skip to main content

Title: TH-A-12A-01: Medical Physicist's Role in Digital Information Security: Threats, Vulnerabilities and Best Practices

I. Information Security Background (Speaker = Kevin McDonald) Evolution of Medical Devices Living and Working in a Hostile Environment Attack Motivations Attack Vectors Simple Safety Strategies Medical Device Security in the News Medical Devices and Vendors Summary II. Keeping Radiation Oncology IT Systems Secure (Speaker = Bruce Curran) Hardware Security Double-lock Requirements “Foreign” computer systems Portable Device Encryption Patient Data Storage System Requirements Network Configuration Isolating Critical Devices Isolating Clinical Networks Remote Access Considerations Software Applications / Configuration Passwords / Screen Savers Restricted Services / access Software Configuration Restriction Use of DNS to restrict accesse. Patches / Upgrades Awareness Intrusion Prevention Intrusion Detection Threat Risk Analysis Conclusion Learning Objectives: Understanding how Hospital IT Requirements affect Radiation Oncology IT Systems. Illustrating sample practices for hardware, network, and software security. Discussing implementation of good IT security practices in radiation oncology. Understand overall risk and threats scenario in a networked environment.
Authors:
 [1] ;  [2]
  1. Mayo Clinic, Rochester, MN (United States)
  2. The Warren Alpert Medical School of Brown University, Providence, RI (United States)
Publication Date:
OSTI Identifier:
22409822
Resource Type:
Journal Article
Resource Relation:
Journal Name: Medical Physics; Journal Volume: 41; Journal Issue: 6; Other Information: (c) 2014 American Association of Physicists in Medicine; Country of input: International Atomic Energy Agency (IAEA)
Country of Publication:
United States
Language:
English
Subject:
98 NUCLEAR DISARMAMENT, SAFEGUARDS AND PHYSICAL PROTECTION; COMPUTER CODES; COMPUTERS; CONFIGURATION; CRYPTOGRAPHY; EQUIPMENT; HOSPITALS; INFORMATION; RISK ASSESSMENT; SECURITY