{"id":1266,"date":"2022-09-20T20:53:33","date_gmt":"2022-09-21T01:53:33","guid":{"rendered":"https:\/\/dda.ndus.edu\/ddreview\/?p=1266"},"modified":"2023-04-18T16:22:18","modified_gmt":"2023-04-18T21:22:18","slug":"security-vulnerability-in-medical-iot-devices","status":"publish","type":"post","link":"https:\/\/dda.ndus.edu\/ddreview\/security-vulnerability-in-medical-iot-devices\/","title":{"rendered":"Security Vulnerability in Medical IoT Devices"},"content":{"rendered":"\n<p class=\"has-drop-cap\">According to the Palo Alto Networks threat report,<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_1\" class=\"footnote_plugin_tooltip_text\">[1]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_1\" class=\"footnote_tooltip position\" >Palo Alto Networks, \u201c2020 Unit 42 IoT Threat Report,\u201d <a rel=\"noreferrer noopener\" href=\"https:\/\/unit42.paloaltonetworks.com\/iot-threat-report-2020\/\" target=\"_blank\"><span class=\"footnote_url_wrap\">https:\/\/unit42.paloaltonetworks.com\/iot-threat-report-2020\/<\/span><\/a><\/span><\/span> 98 percent of IoT (Internet of Things) device traffic is unencrypted, exposing personal data on hospital networks. In addition, 72 percent of healthcare Virtual Local Area Networks (VLANs) mix IoT and IT assets, allowing malware to spread from computers to vulnerable IoT devices on the same network. These vulnerabilities allow hackers to access network traffic and collect confidential information, then exploit that data for profit on the Dark Web or alter data to cause harm.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"784\" height=\"1024\" src=\"https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_01-784x1024.png\" alt=\"\" class=\"wp-image-1339\" srcset=\"https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_01-784x1024.png 784w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_01-230x300.png 230w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_01-768x1003.png 768w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_01-600x784.png 600w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_01-1176x1536.png 1176w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_01-150x196.png 150w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_01-300x392.png 300w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_01-696x909.png 696w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_01-1068x1395.png 1068w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_01-321x420.png 321w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_01.png 1393w\" sizes=\"(max-width: 784px) 100vw, 784px\" \/><\/figure>\n\n\n\n<p>Major cyberattacks, aimed at either disrupting or extorting a system, have always targeted significant entities such as power grids, supervisory control and data acquisition (SCADA) system architecture, and healthcare systems. Manufacturing and healthcare systems are so susceptible that they will suffer 74 percent of all attacks by 2025, according to the Palo Alto report. Also, vendors\u2019 and manufacturers\u2019 software can be compromised and allow hackers to access devices, such as an insulin drip.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_2\" class=\"footnote_plugin_tooltip_text\">[2]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_2\" class=\"footnote_tooltip position\" >Joyia, G. J., Liaqat, R. M., Farooq, A., &amp; Rehman, S. (2017). \u201cInternet of medical things (IoMT): Applications, benefits and future challenges in healthcare domain.\u201d J. Commun., 12(4),&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\" >Continue reading<\/span><\/span><\/span><\/p>\n\n\n\n<p>In recent years, ransomware attacks on hospitals have increased, including the famous WannaCry hack aimed at hospital CCTV cameras. Malicious users block authenticated users from access to their files and hold the data hostage until a ransom is paid. Countermeasures are important to protect system files and promote computer hygiene, such as up-to-date antivirus software, data back-up (preferably on an external or offsite drive), disabling unused ports and applying any security patches for the operating system such as Windows.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_3\" class=\"footnote_plugin_tooltip_text\">[3]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_3\" class=\"footnote_tooltip position\" >Zou, Y., Roundy, K., Tamersoy, A., Shintre, S., Roturier, J., &amp; Schaub, F. (2020, April), \u201cExamining the adoption and abandonment of security, privacy, and identity theft protection&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\" >Continue reading<\/span><\/span><\/span> Regardless of the attack sources\u2014criminal organizations, nation states or script kiddies\u2014cyberwarfare is tremendously harmful. Exfiltrated patient data can be used for identity theft and other forms of fraud. Stealing confidential patient information contributes significantly to the ongoing rise in identity fraud nationwide.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_4\" class=\"footnote_plugin_tooltip_text\">[4]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_4\" class=\"footnote_tooltip position\" >Humayun, M., Jhanjhi, N. Z., Alsayat, A., &amp; Ponnusamy, V. (2021). \u201cInternet of things and ransomware: Evolution, mitigation and prevention,\u201d Egyptian Informatics Journal, 22(1), 105-117.