical instruments and apparatus industry. http://id.loc.gov/authorities/subjects/sh85082954 Medical instruments and apparatus Safety regulations. http://id.loc.gov/authorities/subjects/sh85082952 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Equipment and Supplies standards Computer Security https://id.nlm.nih.gov/mesh/D016494 Médecine Appareils et instruments Industrie. Médecine Appareils et instruments Sécurité Règlements. Sécurité informatique. Computer security fast Medical instruments and apparatus industry fast Medical instruments and apparatus Safety regulations fast Electronic book. Gates, Christopher, author. http://id.loc.gov/authorities/names/no2020136785 Smith, Jason (Jason L.), author. has work: Medical device cybersecurity for engineers and manufacturers (Text) https://id.oclc.org/worldcat/entity/E39PCGGR4pMfdcQ9dwDb7QYmv3 https://id.oclc.org/worldcat/ontology/hasWork Print version: Wirth, Axel Medical device cybersecurity for engineers and manufacturers Norwood, MA : Artech House, [2020] 9781630818159 (OCoLC)1156197077 Artech House information security and privacy series. http://id.loc.gov/authorities/names/no2007048455 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2646704 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2646704 Volltext |
spellingShingle | Wirth, Axel (Security strategist) Gates, Christopher Smith, Jason (Jason L.) Medical device cybersecurity for engineers and manufacturers Artech House information security and privacy series. Intro -- Foreword -- Why Secure Medical Devices? -- 1.1 The Inspiration for This Book -- 1.2 The Evolution of Cybersecurity in Health Care -- 1.3 The Unique Role of Medical Devices -- 1.4 Regulatory Environment -- 1.5 Looking Ahead -- References -- Establishing a Cybersecurity Focus -- 2.1 Security Governance -- 2.1.1 Effective Oversight -- 2.2 Building a Security-Capable Organization -- 2.2.1 Strong Governance -- 2.2.2 Ongoing Testing -- 2.2.3 Coordinated Vulnerability Disclosure -- 2.2.4 BOM: Commercial and Open-Source Software Governance -- 2.2.5 Maturity Road Map 2.2.6 Security Designed In -- 2.2.7 Section Summary -- 2.3 Regulations and Standards -- 2.3.1 Regulatory Considerations -- 2.3.2 Standards -- 2.4 Security and Lifecycle Management: High-Level Overview -- 2.4.1 Coordination between the Four Lifecycles -- 2.5 Regular Review of Security Maturity -- References -- Supply Chain Management -- 3.1 Upstream Supply Chain Management -- 3.1.1 Counterfeit Electronic Components -- 3.1.2 Third-Party Software Components -- 3.2 Security Criteria for Approved Supplier Lists -- 3.3 Downstream Supply Chain Management -- References Medical Device Manufacturers' Development Cycle -- 4.1 Introduction -- 4.2 Secure Lifecycle Diagram Overview -- 4.3 Threats vs. Vulnerabilities -- 4.4 Development Lifecycle: Concept Phase -- 4.4.1 Incremental Improvements and Secure Development -- 4.5 Development Lifecycle: Planning Phase -- 4.5.1 Security Goals -- 4.6 Development Lifecycle: Requirements Phase -- 4.6.1 Safe Harbor vs Full Encryption -- 4.7 Development Lifecycle: Design Phase -- 4.7.1 Design Phase Activities -- 4.7.2 Introduction to Vulnerability Scoring -- 4.7.3 Mitigations -- 4.7.4 Vulnerability Scoring -- 4.7.5 Scoring Rubrics 4.7.6 Alternative Approaches to Scoring -- 4.7.7 Informal Approaches to Vulnerability Assessment -- 4.8 Development Lifecycle: Implementation Phase -- 4.9 Development Lifecycle: Verification and Validation Phase -- 4.10 Development Lifecycle: Release Phase/Transfer to Production -- 4.10.1 Three Different Transfer Models -- 4.11 Development Lifecycle: Sales Phase -- 4.12 Development Lifecycle: End of Life Phase -- References -- Secure Production and Sales for Medical Device Manufacturers -- 5.1 Production -- 5.1.1 Production Line Functionality Left Enabled in a Shipped Device 5.1.2 Factory Service and Rework -- 5.1.3 Securing Production Infrastructure -- 5.2 Security Considerations in the Sales Process -- 5.2.1 MDS2 -- 5.3 Cybersecurity in Contracts -- 5.4 Managing End of Life -- References -- Medical Device Manufacturer Postmarket Lifecycle -- 6.1 Understanding FDA Expectations -- 6.2 Postmarket Surveillance and Related Activities -- 6.2.1 Monitoring TPSC Vulnerabilities -- 6.2.2 Coordinated Vulnerability Disclosures -- 6.2.3 Engagement with End-Users -- 6.2.4 ISAO -- 6.3 Updating Devices in the Field -- 6.4 Product Recalls -- References -- HDO Lifecycle Medical instruments and apparatus industry. http://id.loc.gov/authorities/subjects/sh85082954 Medical instruments and apparatus Safety regulations. http://id.loc.gov/authorities/subjects/sh85082952 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Equipment and Supplies standards Computer Security https://id.nlm.nih.gov/mesh/D016494 Médecine Appareils et instruments Industrie. Médecine Appareils et instruments Sécurité Règlements. Sécurité informatique. Computer security fast Medical instruments and apparatus industry fast Medical instruments and apparatus Safety regulations fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85082954 http://id.loc.gov/authorities/subjects/sh85082952 http://id.loc.gov/authorities/subjects/sh90001862 https://id.nlm.nih.gov/mesh/D016494 |
title | Medical device cybersecurity for engineers and manufacturers |
title_auth | Medical device cybersecurity for engineers and manufacturers |
title_exact_search | Medical device cybersecurity for engineers and manufacturers |
title_full | Medical device cybersecurity for engineers and manufacturers Axel Wirth, Christopher Gates, Jason Smith |
title_fullStr | Medical device cybersecurity for engineers and manufacturers Axel Wirth, Christopher Gates, Jason Smith |
title_full_unstemmed | Medical device cybersecurity for engineers and manufacturers Axel Wirth, Christopher Gates, Jason Smith |
title_short | Medical device cybersecurity for engineers and manufacturers |
title_sort | medical device cybersecurity for engineers and manufacturers |
topic | Medical instruments and apparatus industry. http://id.loc.gov/authorities/subjects/sh85082954 Medical instruments and apparatus Safety regulations. http://id.loc.gov/authorities/subjects/sh85082952 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Equipment and Supplies standards Computer Security https://id.nlm.nih.gov/mesh/D016494 Médecine Appareils et instruments Industrie. Médecine Appareils et instruments Sécurité Règlements. Sécurité informatique. Computer security fast Medical instruments and apparatus industry fast Medical instruments and apparatus Safety regulations fast |
topic_facet | Medical instruments and apparatus industry. Medical instruments and apparatus Safety regulations. Computer security. Equipment and Supplies standards Computer Security Médecine Appareils et instruments Industrie. Médecine Appareils et instruments Sécurité Règlements. Sécurité informatique. Computer security Medical instruments and apparatus industry Medical instruments and apparatus Safety regulations Electronic book. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2646704 |
work_keys_str_mv | AT wirthaxel medicaldevicecybersecurityforengineersandmanufacturers AT gateschristopher medicaldevicecybersecurityforengineersandmanufacturers AT smithjason medicaldevicecybersecurityforengineersandmanufacturers |