- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
A timely technical guide to securing network-connected medical devices
In Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems, Principal Security Architect for Connection, John Chirillo, delivers a robust and up-to-date discussion of securing network-connected medical devices. The author walks you through available attack vectors, detection and prevention strategies, probable future trends, emerging threats, and legal, regulatory, and ethical considerations that will frequently arise for practitioners working in the area.
Following an introduction to the field of Internet of Medical Things devices and their recent evolution, the book provides a detailed and technical series of discussions—including common real-world scenarios, examples, and case studies—on how to prevent both common and unusual attacks against these devices.
Inside the book:
Techniques for using recently created tools, including new encryption methods and artificial intelligence, to safeguard healthcare technology
Explorations of how the rise of quantum computing, 5G, and other new or emerging technology might impact medical device security
Examinations of sophisticated techniques used by bad actors to exploit vulnerabilities on Bluetooth and other wireless networks
Perfect for cybersecurity professionals, IT specialists in healthcare environments, and IT, cybersecurity, or medical researchers with an interest in protecting sensitive personal data and critical medical infrastructure, Preventing Bluetooth and Wireless Attacks in IoMT Healthcare Systems is a timely and comprehensive guide to securing medical devices.
Contents
Preface xxvii
Foreword xxix
Part I Foundation 1
Chapter 1 Introduction to IoMT in Healthcare 3
Chapter 2 The Evolving Landscape of Wireless Technologies in Medical Devices 23
Chapter 3 Introduction to Bluetooth and Wi-Fi in Healthcare 46
Part II Attack Vectors 65
Chapter 4 Bluetooth Vulnerabilities, Tools, and Mitigation Planning 67
Chapter 5 Wi-Fi and Other Wireless Protocol Vulnerabilities 104
Chapter 6 Man-in-the-Middle Attacks on Medical Devices 161
Chapter 7 Replay and Spoofing Attacks in IoMT 196
Chapter 8 Denial of Service in Wireless Medical Networks 208
Part III Case Studies and Real-World Scenarios 227
Chapter 9 Pacemaker Hacking 229
Chapter 10 Insulin Pump Vulnerabilities and Exploits 247
Chapter 11 Attack Vector Trends and Hospital Network Breaches with IoMT Devices 263
Part IV Detection and Prevention 295
Chapter 13 Intrusion Detection and Prevention for IoMT Networks 297
Chapter 14 Machine Learning Approaches to Wireless Attack Detection 338
Chapter 15 Secure Communication Protocols for Medical Devices 366
Chapter 16 Best Practices for IoMT Device Security 391
Part V Future Trends and Emerging Threats 441
Chapter 17 5G and Beyond and Implications for IoMT Security 443
Chapter 18 Quantum Computing in Medical Device Security 459
Chapter 19 AI-Driven Attacks and Defenses in Healthcare 476
Part VI Legal and Ethical Considerations 491
Chapter 20 Regulatory Frameworks for IoMT Security 493
Chapter 21 Guidelines for Ethical Hacking in Healthcare 510
Conclusion 525
Index 527