<\/span><\/span>&nbsp;<\/p>\n\n\n\n<p>Worse, patient information can be altered\u2014or deleted\u2014regarding treatment and drug names and dosages, with potentially catastrophic results. Patients can suffer severe injury or even die if a hacker gains unauthorized access to monitoring or other medical equipment and outputs false data. Similarly, devices administering medicine, such as infusion and insulin pumps, can be shut off or dosages wrongly increased by hackers. Imagine the potential harm if a hospital\u2019s power, including backup generators, is turned off. Monitoring screens go blank, or cardiac devices are compromised, or access to the blood supply is blocked during major surgery, such as a double transplant.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1024\" height=\"715\" src=\"https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_02-1024x715.png\" alt=\"\" class=\"wp-image-1340\" srcset=\"https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_02-1024x715.png 1024w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_02-300x209.png 300w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_02-768x536.png 768w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_02-600x419.png 600w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_02-1536x1072.png 1536w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_02-2048x1429.png 2048w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_02-150x105.png 150w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_02-696x486.png 696w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_02-1068x745.png 1068w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_02-1920x1340.png 1920w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_02-602x420.png 602w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_02-100x70.png 100w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>In the graph above, non-secure IoT devices account for about half of reported cyber-exploits in all industries.<\/p>\n\n\n\n<p>User online practices represent 26 percent of all threats. Half of these concern password issues, followed by phishing and cryptojacking. Malware accounts for a third of threats, shared by worm attacks at 12 percent and almost equally by ransomware, backdoor trojans and botnets at 6, 7 and 8 percent, respectively. The largest proportion of threats involve exploits at 41 percent, with network scans at 14 percent; remote code execution, command injection, buffer overflow and miscellaneous attacks at 5 percent each; SQL injection at 4 percent; and Zero-Day attacks at 3 percent.&nbsp;<\/p>\n\n\n\n<p>Based on the report, when security measures such as patches, updates, password and asset management policies are continuously implemented, user-level threats would decrease from 26 to 13 percent, malware threats from 33 to 13 percent, and exploits from 41 to 27 percent.&nbsp;<\/p>\n\n\n\n<p>Cybersecurity in healthcare needs an urgent upgrade, especially since medical devices can be hacked without any indication. Information protection should not become important only after a data breach but throughout the security design that houses both highly secured connections and IoT devices, which are not highly secured connections. When organizations fail to upgrade security due to budget restraints, they might have to pay a hefty ransom to have the malware flushed out of their systems and their data released.<\/p>\n\n\n\n<h1>Vulnerability<\/h1>\n\n\n\n<p>Ransomware attacks have increased tremendously since their first detection in 1989.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_5\" class=\"footnote_plugin_tooltip_text\">[5]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_5\" class=\"footnote_tooltip position\" >Leo, P., Isik, \u00d6., &amp; Muhly, F. (2022). \u201cThe Ransomware Dilemma,\u201d MIT Sloan Management Review, 63(4), 13-15.<\/span><\/span> The cost of ransomware attacks has skyrocketed from $10 to $210 billion from 2015 to 2021, which illustrates the importance of securing IoT devices.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_6\" class=\"footnote_plugin_tooltip_text\">[6]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_6\" class=\"footnote_tooltip position\" >Keary, J. (2022), \u201cRebuffing Russian Ransomware: How the United States Should Use the Colonial Pipeline and JBS USA Hackings as a Defense Guide for Ransomware,\u201d Seton Hall University Law Library,&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\" >Continue reading<\/span><\/span><\/span> Examples of ransomware targets in 2021 include Kaseya, an IT management and security software company, ($70 million in Bitcoin),<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_7\" class=\"footnote_plugin_tooltip_text\">[7]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_7\" class=\"footnote_tooltip position\" >Mohurle, S., &amp; Patil, M. (2017), \u201cA brief study of wannacry threat: Ransomware attack 2017,\u201d International Journal of Advanced Research in Computer Science, 8(5), 1938-1940.<\/span><\/span> and JBS USA Holdings, Inc., a food processing company, ($11 million in Bitcoin).<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_8\" class=\"footnote_plugin_tooltip_text\">[8]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_8\" class=\"footnote_tooltip position\" >Bunge, J., \u201cJBS Paid $11 Million to Resolve Ransomware Attack,\u201d Wall Street Journal, June 9, 2021.<\/span><\/span><\/p>\n\n\n\n<p>Both Kaseya and JBS were hacked by REvil, a Russian cybercriminal organization, which attacked more than 360 American targets in 2021. REvil then leveraged Kaseya\u2019s \u201cconnectivity to the larger internet ecosystem to infect more than 1,500 organizations around the world.