Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ ZENODOarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Article . 2023
License: CC BY
Data sources: ZENODO
ZENODO
Article . 2023
License: CC BY
Data sources: Datacite
ZENODO
Article . 2023
License: CC BY
Data sources: Datacite
versions View all 2 versions
addClaim

The Emergence of Cybersecurity Medicine: Protecting Implanted Devices from Cyber Threats

Authors: Dr.A.Shaji George; A.S.Hovan George;

The Emergence of Cybersecurity Medicine: Protecting Implanted Devices from Cyber Threats

Abstract

With the increasing use of implanted medical devices like wearables, internet-connected pacemakers, and neural implants, a new field is emerging at the intersection of healthcare and cybersecurity. This paper explores the need for specialized cybersecurity doctors to protect these vulnerable devices from cyberattacks. As medical implants become more interconnected, the risk increases that hackers could access and manipulate them, endangering patient health and privacy. Currently, the healthcare industry lacks professionals with expertise in both medical technology and cybersecurity. This paper argues for the creation of cybersecurity medicine programs at universities to train the next generation of doctors in protecting devices and patients from cyber threats. These cybersecurity doctors would educate patients about data security, develop security strategies for medical apps and devices, collaborate with developers to identify vulnerabilities, monitor cyber threats, and respond quickly to incidents. Their specialized knowledge is essential to build security into medical devices from the start and to institute best practices for developers. Cybersecurity doctors would also stay current on the evolving threat landscape to devices and proactively address risks. With patient health data increasingly held on connected devices prone to hacking, the paper emphasizes the vital role cybersecurity doctors could play in safeguarding lives. The paper concludes that nurturing this emerging field is crucial to protect patient trust in vital implanted technology as it becomes more pervasive. With vigilance and expertise from cybersecurity medicine specialists, the lifesaving benefits of connected devices can be harnessed while keeping confidential data safe.

Keywords

Cybersecurity medicine, medical cybersecurity, Healthcare data privacy, Clinical informatics security, medical device security, Healthcare cyber threats, Digital healthcare risks, Patient data protection, medical technology vulnerabilities, Connected care security.

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    1
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
1
Average
Average
Average
Green
Related to Research communities