Threat Assessment and Risk Analysis (TARA) for Interoperable Medical Devices in the Operating Room Inspired by the Automotive Industry

Author:

Puder Andreas1ORCID,Henle Jacqueline2ORCID,Sax Eric3

Affiliation:

1. Embedded Systems, Getinge AB, 76437 Rastatt, Germany

2. Embedded Systems and Sensors Engineering (ESS), FZI Research Center for Information Technology, 10117 Berlin, Germany

3. Institute for Information Processing Technologies (ITIV), Karlsruhe Institute of Technology (KIT), 76131 Karlsruhe, Germany

Abstract

Prevailing trends in the automotive and medical device industry, such as life cycle overarching configurability, connectivity, and automation, require an adaption of development processes, especially regarding the security and safety thereof. The changing requirements imply that interfaces are more exposed to the outside world, making them more vulnerable to cyberattacks or data leaks. Consequently, not only do development processes need to be revised but also cybersecurity countermeasures and a focus on safety, as well as privacy, have become vital. While vehicles are especially exposed to cybersecurity and safety risks, the medical devices industry faces similar issues. In the automotive industry, proposals and draft regulations exist for security-related risk assessment processes. The medical device industry, which has less experience in these topics and is more heterogeneous, may benefit from drawing inspiration from these efforts. We examined and compared current standards, processes, and methods in both the automotive and medical industries. Based on the requirements regarding safety and security for risk analysis in the medical device industry, we propose the adoption of methods already established in the automotive industry. Furthermore, we present an example based on an interoperable Operating Room table (OR table).

Funder

KIT-Publication Fund of the Karlsruhe Institute of Technology

Publisher

MDPI AG

Subject

Health Information Management,Health Informatics,Health Policy,Leadership and Management

Reference99 articles.

1. Anisetti, M., Ardagna, C., Cremonini, M., Damiani, E., Sessa, J., and Costa, L. (2022, October 01). Security Threat Landscape. Available online: https://sesar.di.unimi.it/security-threat-landscape/.

2. US Department of Health and Human Services (2008). The HIPAA Privacy Rule.

3. Cybersecurity and the Medical Device Product Development Lifecycle;Jones;Inform. Empower. Healthc. Transform.,2017

4. Cybersecurity in Hospitals: An Evaluation Model;Ahmed;J. Cybersecur. Priv.,2022

5. Cybersecurity in Hospitals: A Systematic, Organizational Perspective;Jalali;J. Med. Internet Res.,2018

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3