\u201d<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_9\" class=\"footnote_plugin_tooltip_text\">[9]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_9\" class=\"footnote_tooltip position\" >Collier, K., \u201cMajor Russian-speaking ransomware gag behind JBS and Kaseya attacks goes offline,\u201d NBC News,&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\" >Continue reading<\/span><\/span><\/span><\/p>\n\n\n\n<p>Among the major areas where IoT devices are primarily targeted, the healthcare industry leads the way at 41 percent of attacks, as shown in the graph below, because of the ease with which medical devices can be penetrated.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_10\" class=\"footnote_plugin_tooltip_text\">[10]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_10\" class=\"footnote_tooltip position\" >Yaqoob, I., Ahmed, E., ur Rehman, M. H., Ahmed, A. I. A., Al-garadi, M. A., Imran, M., &amp; Guizani, M. (2017), \u201cThe rise of ransomware and emerging security challenges in the Internet of&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\" >Continue reading<\/span><\/span><\/span> The tremendous growth of the internet has made device accessibility more prolific. Imaging devices alone account for 51 percent of threats to healthcare organizations. As a result, there have been many high-profile breaches that amplified the need for robust cybersecurity measures to combat ransomware attacks.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" src=\"https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_03-1024x933.png\" alt=\"\" class=\"wp-image-1341\" width=\"450\" height=\"408\" srcset=\"https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_03-300x273.png 300w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_03-150x137.png 150w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><\/figure><\/div>\n\n\n\n<p>Malicious network and Denial of Service (DoS) attacks are the most dangerous. Today\u2019s doctors and nurses must stay connected to various medical devices in real-time since these machines are integral to diagnosis and treatment.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_11\" class=\"footnote_plugin_tooltip_text\">[11]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_11\" class=\"footnote_tooltip position\" >Hassija, V., Chamola, V., Bajpai, B. C., &amp; Zeadally, S. (2021). \u201cSecurity issues in implantable medic al devices: Fact or fiction?\u201d Sustainable Cities and Society, 66, 102552<\/span><\/span> An additional area of concern involves vendors and manufacturers whose software can be compromised, which might allow hackers access to medical devices.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_12\" class=\"footnote_plugin_tooltip_text\">[12]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_12\" class=\"footnote_tooltip position\" >Joyia, G. J., Liaqat, R. M., Farooq, A., &amp; Rehman, S. (2017). \u201cInternet of medical things (IoMT): Applications, benefits and future challenges in healthcare domain.\u201d J. Commun., 12(4),&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\" >Continue reading<\/span><\/span><\/span>&nbsp;<\/p>\n\n\n\n<p>The graphic below shows how hackers can perform various malicious attacks on any system without security improvements or updates.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_13\" class=\"footnote_plugin_tooltip_text\">[13]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_13\" class=\"footnote_tooltip position\" >Chacko, A., &amp; Hayajneh, T. (2018). \u201cSecurity and privacy issues with IoT in healthcare.\u201d EAI Endorsed Transactions on Pervasive Health and Technology, 4(14)&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\" >Continue reading<\/span><\/span><\/span> Because the statistics show more than 50 percent probability of exploit success, it is a matter of time before half of the healthcare systems are hacked from outside threats, especially from Zero-Day attacks that, since new, are difficult to detect by intrusion and prevention systems (IDPS).<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_14\" class=\"footnote_plugin_tooltip_text\">[14]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_14\" class=\"footnote_tooltip position\" >McGowan, A., Sittig, S., &amp; Andel, T. (2021). \u201cMedical Internet of Things: A Survey of the Current Threat and Vulnerability Landscape.\u201d In Proceedings of the 54th Hawaii International&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\" >Continue reading<\/span><\/span><\/span> Fortunately, based on the Palo Alto report, these account for only 3 percent of exploits.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"721\" height=\"1024\" src=\"https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_04-721x1024.png\" alt=\"\" class=\"wp-image-1342\" srcset=\"https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_04-721x1024.png 721w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_04-211x300.png 211w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_04-768x1091.png 768w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_04-600x853.png 600w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_04-1081x1536.png 1081w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_04-150x213.png 150w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_04-300x426.png 300w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_04-696x989.png 696w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_04-1068x1518.png 1068w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_04-296x420.png 296w, https:\/\/dda.ndus.edu\/ddreview\/wp-content\/uploads\/sites\/18\/2022\/09\/security_04.png 1283w\" sizes=\"(max-width: 721px) 100vw, 721px\" \/><\/figure>\n\n\n\n<h1>Prevention<\/h1>\n\n\n\n<p>It is imperative to focus on security from a defensive perspective before an IoT system falls for ransomware. Security measures to prevent unauthorized access must use a high level of encryption, server backups, access controls, virus scanners, and up-to-date security software and updates. Data security is always a concern regardless of the type of industry in which the data is located.