Detecting most incidents requires automated analysis tools, system behavior patterns, and an awareness of what to look for among equipment operators, supervisors, and other hospital staff. Hackers try to hide their activities by stealing large amounts of data during peak hours. They deliberately limit the amount of data they steal at any one-time and use common protocols like HTTP or SSL.1 Hackers also choose a logical pivot point to attack that allows them to spread their malware across the hospital network. The attention of medical equipment operators and the ...
© Luis Ayala 2016
Luis Ayala, Cybersecurity for Hospitals and Healthcare Facilities, 10.1007/978-1-4842-2155-6_6
6. Detection of Cyber-Attacks
Luis Ayala1
(1)Fredericksburg, Virginia, USA
Get Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.