• Complain

Matthew Webster - Do No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States

Here you can read online Matthew Webster - Do No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: John Wiley & Sons, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Do No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States
  • Author:
  • Publisher:
    John Wiley & Sons
  • Genre:
  • Year:
    2021
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Do No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Do No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Discover the security risks that accompany the widespread adoption of new medical devices and how to mitigate them In Do No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States, cybersecurity expert Matthew Webster delivers an insightful synthesis of the health benefits of the Internet of Medical Things (IoMT), the evolution of security risks that have accompanied the growth of those devices, and practical steps we can take to protect ourselves, our data, and our hospitals from harm. Youll learn how the high barriers to entry for innovation in the field of healthcare are impeding necessary change and how innovation accessibility must be balanced against regulatory compliance and privacy to ensure safety. In this important book, the author describes: The increasing expansion of medical devices and the dark side of the high demand for medical devices The medical device regulatory landscape and the dilemmas hospitals find themselves in with respect medical devices Practical steps that individuals and businesses can take to encourage the adoption of safe and helpful medical devices or mitigate the risk of having insecure medical devices How to help individuals determine the difference between protected health information and the information from health devices--and protecting your data How to protect your health information from cell phones and applications that may push the boundaries of personal privacy Why cybercriminals can act with relative impunity against hospitals and other organizations Perfect for healthcare professionals, system administrators, and medical device researchers and developers, Do No Harm is an indispensable resource for anyone interested in the intersection of patient privacy, cybersecurity, and the world of Internet of Medical Things.

Matthew Webster: author's other books


Who wrote Do No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States? Find out the surname, the name of the author of the book and a list of all author's works by series.

Do No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Do No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Table of Contents List of Tables Chapter 6 Chapter 14 List of - photo 1
Table of Contents
List of Tables
  1. Chapter 6
  2. Chapter 14
List of Illustrations
  1. Chapter 1
  2. Chapter 2
  3. Chapter 3
  4. Chapter 5
  5. Chapter 6
  6. Chapter 7
  7. Chapter 8
  8. Chapter 10
Guide
Pages

Do No Harm Protecting Connected Medical Devices Healthcare and Data from - photo 2

Do No Harm
Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States

Matthew Webster

Copyright 2021 by John Wiley Sons Inc All rights reserved Published by - photo 3

Copyright 2021 by John Wiley & Sons, Inc. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey.

Published simultaneously in Canada.

ISBN: 978-1-119-79402-8

ISBN: 978-1-119-79404-2 (ebk)

ISBN: 978-1-119-79403-5 (ebk)

No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4470, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permission.

Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic formats. For more information about Wiley products, visit our web site at www.wiley.com.

Library of Congress Control Number: 2021938272

Trademarks: WILEY and the Wiley logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.

Cover image: Getty Images/LeoWolfert

Cover design: Wiley/Michael E. Trent

To Katherine

About the Author

Matthew Webster is the Chief Information Security Officer at Galway Holdings. He has more than 25 years of experience in IT and cybersecurityincluding multiple cybersecurity officer positions. Matthew clearly has a passion for cybersecurity, which is evidenced by the fact he has earned more than 20 IT and cybersecurity certifications including the coveted Certified Information Systems Security Professional (CISSP).

Matthew has worked in and around many companies throughout the northeast in a variety of capacities, and he has built many cybersecurity programs from the ground up. As a skilled professional, Matthew has spoken in a range of contexts, including in person and at online events.

Acknowledgments

If there is one adage that best describes writing a book of this nature it is that Rome was not built in a day. I could not begin to thank each person who helped me lay the foundation for this book. The hundreds if not thousands of conversations around cybersecurity and leadership have influenced my thinking in both large and small ways.

Many of the people are probably completely unaware of how they have helped me over the years. I have learned from others at numerous conferences and webinars and from cybersecurity tool vendors. Each technology, each person, has helped to provide me with greater background and knowledge in order to gain a better context and understanding.

In terms of writing this book I would like to thank Peter Gregory, a very experienced author, who introduced me to Carole Jelen, the vice president of Waterside Productions, who helped to mentor me through the ABCs of writing a book of this magnitude. Without their help, I never would have had the opportunity to write such a book.

I also want to thank both Wiley and my editors who have been very patient making corrections, asking questions, and making recommendations throughout the whole process. Their patience and understanding has been greatly appreciated.

Finally, I want to thank my lovely wife, Sumiko, who has been extremely patient with me as I spent an enormous number of hours writing this book. Without her patience this would have been a much more difficult endeavor.

Matthew Webster

Preface

This is a book specifically focused on the cybersecurity of internet-connected medical devices written by a cybersecurity professional for the general public. It looks at the problem from a broad spectrum of angles, from education, technical, the legal landscape, the threat landscape, through the very management of these devices. It covers why the devices are made the way they are and why not enough attention has been placed on their security. It then goes into possible solutions and directions that we as members of a global society need to take in the wake of a powerful technology like the internet.

This book does not focus on the specific medical challenges from a medical perspective related to internet-connected medical devices. There are already a number of books that talk about the medical challenges related to various types of implants. This was a conscious choice not to focus on challenges that I am simply not qualified to talk about nor provide interesting insights about.

Where I can provide interesting insights is in the realm of cybersecurity, where I have a great deal of experiencean area that I have been involved in and have loved for many years. Through that experience, I hope to show you a bit behind the scenes of what it takes to truly protect those devicessometimes from a technical angle. I have striven to make these technical concepts more accessible to the average reader so almost everyone can enjoy this book.

It has been very challenging to determine the right amount of content to reach every reader. Each topic in this book can easily be a book unto itself. The book could have been a thousand pages, but it would not have succinctly driven home the important points. Readers within many of the professions could point out obvious shortcomings, which would have taken chapters to explore. In the end, cybersecurity is a complex topic, and I tried to strike the right balance in choosing what to discuss.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Do No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States»

Look at similar books to Do No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Do No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States»

Discussion, reviews of the book Do No Harm: Protecting Connected Medical Devices, Healthcare, and Data from Hackers and Adversarial Nation States and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.