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_15\" class=\"footnote_plugin_tooltip_text\">[15]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_15\" class=\"footnote_tooltip position\" >Somasundaram, R., &amp; Thirugnanam, M. (2021). \u201cReview of security challenges in healthcare internet of things.\u201d Wireless Networks, 27(8), 5503-5509.<\/span><\/span>&nbsp;<\/p>\n\n\n\n<p>Cybersecurity is a continuous process in which vendors and consumers must work unequivocally in sync. At this point, most healthcare centers appear to provide adequate security, but it\u2019s impossible to verify since many if not most intrusions are never reported, due to the potential negative economic and reputational damage.<\/p>\n\n\n\n<p>Encryption is critical, along with routine updates and constant research to understand the attack surface and help develop better-secured devices. A robust authentication algorithm will make it harder to access a device maliciously.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_16\" class=\"footnote_plugin_tooltip_text\">[16]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_16\" class=\"footnote_tooltip position\" >Kolokotronis, N., &amp; Shiaeles, S. (Eds.). (2021). Cyber-Security Threats, Actors, and Dynamic Mitigation, CRC Press (2021).<\/span><\/span> The Health Insurance Portability and Accountability Act (HIPAA) is responsible for the federal protection of individual healthcare data, while the National Institute of Standards and Technology (NIST) is the agency that promotes American innovation in technology to provide suitable security measures and guidelines to organizations, but more investment is needed to prevent data leaks and cyberattacks.&nbsp;<\/p>\n\n\n\n<p>Many organizations choose not to upgrade their whole system by investing in new hardware and software, due to the massive cost and instead patch their systems. This enables breaches and even far more expensive ransomware attacks.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_17\" class=\"footnote_plugin_tooltip_text\">[17]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_17\" class=\"footnote_tooltip position\" >Loukaka, A., &amp; Rahman, S. (2017). \u201cDiscovering new cyber protection approaches from a security professional prospective.\u201d International Journal of Computer Networks &amp; Communications&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\" >Continue reading<\/span><\/span><\/span><\/p>\n\n\n\n<p>Since cyber-threat vectors are growing quickly, constant and rapid countermeasures need to be applied. Healthcare systems are increasingly being targeted because of the typical lack of security overall and because IoT devices are easily accessible. Cybercriminals understand not only how to exploit systems but also how to remain undetected for months after a breach.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_18\" class=\"footnote_plugin_tooltip_text\">[18]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_18\" class=\"footnote_tooltip position\" >Shepherd, A., Kesa, C., &amp; Cooper, J. (2020). \u201cInternet of Things (IOT) Medical Security: Taxonomy and Perception.\u201d Issues in Information Systems, 21(3).<\/span><\/span> Outsider attacks, however, are not as successful as insider attacks.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_19\" class=\"footnote_plugin_tooltip_text\">[19]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_19\" class=\"footnote_tooltip position\" >Chanal, P. M., &amp; Kakkasageri, M. S. (2021). \u201cPreserving Data Confidentiality in Internet of Things.\u201d SN Computer Science, 2(1), 1-12.<\/span><\/span> The configuration of internal systems is vital, therefore, and any error can become costly. Also, disgruntled employees might leave themselves backdoor access to extract or upload a virus to disrupt daily business needs. The security apparatus must be appropriately configured to target such specific threats. Individual health information is federally mandated to be protected, and medical facilities must understand the risk of using IoT devices without proper cybersecurity.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_20\" class=\"footnote_plugin_tooltip_text\">[20]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_20\" class=\"footnote_tooltip position\" >Nadikattu, R. R. (2020). \u201cData Safety and Integrity Issue in IoT.\u201d International Journal for Research in Applied Science &amp; Engineering Technology (IJRASET), 8(VI).