SlideShare une entreprise Scribd logo
1  sur  59
Télécharger pour lire hors ligne
© 2015 UL LLC
Anura Fernando – Underwriters Laboratories (UL)
Security of Things
September 10, 2015
Copyright © 2015 UL LLC ® All rights reserved
Securing the Fog
Anura S Fernando
Anura S. Fernando is UL’s Principal Engineer for Medical Software &
Systems Interoperability.
Background:
• Degrees in Electrical Engineering, Biology/Chemistry, and Software Engineering
• Over 17 years experience at UL with safety critical software and control systems certification;
as well as research across many industries – process automation, alternative energy, medical,
hazardous locations, appliances, optical radiation, nanotechnology, battery technologies, etc.
• Research and publications in Predictive Modeling and Risk Analysis, Cybersecurity, Systems of
Systems, Software, Health IT, Apps, and Medical Device safety.
• Projects with numerous Fortune 500 companies, DoD, DoE, DHS, FDA, FCC, ONC, NASA
and several U.S. National Laboratories
Additional experience relevant for this discussion/audience:
• Contributed to the development of several standards involving software and Functional Safety
as a member in IEC, ISO, ASME committees and Expert Task Force member.
• UL lead for the development of the AAMI/UL 2800 family of eHealth standards for
interoperable medical device interface safety.
• Member of the Federal Advisory Committee FDASIA WG to the Health IT Policy Committee,
FDA Medical Device Interoperability Coordinating Council, Medical Device Interoperability
Safety Working Group, Health Information Management Systems Society, Association for the
Advancement of Medical Instrumentation, and the International Council on Systems
Engineering
Not too long ago, we were pretty focused on
what could be done in the cloud…
Slide 3
http://gcn.com/Blogs/Pulse/2012/12/VA-cloud-Office-365-for-600000-users.aspx
Now we’re equally interested in what is
happening around the cloud…
Slide 4
http://www.slate.com/blogs/future_tense/2014/08/05/oregon_gulch_fire_photos_show_pyrocumulus_clouds_and_fighter_jets_over_wildfire.html
What do we call this new domain?...the “Fog”
Slide 5
http://www.bahrainweather.gov.bh/education_fog
…fog computing covers…the IoE
Slide 6
http://www.sintef.no/home/Information-and-Communication-Technology-ICT-old/Software-Engineering-Safety-and-Security/Research-groups/Model-Based-Systems/Ubiquitous-and-mobile-computing/
What is “fog computing” (or edge computing)
Slide 7
http://www.frontiersin.org/files/Articles/78030/fnhum-08-00370-r2/image_m/fnhum-08-00370-g001.jpg
The fog uses pervasive computing technologies
Slide 8
http://2.bp.blogspot.com/-afr-gp6eyl
http://www.untitledname.com/archives/upload/2005/10/bicyclist-cell-phone.jpg http://i-cdn.phonearena.com/images/articles/84906-image/wear.png
…with many sensors creating many possibilities
Slide 9
https://blogs.synopsys.com/configurablethoughts/2012/05/sensing-your-world/
…and new sensor technologies emerging
regularly
Nanotechnologies integrated with textiles
10
H Zhao et al, Nanotechnology 21 (2010) 305502
Combining wearables with network technologies…
Slide 11
http://ualr.edu/sxyu1/Research.htm
In a “microbiome” of wearable sensors…
http://www.bizjournals.com/sanjose/news/2013/06/21/216-million-geeky-americans-want.html?s=image_gallery
…we can become the “quantified self”
Slide 13
http://www.thethinkingbench.com/the-year-of-the-quantified-self-revolution/
So what risks may lie ahead?
Slide 14
http://www.smarterbusiness.org.uk/business_targets/view/minimiserisks
Understanding new science…What makes fog?
Slide 15
http://www.wsaz.com/blogs/askjosh/53290657.html
Understanding new science…what makes “fog”
Slide 16
Image extracted from Systems Engineering Fundamentals. Defense Acquisition University Press, 2001
Analyzing Risk: Hazard Based Safety Engineering
17
…or Data …or Process
Slide 18
Hazardous
Energy
Source
Transfer
Mechanism
Susceptible
Part
HBSE Premise
ENERGY TRANSFER
INJURY
AND
INADEQUATE
PERSONAL
SAFEGUARD
PERSONAL
SAFEGUARD
FAILURE
NO
PERSONAL
SAFEGUARD
OR
INADEQUATE
PERSONAL
AVOIDANCE
AVOIDANCE
NOT
POSSIBLE
AVOIDANCE
NOT
ATTEMPTED
OR
BODILY
EXPOSURE
AND
INADEQUATE
EQUIPMENT
SAFEGUARD
EQUIPMENT
SAFEGUARD
FAILURE
NO
EQUIPMENT
SAFEGUARD
OR
INADEQUATE
EQUIPMENT
SAFEGUARD
EQUIPMENT
SAFEGUARD
FAILURE
NO
EQUIPMENT
SAFEGUARD
OR
HAZARDOUS
ENERGY
AND
(EVENT)
OR
(EVENT)
OR
HBSE Standard Injury Fault Tree
No
No
IDENTIFY ENERGY
SOURCE
IS SOURCE
HAZARDOUS?
IDENTIFY MEANS BY WHICH
ENERGY CAN BE
TRANSFERRED TO A BODY PART
DESIGN SAFEGUARD WHICH
WILL PREVENT ENERGY
TRANSFER TO A BODY PART
MEASURE SAFEGUARD
EFFECTIVENESS
IS SAFEGUARD
EFFECTIVE?
DONE
Yes
Yes
