What are three examples of devices that could be attacked by computer viruses?Medical devices that are controlled by computer software—from heart monitors and pacemakers to mammogram and X-ray machines—are new targets for computer viruses and malware.
What are three examples of devices that could be attacked by computer viruses?Medical devices that are controlled by computer software—from heart monitors and pacemakers to mammogram and X-ray machines—are new targets for computer viruses and malware.
Case Study 5-1 Vulnerabilities of Medical Devices
Medical devices that are controlled by computer software—from heart monitors and pacemakers to mammogram and X-ray machines—are new targets for computer viruses and malware.* This could put patients at risk, although no injuries or deaths have been reported so far. The Food and Drug Administration is warning the manufacturers of medical devices about the problem and is requesting them to review the parts of their security plans that are related to these devices when they seek approval from the government agency.

Having Trouble Meeting Your Deadline?
Get your assignment on What are three examples of devices that could be attacked by computer viruses?Medical devices that are controlled by computer software—from heart monitors and pacemakers to mammogram and X-ray machines—are new targets for computer viruses and malware. completed on time. avoid delay and – ORDER NOW
A Department of Veterans Affairs report has shown that 327 devices at VA hospitals have been infected by malware since 2009. In January 2010, a VA catheterization laboratory was temporarily closed due to infected computer equipment that is used to open blocked arteries. And in a case at a private Boston hospital, computer viruses exposed sensitive patient data by sending it to outside servers. The increased applications of electronic record systems as a part of the 2009 stimulus package is adding to this risk.
In addition to privacy issues, hackers can change patients’ medical records and treatment plans. If the system does not have a strong login access, some patients can access a system and alter their own medications, such as those taking narcotic susbtances. Hackers could use Shodan, a search engine for locating Internet-connected devices, using terms such as “radiology” and “x-ray”.*
Manufacturers must improve the security features of these devices, making them more difficult for hackers to break into. And there needs to be close coordination between the manufacturers and healthcare providers to further enhance security. Also, hospitals and medical facilities must make sure that all the software running these devices is up to date and any updates have been installed. Finally, these devices must be blocked from Internet access.*
ANSWER THE FOLLOWING QUESTIONS
What are three examples of devices that could be attacked by computer viruses?
What are the risks related to using electronic health records in hospitals and medical facilities?
What are three pieces of advice for reducing the risk associated with using these devices?
Reply in APA report format using proper Headings
Times New Roman 9-12
2-3 pages double spaced
(look at close to one page per question)
do not answer in the form of a question- this needs to be a report
proper Reference page and separate cover page
Explanation & AnswerOur website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Order Now and we will direct you to our Order Page at Litessays. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.