Ulteriori informazioni
A tactical and technical guide to securing network-connected medical devices Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems, by John Chirillo, is an authoritative and up-to-date discussion of how to secure network-connected medical devices. Chirillo explains the relevant attack vectors, detection and prevention strategies, likely future trends, emerging threats, and the legal, regulatory, and ethical considerations that most frequently arise for professionals in this area. Beginning with an accessible introduction to the field of Internet of Medical Things devices and their recent evolution, the book moves on to a detailed and technical discussion of how to prevent the most common-and lesser known-attacks against these devices. The author offers real-world scenarios, examples, and case studies that describe the tools, techniques, and strategies you can employ immediately to improve your organization's security and mitigate risk.
Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems is perfect for cybersecurity professionals, healthcare-involved IT leadership and specialists, and medical researchers interested in protecting sensitive personal data and vital medical infrastructure.
Sommario
Preface xxvii
Foreword xxix
Part I Foundation 1 Chapter 1 Introduction to IoMT in Healthcare 3
Chapter 2 The Evolving Landscape of Wireless Technologies in Medical Devices 23
Chapter 3 Introduction to Bluetooth and Wi-Fi in Healthcare 46
Part II Attack Vectors 65 Chapter 4 Bluetooth Vulnerabilities, Tools, and Mitigation Planning 67
Chapter 5 Wi-Fi and Other Wireless Protocol Vulnerabilities 104
Chapter 6 Man-in-the-Middle Attacks on Medical Devices 161
Chapter 7 Replay and Spoofing Attacks in IoMT 196
Chapter 8 Denial of Service in Wireless Medical Networks 208
Part III Case Studies and Real-World Scenarios 227 Chapter 9 Pacemaker Hacking 229
Chapter 10 Insulin Pump Vulnerabilities and Exploits 247
Chapter 11 Attack Vector Trends and Hospital Network Breaches with IoMT Devices 263
Part IV Detection and Prevention 295 Chapter 13 Intrusion Detection and Prevention for IoMT Networks 297
Chapter 14 Machine Learning Approaches to Wireless Attack Detection 338
Chapter 15 Secure Communication Protocols for Medical Devices 366
Chapter 16 Best Practices for IoMT Device Security 391
Part V Future Trends and Emerging Threats 441 Chapter 17 5G and Beyond and Implications for IoMT Security 443
Chapter 18 Quantum Computing in Medical Device Security 459
Chapter 19 AI-Driven Attacks and Defenses in Healthcare 476
Part VI Legal and Ethical Considerations 491 Chapter 20 Regulatory Frameworks for IoMT Security 493
Chapter 21 Guidelines for Ethical Hacking in Healthcare 510
Conclusion 525
Index 527