HBSE Process
…or Data …or Process
Analysis Drives UL’s Safety Testing and Certification
Applying HBSE to Wearable Technologies
19
Hazardous
Energy
Source
Transfer
Mechanism
Susceptible
Part
HBSE Premise
…or Data …or Process
Are there any hazards?
We can see some WT IoE risks
20
Optical Radiation
(LASER, UV, etc…)
Privacy, Security, Performance if used by Dr
(Cryptographic verification, HIPAA)
Acoustic Energy Data Integrity, Usability
Even some unique new problems can
arise…”cybersickness”
21
• Eye strain
• Headache
• Pallor
• Sweating
• Dryness of mouth
• Fullness of stomach
• Disorientation
• Vertigo2
• Ataxia3
• Nausea
• Vomiting. Viola, SIGCHI Bulletin Volume 32, Number 1 January 2000
Different layers of the IoE system require different
risk considerations
22
http://sebokwiki.org/wiki/Applying_Life_Cycle_Processes
What about “big data” from the IoE…
23
http://www.districtoffuture.eu/index.php/mod.pags/mem.detalle/id.10/relcategoria.1077/relmenu.5
Where is all this data stored? Is it secure?
Is it correct? Can I trust it?...
Slide 24
Big data problems can be due to little
differences in context
Slide 25
https://blogs.synopsys.com/configurablethoughts/2012/05/sensing-your-world/
Who should get a reduced premium?
Slide 26
http://www.unfitbits.com/http://www.nutripro.net/become-a-morning-jogger/
Who is a hacker?
Slide 27
http://www.unfitbits.com/
http://impulse.coreatcu.com/opinions/2014/10/30/hacker-culture-bank-account-mine/
http://www.gizmag.com/funtoro-bus-coach-infotainment-system/15056/
A hacker is…
• Someone who exploits imperfections of the system for personal or
organizational (e.g. nation state) gain.
Slide 28
http://sebokwiki.org/wiki/Applying_Life_Cycle_Processes
http://www.ibis-instruments.com/index.php?link=en/menu/2211/protocol-analysis
http://www.quora.com/What-is-wireless-sensor-network-WSN-technology
Different kinds of wearables bring different risks
Slide 29
Created by Beecham Research in Partnership with Wearable Technologies Group
http://www.hl7standards.com/blog/2013/09/12/redesigning-wearable-tech/
Managing complexity is a key to security
Slide 30
http://scholar.lib.vt.edu/ejournals/JOTS/v32/v32n1/images/mcquade1.jpg
Defense in depth
Security risk
control
Asset
Breach
Privilege
Control
Managing breaches and elevation of privilege
Architecture can promote safety, security, and
robustness
Sensor A and B fail
dangerously due
to CCF
Sensor A fails
dangerously
Sensor B fails
dangerously
Sensor system
fails dangerously
Specifications, standards, codes, and regulations
can help guide architects and developers
Slide 33
Regulations
Standards
Specifications
Codes
Case Study – Healthcare
(ASTM F2761 ICE architecture)
Slide 34
FDA Recognized Consensus Standard
The growing Medical IoT
Slide 35
New solutions: low cost pervasive technologies
36
All this data could help improve healthcare
Slide 37
http://www.cs.purdue.edu/homes/bertino/IIS-eHealth/images/ehealth_full.jpg
The medical Internet of Things (mIoT)
Digital health devices — defined as “an internet-connected
device or software created for detection or treatment of a
medical indication”
— saved the US healthcare system $6 billion last year in
the form of improved medication adherence, behavior
modifications and fewer emergency room visits. They
predict that savings will grow to $10 billion in 2015,
$18 billion in 2016, $30 billion in 2017 and $50 billion in
2018.
- Accenture
38
UL participates with government agencies to
establish perspectives on risk
39
http://www2.idexpertscorp.com/images/uploa
ds/ehr.jpg
http://static.ddmcdn.com/gif/wireless-
network-1a.jpg http://www.commercialintegrator.com/
FDA Safety and Innovation Act (FDASIA WG)
Regulators are balancing risk and innovation…
 FCC Requirements for MBAN and FDA MOU – 24 May 2012
 FDA Guidance: RF Wireless Technology…– 13 Aug 2013
 FDA Guidance for Home Use Devices – 24 Nov 2014
 FDA Draft Guidance: General Wellness (Low Risk) – 20 Jan 2015
 FDA Guidance: Mobile Medical Applications – 25 Sept 2013
 EC Guidance Document – Qualification and Classification of stand alone
software (MEDDEV 2.1/6) – Jan 2012
 FDA Final Rule: MDDS – 15 Feb 2011
 FDA Guidance: Medical Device Data Systems, Medical Image Storage
Devices, and Medical Image Communications Devices – 9 Jan 2015
 FDA Guidance: Management of Cybersecurity – 2 Oct 2014
Consumer product or medical device?
A medical device1 is "an instrument, apparatus, implement, machine,
contrivance, implant, in vitro reagent, or other similar or related article,
including a component part, or accessory which is:
recognized in the official National Formulary, or the United States
Pharmacopoeia, or any supplement to them, intended for use in