<\/span><\/span> <span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_21\" class=\"footnote_plugin_tooltip_text\">[21]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_21\" class=\"footnote_tooltip position\" >Mishra, B., &amp; Padhy, N. (2021). \u201cEnhancing the security, reliability, and data integrity issues in the internet of things by implementing blockchain strategy in mining: challenges and&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\" >Continue reading<\/span><\/span><\/span> <span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_22\" class=\"footnote_plugin_tooltip_text\">[22]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_22\" class=\"footnote_tooltip position\" >Atlam, H. F., Azad, M. A., Alzahrani, A. G., &amp; Wills, G. (2020). \u201cA Review of Blockchain in Internet of Things and AI.\u201d Big Data and Cognitive Computing, 4(4), 28.<\/span><\/span><\/p>\n\n\n\n<h1>Implementation<\/h1>\n\n\n\n<p>First, there is an important secure-oriented approach to make sure an IoT system is protected from cyber harm. The following approach is part of continuous computer hygiene that any organization or user can apply that involves changing default passwords, system patching, network segmentation, asset inventory and Bluetooth technology.&nbsp;<\/p>\n\n\n\n<h4>\u2022 Default Passwords<\/h4>\n\n\n\n<p>Computing hardware typically requires a password to authenticate. When a default password is provided, it needs to be changed by the user. Much stolen data is available on the Dark Web, a collection of internet sites accessible with a specialized browser, where users can buy and exchange stolen data. Good password hygiene must be alpha numeric with at least one special character and an uppercase. Also, the password must be changed every 60 to 90 days to prevent brute force attacks, which hackers use to discover passwords in plain text.<\/p>\n\n\n\n<h4>\u2022 Unpatched Systems<\/h4>\n\n\n\n<p>As with passwords, unpatched systems are a prime target for hackers and the main reason for the increased ransomware attacks. A patch management policy must automate security updates, as in Microsoft software, so that hardware and software are up to date, especially on critical systems.<\/p>\n\n\n\n<h4>\u2022 Network Segmentation<\/h4>\n\n\n\n<p>Network segmentation is imperative to limit malicious users from progressing from creating a breach to moving easily within the network and altering or stealing data. IoT devices must be located on a different system segment to be isolated from direct unauthorized access.<\/p>\n\n\n\n<h4>\u2022 Asset Inventory<\/h4>\n\n\n\n<p>Maintaining an active inventory of network-approved devices can facilitate patch implement when attacked, such that bad actors cannot use authorized or unauthorized devices to deploy malware and learn the system\u2019s configuration or analyze data traffic.<\/p>\n\n\n\n<h4>\u2022 Bluetooth Connection<\/h4>\n\n\n\n<p>Bluetooth is the go-to method for IoT devices to connect to a network. However, Bluetooth is susceptible to a man-in-the-middle attack in which an attacker gets in between a user and the application\u2014for example, by providing a free but malicious public WIFI hotspot\u2014to eavesdrop or steal or alter the communication or data. Turning off the discoverable option when paired with a device is recommended so no malicious user can detect the connection since it\u2019s invisible. Also, malicious hotspots typically aren\u2019t password protected.<\/p>\n\n\n\n<p>Second, integrity ensures that the data is not being altered by unauthorized users.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_23\" class=\"footnote_plugin_tooltip_text\">[23]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_23\" class=\"footnote_tooltip position\" >Tang, S., &amp; Xie, Y. (2021). \u201cAvailability Modeling and Performance Improving of a Healthcare Internet of Things (IoT) System.\u201d IoT, 2(2), 310-325.<\/span><\/span> <span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_24\" class=\"footnote_plugin_tooltip_text\">[24]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_24\" class=\"footnote_tooltip position\" >Singh, R. P., Javaid, M., Haleem, A., &amp; Suman, R. (2020). \u201cInternet of things (IoT) applications to fight against COVID-19 pandemic.\u201d Diabetes &amp; Metabolic Syndrome: Clinical Research&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\" >Continue reading<\/span><\/span><\/span> The mechanism also implemented for data confidentiality (protection against unauthorized access) can also benefit data integrity. Since the data cannot be viewed or deciphered, it cannot be altered in any way. It is equally essential to maintain such a system for access controls, data validation, audit trail, and, most importantly, data backup in case of total loss or inaccessibility as with a ransomware attack.&nbsp;<\/p>\n\n\n\n<p>One proposed solution would be to enhance data security using a blockchain approach.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_25\" class=\"footnote_plugin_tooltip_text\">[25]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_25\" class=\"footnote_tooltip position\" >Stiawan, D., Suryani, M. E., Idris, M. Y., Aldalaien, M. N., Alsharif, N., &amp; Budiarto, R. (2021). \u201cPing Flood Attack Pattern Recognition Using a K- Means algorithm in an Internet of Things&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\" >Continue reading<\/span><\/span><\/span> Essentially, blockchain is information recorded in blocks that are highly difficult to breach, modify or access.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_26\" class=\"footnote_plugin_tooltip_text\">[26]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_26\" class=\"footnote_tooltip position\" >Shah, Y., &amp; Sengupta, S. (2020, October). \u201cA survey on Classification of Cyber-attacks on IoT and IIoT devices.