Protecting E-healthcare Client Devices against Malware and Physical Theft
نویسندگان
چکیده
The growing adoption of electronic medical records will require that healthcare professionals and patients are able to access health information on devices such as laptops, personal computers, and even smart phones. Due to the sensitive nature of such information, it is important to secure client-side devices used in electronic healthcare systems that handle sensitive medical data. These devices can be targets of several kinds of attacks, including malware-based attacks or physical theft of devices. We present an approach and system architecture to secure client devices against such attacks.
منابع مشابه
PlaceRaider: Virtual Theft in Physical Spaces with Smartphones
As smartphones become more pervasive, they are increasingly targeted by malware. At the same time, each new generation of smartphone features increasingly powerful onboard sensor suites. A new strain of ‘sensor malware’ has been developing that leverages these sensors to steal information from the physical environment — e.g., researchers have recently demonstrated how malware can ‘listen’ for s...
متن کاملClient Security in the Enterprise Network: Dell's Perspective
Client computer security is a broad subject that includes securing access to network resources, securing data transfers over private and public networks, and protecting client computers and local data from theft. Security is increasingly important as portable computers, vulnerable to theft, proliferate and the Internet revolutionizes communications and commerce. Applications such as e-commerce,...
متن کاملA Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper proposes an Anti-Phishing Authentication (APA) technique to detect and prevent real-time phishing attacks. It uses 2-way authentication and zero-knowledge password proof. Users are recommended to customize their user in...
متن کاملProbabilistic and Considerate Attestation of IoT Devices against Roving Malware
Remote Attestation (RA) is a popular means of detecting malware presence (or verifying its absence) on embedded and IoT devices. It is especially relevant to low-end devices that are incapable of protecting themselves against infection. Malware that is aware of ongoing or impending attestation and aims to avoid detection can relocate itself during computation of the attestation measurement. In ...
متن کاملIoTPOT: Analysing the Rise of IoT Compromises
We analyze the increasing threats against IoT devices. We show that Telnet-based attacks that target IoT devices have rocketed since 2014. Based on this observation, we propose an IoT honeypot and sandbox, which attracts and analyzes Telnet-based attacks against various IoT devices running on different CPU architectures such as ARM, MIPS, and PPC. By analyzing the observation results of our hon...
متن کامل