the diagnosis of disease or other conditions, or in the
cure, mitigation, treatment, or prevention of disease, in
man or other animals, or
intended to affect the structure or any function of the
body of man or other animals, and which does not achieve any
of its primary intended purposes through chemical action within or on
the body of man or other animals and which is not dependent upon
being metabolized for the achievement of any of its primary intended
purposes."
http://www.fda.gov/aboutfda/transparency/basics/ucm211822.htm
41
Labeling can make all the difference…
42
http://www.fda.gov/MedicalDevices/ProductsandMedicalProcedures/Ob
esityDevices/ucm350134.htm
Treat Obesity vs. Manage Weight
The struggle to characterize relative risk
Proposed in 2015 draft guidance on low risk general wellness
devices
Whether a device is low risk for purposes of this guidance is
determined by whether or not the product:
1) is invasive;
2) involves an intervention or technology that may pose a risk to a
user’s safety if device controls are not applied, such as risks from
lasers, radiation exposure, or implants;
3) raises novel questions of usability; or
4) raises questions of biocompatibility.
43
Consumer products may be regulated too
US Consumer Product Safety Commission
- Consumer Product Safety Improvement Act (e.g. wearable tech considered
childrens’ “jewelry”)
- Mechanisms to facilitate recalls
US Federal Trade Commission
- Federal Trade Commission Act (e.g. FTC levies fines against melanoma
detection apps…”lacks adequate evidence to support their claims”…)
- …”unfair or deceptive acts or practices in or affecting commerce; (b) seek
monetary redress and other relief for conduct injurious to consumers”…
Occupational Safety and Health Administration
- Most employees in the US come under OSHA jurisdiction (e.g. NIOSH
recommendations for body-worn RFID)
44
Not just in the US
EU data protection reform allows penalties up to 100m Euros
Ongoing attempts to strictly regulate cybersecurity in China has
included tight controls of supply chain and significant IP disclosures for
imported products.
Cyber security is one of Australia's national security priorities under the
Prime Minister's 2008 National Security Statement. Australia's national
security, economic prosperity and social wellbeing rely on the
availability, integrity and confidentiality of a range of information and
communications technology. This includes desktop computers, the
internet, telecommunications, mobile communications devices and
other computer systems and networks.
45
Standards and regulations can stimulate
thinking about the problem space.
46
Is the data properly encrypted?
47
)))))))
Cryptographic Verification
http://img.mit.edu/newsoffice/images/article_images/20110214123646-1.jpg
What if my wearable interacts with health IT systems?
WWW
Acme Insurance
Are there new risks to consider?
49
WWW
Acme
Insurance
How secure are my data exchanges?
1001010010100101101010
Has my data been compromised (even a little)?
51
1001010010100101101010X
Single Event Upset or Data Corruption
EXAMPLE:
How do I respond when service is lost?
52
No Data
EXAMPLE:
Reduce the likelihood of breaches
53
Addressing such system robustness issues in general can minimize
weaknesses that hackers could exploit.
Slide 53
http://sebokwiki.org/wiki/Applying_Life_Cycle_Processes
http://www.ibis-instruments.com/index.php?link=en/menu/2211/protocol-analysis
http://www.quora.com/What-is-wireless-sensor-network-WSN-technology
Standards can help establish assurance cases
Slide 54
https://buildsecurityin.us-cert.gov/bsi/1051-BSI/version/default/part/ImageData/data/Assurance_Cases_and_LifeCycle_Processes.png
Safety Standards
Regulators Leverage Standards
Aug 6, 2013 FDA Recognized Consensus Standards Support
Interoperability:
There are 25 new standards grouped mainly into three categories:
1. Managing risk in a connected and networked environment;
2. Nomenclature, frameworks and medical device specific communications,
including system and software lifecycle process;
3. Cybersecurity including standards from the industrial control systems arena
that are relevant to medical devices.
Coming soon:
AAMI / UL 2800 – interoperable medical device safety
http://www.securedgenetworks.com
Technology is enabling rapid product innovation and
new safety standards and regulations are emerging
56
IDEA
PRODUCT
&
SERVICE
Managing innovation and regulatory change
UL supports WT and IoE developers through
supply chain and sustainability services
Slide 57
Throughout the entire product lifecycle to
address safety, security, and performance
Slide 58
Thank You
59