\u201d In 2020 11th IEEE Annual Ubiquitous Computing, Electronics &amp; Mobile&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\" >Continue reading<\/span><\/span><\/span> This technique is used with transactions of Bitcoins and other cryptocurrencies to protect transactions and their anonymity. Using blockchain with IoT devices would provide robust security and reduce organizational costs in rebuilding the database and exploited network post-attack.<\/p>\n\n\n\n<p>Last, availability ensures that data can always be accessed flawlessly without interruption.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_27\" class=\"footnote_plugin_tooltip_text\">[27]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_27\" class=\"footnote_tooltip position\" >Fernandez, E. B. (2020). \u201cA pattern for a Secure Cloud-Based IoT Architecture.\u201d In Proceedings of the 27th Conference on Pattern Languages of Programs (PLOP\u201d20). Association for Computing&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\" >Continue reading<\/span><\/span><\/span> This is critical to using IoT devices in healthcare, since availability enables uninterrupted, real-time access to patient data for the proper diagnosis and monitoring. Ensuring availability requires investments in reliable data storage systems, secure Wi-Fi, an air-gapped network (which has no interface, wired or wireless, with outside networks) and the latest mobile technology operated properly. Also, critical areas of hospitals must be secured with a keypad access card, security officers and surveillance cameras.&nbsp;<\/p>\n\n\n\n<p>The budget to implement a more efficient network system, especially if significant upgrading is required, might be expensive and time-consuming\u2014but essential to security. Then once accomplished, the system\u2019s implementation, maintenance and configuration must be constantly improved.<\/p>\n\n\n\n<p>IoT devices are a growing technology that is becoming ubiquitous. Security concerns need to be addressed immediately to strengthen data integrity and availability.<span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_28\" class=\"footnote_plugin_tooltip_text\">[28]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_28\" class=\"footnote_tooltip position\" >Best, J. (2020). \u201cCould implanted medical devices be hacked?\u201d BMJ, 368.<\/span><\/span> <span class=\"footnote_referrer relative\"><a role=\"button\" tabindex=\"0\" ><sup id=\"footnote_plugin_tooltip_1266_1_29\" class=\"footnote_plugin_tooltip_text\">[29]<\/sup><\/a><span id=\"footnote_plugin_tooltip_text_1266_1_29\" class=\"footnote_tooltip position\" >Bhuyan, S. S., Kabir, U. Y., Escareno, J. M., Ector, K., Palakodeti, S., Wyant, D., &amp; Dobalian, A. (2020). \u201cTransforming healthcare cybersecurity from reactive to proactive: current status and&nbsp;&#x2026; <span class=\"footnote_tooltip_continue\" >Continue reading<\/span><\/span><\/span><\/p>\n\n\n\n<p>Banks, which protect people\u2019s money, have far better security in place than the healthcare sector, which is required to protect people\u2019s personal information, as well as their health and lives. It\u2019s time for health to pay attention to wealth.&nbsp;<\/p>\n<div class=\"speaker-mute footnotes_reference_container\"> <div class=\"footnote_container_prepare\"><p><span role=\"button\" tabindex=\"0\" id=\"footnotes_container_label_expand_1266_1\" class=\"footnote_reference_container_label pointer\" on=\"tap:footnote_references_container_1266_1.toggleClass(class=collapsed)\">References<\/span><\/p><\/div> <div id=\"footnote_references_container_1266_1\"><table class=\"footnotes_table footnote-reference-container\"><caption class=\"accessibility\">References<\/caption> <tbody> \r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_1\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>1<\/a><\/th> <td class=\"footnote_plugin_text\">Palo Alto Networks, \u201c2020 Unit 42 IoT Threat Report,\u201d <a rel=\"noreferrer noopener\" href=\"https:\/\/unit42.paloaltonetworks.com\/iot-threat-report-2020\/\" target=\"_blank\"><span class=\"footnote_url_wrap\">https:\/\/unit42.paloaltonetworks.com\/iot-threat-report-2020\/<\/span><\/a><\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_2\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>2<\/a><\/th> <td class=\"footnote_plugin_text\">Joyia, G. J., Liaqat, R. M., Farooq, A., &amp; Rehman, S. (2017). \u201cInternet of medical things (IoMT): Applications, benefits and future challenges in healthcare domain.\u201d J. Commun., 12(4), 240-247. July 7<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_3\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>3<\/a><\/th> <td class=\"footnote_plugin_text\">Zou, Y., Roundy, K., Tamersoy, A., Shintre, S., Roturier, J., &amp; Schaub, F. (2020, April), \u201cExamining the adoption and abandonment of security, privacy, and identity theft protection practices,\u201d Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, (pp. 1-15).<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_4\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>4<\/a><\/th> <td class=\"footnote_plugin_text\">Humayun, M., Jhanjhi, N. Z., Alsayat, A., &amp; Ponnusamy, V. (2021). \u201cInternet of things and ransomware: Evolution, mitigation and prevention,\u201d Egyptian Informatics Journal, 22(1), 105-117.