Cybersecurity, Implants, and the Medical Industry

Database Searches

The databases I’m going to look at are Computer Science Collection, Health Source – Nursing/Academic Edition, Computer Source, MEDLINE, and Consumer Health Complete – EBSCOhost, as well as FHSU’s library search.

Computer Science Collection searches

Search term: Cybersecurity in Healthcare. Number of results: 29

Search term: medical cybersecurity. Number of results: 19

Search term: cybersecurity. Number of results: 62,162

Health Source – Nursing/Academic Edition searches

Search term: cybersecurity in healthcare. Number of results: 5

Search term: healthcare security. Number of results: 3

Search term: cybersecurity. Number of results: 147

Computer Source searches

Search term: cybersecurity in healthcare. Number of results: 20

Search term: cybersecurity. Number of results: 1,919

Search term: medical cybersecurity. Number of results: 5

MEDLINE searches

Search term: cybersecurity in healthcare. Number of results: 41

Search term: cybersecurity. Number of results: 4,856

Search term: computer security. Number of results: 7,803

Consumer Health Complete – EBSCOhost

Search term: cybersecurity in healthcare. Number of results: 49

Search term: cybersecurity. Number of results: 183

Search term: computer security. Number of results: 311

FSHU library resources

Search term: implant cybersecurity. Number of results: 171

Search term: medical cybersecurity. Number of results: 2,812

Search term: cybersecurity in healthcare. Number of results: 1,799

Sources

From FHSU library resources. Term searched: implant cybersecurity

Baranchuk, A., Refaat, M. M., Patton, K. K., Chung, M. K., Krishnan, K., Kutyifa, V., Upadhyay, G., Fisher, J. D., & Lakkireddy, D. R. (2018, March 20). Cybersecurity for Cardiac Implantable Electronic Devices: What Should You Know? Journal of the American College of Cardiology. https://doi.org/10.1016/j.jacc.2018.01.023

 

From Computer Source. Term searched: medical cybersecurity

Ngamboé M., Berthier P., Ammari N., Dyrda K., Fernandez, J. M. (2020, October 7). Risk assessment of cyber-attacks on telemetry-enabled cardiac implantable electronic devices (CIED). International Journal of Information Security. https://doi.org/10.1007/s10207-020-00522-7

 

From Health Source: Nursing/Academic Edition. Term searched: cybersecurity

Kruse, C. S., Frederick, B., Jacobson, T., Monticone, D. K. (2016, August 19). Cybersecurity in healthcare: A systematic review of modern threats and trends. Technology & Health Care https://doi.org/10.3233/THC-161263

Benjamin, R., Kramer, D. B., Foo Kune, D., Auto de Medeiros, J., Yan, C., Xu, W., Crawford, T., Fu, K. (2017, April 13). Cybersecurity and medical devices: A practical guide for cardiac electrophysiologists. Pacing & Clinical Electrophysiology. https://doi.org/0.1111/pace.13102

 

Annotation

The article I selected for annotation is Cybersecurity and medical devices: A practical guide for cardiac electrophysiologists.

The motivation of the researchers to write this article was based on events concerning an alleged pacemaker vulnerability that could stop the pacemaker’s function. Succinctly discussed are the suspicious circumstances around said vulnerability. A summary of how negligently the firm released this information in contrast to how this type of information is typically treated immediately follows. The researchers conducted an experiment attempting to replicate the vulnerability but were unable to, implying that the original claims may have been motivated by financial gain. Overall, the article posits that patients are much better off with their therapeutic devices than without. When they have concerns, it’s best to consult medical professionals before acting on this type of information.

Comparing this source to the others in my list of references, I don’t consider it as helpful as others, but it does have use as an example of how the medical electronics industry conducts itself about cybersecurity concerns. This research aims to assure doctors and patients that, while not without risk, they can trust the devices currently in use. The researcher’s subtler point is that the trustworthiness of some sources seen in the news may be suspect. I see this as an objective and reliable source, albeit with a goal unrelated to my own.

While this research is divergent from the typical kind that I’m looking for, it helps show that the existing methods and standards of evidence are put in place for a reason and typically work. Outlined briefly is some information about FDA guidelines and their intervention in this case that could be valuable. It also describes some behind-the-scenes processes that may be useful to my investigation of cybersecurity standards in implants and what preventative measures are currently in place.

About Isaac

My name is Isaac Larck, but most people that know me call me Al. I live in Illinios and I'm currently pursuing a degree in Informatics with a focus in Cybersecurity here at Fort Hayes. I work at a local college and in my spare time I play D&D with my friends.

Leave a Reply

Your email address will not be published. Required fields are marked *