logo

Computer and Networks Security: Threats and Risks of Self-Testing Kits and Centralized Systems in the Medical Field

Design a secure system for an imaginary device that tests blood samples for bio-markers and sends the data for analysis and tracking.

17 Pages4086 Words432 Views
   

Added on  2023-06-03

About This Document

The report highlights the vulnerabilities that may arise from setting up centralized systems in the medical field. Several threats have been identified including; the risk of leaking patient information to third parties, loss of data and denial of service attacks leading to users of the system experiencing delays in accessing the system. The report concludes by suggesting various alternatives to mitigate the risks such as applying encryption and authentication measures on the kits and the centralized system.

Computer and Networks Security: Threats and Risks of Self-Testing Kits and Centralized Systems in the Medical Field

Design a secure system for an imaginary device that tests blood samples for bio-markers and sends the data for analysis and tracking.

   Added on 2023-06-03

ShareRelated Documents
Computer and Networks Security 1
University
Student’s name
Course
Date
1
Computer and Networks Security: Threats and Risks of Self-Testing Kits and Centralized Systems in the Medical Field_1
Computer and Networks Security 2
Abstract
The following is a report that highlights the threats and risks that arise from using self-testing kits and
a centralized system to manage patient data. The report highlights the vulnerabilities that may arise from
setting up centralized systems in the medical field. Several threats have been identified including; the risk
of leaking patient information to third parties, loss of data and denial of service attacks leading to users of
the system experiencing delays in accessing the system. The impact of these risks are highlighted on a
scale depending on factors such as; the ease at which an attack can occur, the number of people affected
plus the amount of resources needed to recover the loss. The report concludes by suggesting various
alternatives to mitigate the risks such as applying encryption and authentication measures on the kits and
the centralized system. Self-testing kits are an emerging technology that should be embraced and not
discouraged due to the risks that lurk from using them.
2
Computer and Networks Security: Threats and Risks of Self-Testing Kits and Centralized Systems in the Medical Field_2
Computer and Networks Security 3
Table of Contents
Introduction...............................................................................................................................................4
Threats and Risks of Self-Testing Kits and the hospital database.....................................................4
Characteristics of the Hospital database and the data flow...............................................................5
Threat analysis of the self-testing systems...........................................................................................7
Criteria used to rate the risks In the DREAD and STRIDE analysis................................................7
The risk analysis of the self-testing kits system.................................................................................13
Secure design specification for self-testing kits.................................................................................14
Conclusion and Recommendation......................................................................................................15
References.................................................................................................................................................17
3
Computer and Networks Security: Threats and Risks of Self-Testing Kits and Centralized Systems in the Medical Field_3
Computer and Networks Security 4
Introduction
Self-medical testing kits are becoming common among users these days. The
devices help in diagnosing a patient and provide the status of their medical condition. Not only
are they beneficial to the users but also assist doctors by reducing their workload of conducting a
diagnosis on multiple patients and tracking their patients’ health (Shadbolt, 2015). With the rise
in technology, self-testing kits are also advancing in their design and properties. The gadgets can
now conduct a diagnosis on the patient and provide an output of numerous medical conditions
from just one blood test. The results of the tests can also be shared with health professionals by
the users. However, this advancement also creates a risk on the data that is transmitted through
the kits (Guise, et al, 2018).Red ozone kits are an example of self-testing kits. Hospitals are using
centralized systems to manage their data. Patients can connect to the hospital server remotely
through their user accounts. The results will be known to the user within few minutes once the
results are known by the doctor or when the sample is sent to the laboratory. The user will be
notified via text message in the phone and will also receive a message in the online portal and in
the Red-ozone kit. Red ozone can now conduct a diagnosis on the patient and provide an output
of numerous medical conditions from just one blood test. The results of these tests can also be
shared with health professionals by the users.
The following functionality is expected to be included in the Red ozone kits which are
considered as minimum system requirements:
The information of the patients can be viewed using apps in different platforms like iOS,
Android and also on the online portal using the login details through the Red ozone
website.
The sample of the blood test should only be sent from the Red ozone kit which can be
logged in using the fingerprints or the password.
The health details are obtained from the blood sampling and performing the
measurements, and uploading it to the centralized system securely. The health records
and condition of the patients should be immutable, but reviewable by health professionals
and users.
Doctors can refer the blood sample to the laboratories for further investigation of the
sample through their online portal and
4
Computer and Networks Security: Threats and Risks of Self-Testing Kits and Centralized Systems in the Medical Field_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cryptographic Algorithms for Australian My Health Record System
|6
|1809
|47

Vulnerability Assessment and Risk Management for Business Continuity
|7
|2478
|153

Healthcare Networks: Technologies, Devices, Recent Developments, Importance of Security, and Mitigation Techniques
|7
|278
|396

IoT in Healthcare: Advantages, Disadvantages, Future Scope and Mitigation Techniques
|10
|638
|407

Logical Network Design for Utopimed
|9
|1738
|432

Medical Devices and the Internet of Things - ITC560
|5
|1036
|104