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_5\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>5<\/a><\/th> <td class=\"footnote_plugin_text\">Leo, P., Isik, \u00d6., &amp; Muhly, F. (2022). \u201cThe Ransomware Dilemma,\u201d MIT Sloan Management Review, 63(4), 13-15.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_6\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>6<\/a><\/th> <td class=\"footnote_plugin_text\">Keary, J. (2022), \u201cRebuffing Russian Ransomware: How the United States Should Use the Colonial Pipeline and JBS USA Hackings as a Defense Guide for Ransomware,\u201d Seton Hall University Law Library, 2022.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_7\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>7<\/a><\/th> <td class=\"footnote_plugin_text\">Mohurle, S., &amp; Patil, M. (2017), \u201cA brief study of wannacry threat: Ransomware attack 2017,\u201d International Journal of Advanced Research in Computer Science, 8(5), 1938-1940.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_8\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>8<\/a><\/th> <td class=\"footnote_plugin_text\">Bunge, J., \u201cJBS Paid $11 Million to Resolve Ransomware Attack,\u201d Wall Street Journal, June 9, 2021.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_9\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>9<\/a><\/th> <td class=\"footnote_plugin_text\">Collier, K., \u201cMajor Russian-speaking ransomware gag behind JBS and Kaseya attacks goes offline,\u201d NBC News, <a rel=\"noreferrer noopener\" href=\"https:\/\/www.nbcnews.com\/tech\/tech-news\/russian-speaking-ransomware-gang-goes-offline-rcna1403.\" target=\"_blank\"><span class=\"footnote_url_wrap\">https:\/\/www.nbcnews.com\/tech\/tech-news\/russian-speaking-ransomware-gang-goes-offline-rcna1403.<\/span><\/a><\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_10\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>10<\/a><\/th> <td class=\"footnote_plugin_text\">Yaqoob, I., Ahmed, E., ur Rehman, M. H., Ahmed, A. I. A., Al-garadi, M. A., Imran, M., &amp; Guizani, M. (2017), \u201cThe rise of ransomware and emerging security challenges in the Internet of Things,\u201d Computer Networks, 129, 444-458.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_11\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>11<\/a><\/th> <td class=\"footnote_plugin_text\">Hassija, V., Chamola, V., Bajpai, B. C., &amp; Zeadally, S. (2021). \u201cSecurity issues in implantable medic al devices: Fact or fiction?\u201d Sustainable Cities and Society, 66, 102552<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_12\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>12<\/a><\/th> <td class=\"footnote_plugin_text\">Joyia, G. J., Liaqat, R. M., Farooq, A., &amp; Rehman, S. (2017). \u201cInternet of medical things (IoMT): Applications, benefits and future challenges in healthcare domain.\u201d J. Commun., 12(4), 240-247.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_13\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>13<\/a><\/th> <td class=\"footnote_plugin_text\">Chacko, A., &amp; Hayajneh, T. (2018). \u201cSecurity and privacy issues with IoT in healthcare.\u201d EAI Endorsed Transactions on Pervasive Health and Technology, 4(14) doi:<a rel=\"noreferrer noopener\" href=\"http:\/\/dx.doi.org\/10.4108\/eai.13-7-2018.155079.\" target=\"_blank\"><span class=\"footnote_url_wrap\">http:\/\/dx.doi.org\/10.4108\/eai.13-7-2018.155079.<\/span><\/a><\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_14\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>14<\/a><\/th> <td class=\"footnote_plugin_text\">McGowan, A., Sittig, S., &amp; Andel, T. (2021). \u201cMedical Internet of Things: A Survey of the Current Threat and Vulnerability Landscape.\u201d In Proceedings of the 54th Hawaii International Conference on System Sciences (p. 3850).<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_15\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>15<\/a><\/th> <td class=\"footnote_plugin_text\">Somasundaram, R., &amp; Thirugnanam, M. (2021). \u201cReview of security challenges in healthcare internet of things.\u201d Wireless Networks, 27(8), 5503-5509.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_16\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>16<\/a><\/th> <td class=\"footnote_plugin_text\">Kolokotronis, N., &amp; Shiaeles, S. (Eds.). (2021). Cyber-Security Threats, Actors, and Dynamic Mitigation, CRC Press (2021).<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_17\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>17<\/a><\/th> <td class=\"footnote_plugin_text\">Loukaka, A., &amp; Rahman, S. (2017). \u201cDiscovering new cyber protection approaches from a security professional prospective.\u201d International Journal of Computer Networks &amp; Communications (IJCNC) Vol, 9.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_18\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>18<\/a><\/th> <td class=\"footnote_plugin_text\">Shepherd, A., Kesa, C., &amp; Cooper, J. (2020). \u201cInternet of Things (IOT) Medical Security: Taxonomy and Perception.\u201d Issues in Information Systems, 21(3).<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_19\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>19<\/a><\/th> <td class=\"footnote_plugin_text\">Chanal, P. M., &amp; Kakkasageri, M. S. (2021). \u201cPreserving Data Confidentiality in Internet of Things.\u201d SN Computer Science, 2(1), 1-12.