NIT5140 Information Security: IoT Hackable Cardiac Device Case

Verified

Added on  2023/06/03

|3
|735
|203
Case Study
AI Summary
This assignment presents a case study analyzing the security vulnerabilities within Internet of Things (IoT) devices, specifically focusing on a hackable cardiac device. It begins with a literature review highlighting the importance of security in healthcare IoT implementations, emphasizing data integrity and device security. The business case centers on a St. Jude cardiac device hack, where compromised devices interacting with patient data led to security breaches and potential data integrity issues. The analysis underscores the necessity of restricting data entry points, timely system monitoring for malware detection, and firewall implementation. The conclusion emphasizes the critical role of IoT in healthcare but also the significant security risks involved, suggesting that future organizational implementations must prioritize risk mitigation. Desklib offers a wide range of resources, including past papers and solved assignments, to aid students in understanding and mastering information security concepts.
Document Page
Internet of things
*Note: Sub-titles are not captured in Xplore and should not be used
XXX-X-XXXX-XXXX-X/XX/$XX.00 ©20XX IEEE
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Abstract— Internet of things is one of technological aspect
which is one of the fast growing sectors which can be
applied to the organization. The main sector which is
focused in the sector is related to the internet of things
health care sector. The domain is taken into consideration
due to the factor that it is a crucial implementation of the
internet of things which can involve different types of
security aspects involved into the concept.
Keywords— security, data, mitigation plan
I. LITERATURE REVIEW
As stated by ([4]) the internet of things when
applied to the concept of the health care can be stated to be
one of the crucial implementation. It can be one of the areas
which involve more of the operational sector were different
types of devices can be integrated and monitored. As stated
in this sector by ([1]) the security of the devices which
would be prevailing in the interaction in order to generate a
data should be highly secured. On the other hand, as stated
by ([2]) the data in the system should involve the concept of
data integrity which would be resulting in operational
benefit.
II. BUSINESS CASE
The business case which is taken into focus is the
hackable cardiac device from the St. Jude. In the event it
was seen that the devices which were installed in the
hospital were connected by the concept of the internet of
things was hacked which mainly included the devices which
created an interaction with the patient’s data. There are
different security aspects which are involved into the
concept ([1]). This hampered the overall data which was
seen in the sector of the technology and in some of the cases
it was seen that the integrity of the data was not present. It
can be an issue if there are issue faced within the data which
is generated.
III. ANALYSIS OF THE CASE STUDY
The data which is seen in the sector should be protected by
restricting the entry point of the data so that there are no
external entities present in the system. The system should be
monitored in a timely manner so that the detection of
malware activity in the system can be detected which would
be protecting the overall functionality of the system ([1]). In
majority of the cases firewall is implemented which would
be directly securing the data which would be prevailing into
the system. The protection of the data is one of the area of
concern which can be related to the sector of working of the
internet of things.
IV. CONCLUSION
The internet of things can be considered as a very crucial
area which is related to the working of the different domains
of implementation especially the health care sector. The
crucially which is related to the data can be stated to be one
of the areas of concern which lead to different types of
unethical activity within the working of the concept. In the
near future the risk factor would be playing a role in context
of the organizational implementation.
REFERENCES
[1] Maksimović, Mirjana, Vladimir Vujović, and Branko
Periśić. "A custom Internet of Things healthcare
system." Information Systems and Technologies (CISTI),
2015 10th Iberian Conference on. IEEE, 2015.
[2] Rahmani, Amir M., et al. "Exploiting smart e-Health
gateways at the edge of healthcare Internet-of-Things: A fog
computing approach." Future Generation Computer
Systems 78 (2018): 641-658.
[3] Whitmore, Andrew, Anurag Agarwal, and Li Da Xu.
"The Internet of Things—A survey of topics and
trends." Information Systems Frontiers 17.2 (2015): 261-
274.
[4] Yuehong, Y. I. N., et al. "The internet of things in
healthcare: An overview." Journal of Industrial Information
Integration 1 (2016): 3-13
Document Page
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]