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_20\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>20<\/a><\/th> <td class=\"footnote_plugin_text\">Nadikattu, R. R. (2020). \u201cData Safety and Integrity Issue in IoT.\u201d International Journal for Research in Applied Science &amp; Engineering Technology (IJRASET), 8(VI).<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_21\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>21<\/a><\/th> <td class=\"footnote_plugin_text\">Mishra, B., &amp; Padhy, N. (2021). \u201cEnhancing the security, reliability, and data integrity issues in the internet of things by implementing blockchain strategy in mining: challenges and solutions.\u201d In Communication Software and Networks (pp. 137-144). Springer, Singapore.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_22\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>22<\/a><\/th> <td class=\"footnote_plugin_text\">Atlam, H. F., Azad, M. A., Alzahrani, A. G., &amp; Wills, G. (2020). \u201cA Review of Blockchain in Internet of Things and AI.\u201d Big Data and Cognitive Computing, 4(4), 28.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_23\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>23<\/a><\/th> <td class=\"footnote_plugin_text\">Tang, S., &amp; Xie, Y. (2021). \u201cAvailability Modeling and Performance Improving of a Healthcare Internet of Things (IoT) System.\u201d IoT, 2(2), 310-325.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_24\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>24<\/a><\/th> <td class=\"footnote_plugin_text\">Singh, R. P., Javaid, M., Haleem, A., &amp; Suman, R. (2020). \u201cInternet of things (IoT) applications to fight against COVID-19 pandemic.\u201d Diabetes &amp; Metabolic Syndrome: Clinical Research &amp; Reviews, 14(4), 521-524.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_25\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>25<\/a><\/th> <td class=\"footnote_plugin_text\">Stiawan, D., Suryani, M. E., Idris, M. Y., Aldalaien, M. N., Alsharif, N., &amp; Budiarto, R. (2021). \u201cPing Flood Attack Pattern Recognition Using a K- Means algorithm in an Internet of Things (IoT) Network.\u201d IEEE Access, 9, 116475-116484.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_26\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>26<\/a><\/th> <td class=\"footnote_plugin_text\">Shah, Y., &amp; Sengupta, S. (2020, October). \u201cA survey on Classification of Cyber-attacks on IoT and IIoT devices.\u201d In 2020 11th IEEE Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON) (pp. 0406-0413). IEEE.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_27\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>27<\/a><\/th> <td class=\"footnote_plugin_text\">Fernandez, E. B. (2020). \u201cA pattern for a Secure Cloud-Based IoT Architecture.\u201d In Proceedings of the 27th Conference on Pattern Languages of Programs (PLOP\u201d20). Association for Computing Machinery, USA.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_28\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>28<\/a><\/th> <td class=\"footnote_plugin_text\">Best, J. (2020). \u201cCould implanted medical devices be hacked?\u201d BMJ, 368.<\/td><\/tr>\r\n\r\n<tr class=\"footnotes_plugin_reference_row\"> <th scope=\"row\" class=\"footnote_plugin_index_combi pointer\"><a id=\"footnote_plugin_reference_1266_1_29\" class=\"footnote_backlink\"><span class=\"footnote_index_arrow\">&#8593;<\/span>29<\/a><\/th> <td class=\"footnote_plugin_text\">Bhuyan, S. S., Kabir, U. Y., Escareno, J. M., Ector, K., Palakodeti, S., Wyant, D., &amp; Dobalian, A. (2020). \u201cTransforming healthcare cybersecurity from reactive to proactive: current status and future recommendations.\u201d Journal of Medical Systems, 44(5), 1-9.<\/td><\/tr>\r\n\r\n <\/tbody> <\/table> <\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>According to the Palo Alto Networks threat report,[1]Palo Alto Networks, \u201c2020 Unit 42 IoT Threat Report,\u201d https:\/\/unit42.paloaltonetworks.com\/iot-threat-report-2020\/ 98 percent of IoT (Internet of Things) device traffic is unencrypted, exposing personal [&hellip;]<\/p>\n","protected":false},"author":44,"featured_media":1337,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[20,278],"tags":[353,334,354,335,339,338,328,349,259,326,355,350,345,346,336,347,322,324,325,342,341,344,329,348,352,321,356,332,337,343,340,327,351,323,331,333,330],"_links":{"self":[{"href":"https:\/\/dda.ndus.edu\/ddreview\/wp-json\/wp\/v2\/posts\/1266"}],"collection":[{"href":"https:\/\/dda.ndus.edu\/ddreview\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dda.ndus.edu\/ddreview\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dda.ndus.edu\/ddreview\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/dda.ndus.edu\/ddreview\/wp-json\/wp\/v2\/comments?post=1266"}],"version-history":[{"count":19,"href":"https:\/\/dda.ndus.edu\/ddreview\/wp-json\/wp\/v2\/posts\/1266\/revisions"}],"predecessor-version":[{"id":1451,"href":"https:\/\/dda.ndus.edu\/ddreview\/wp-json\/wp\/v2\/posts\/1266\/revisions\/1451"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dda.ndus.edu\/ddreview\/wp-json\/wp\/v2\/media\/1337"}],"wp:attachment":[{"href":"https:\/\/dda.ndus.edu\/ddreview\/wp-json\/wp\/v2\/media?parent=1266"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dda.ndus.edu\/ddreview\/wp-json\/wp\/v2\/categories?post=1266"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dda.ndus.edu\/ddreview\/wp-json\/wp\/v2\/tags?post=1266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}