Contenu connexe

Tendances

CyberSecurity Medical Devices
CyberSecurity Medical DevicesCyberSecurity Medical Devices
CyberSecurity Medical DevicesSuresh Mandava
 
[Wroclaw #6] Medical device security
[Wroclaw #6] Medical device security[Wroclaw #6] Medical device security
[Wroclaw #6] Medical device securityOWASP
 
Cybersecurity in medical devices
Cybersecurity in medical devicesCybersecurity in medical devices
Cybersecurity in medical devicesSafisSolutions
 
connected Medical devices IoT Cybersecurity reference architecture Telemedicine
connected Medical devices IoT Cybersecurity reference architecture Telemedicineconnected Medical devices IoT Cybersecurity reference architecture Telemedicine
connected Medical devices IoT Cybersecurity reference architecture TelemedicineAlessandro Sappia
 
Hacking Into Medical Devices
Hacking Into Medical DevicesHacking Into Medical Devices
Hacking Into Medical DevicesJane Wang
 
Csec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.comCsec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.comPrescottLunt384
 
Intel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealthIntel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealthrcnossen
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comPrescottLunt386
 
Whitepaper | Network Security - How to defend your Plant against the threats ...
Whitepaper | Network Security - How to defend your Plant against the threats ...Whitepaper | Network Security - How to defend your Plant against the threats ...
Whitepaper | Network Security - How to defend your Plant against the threats ...Yokogawa
 
Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?Rio Valdes
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityMighty Guides, Inc.
 
Information technology in health care management
Information technology in health care managementInformation technology in health care management
Information technology in health care managementmohamedmoosa2
 
Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!Tammy Clark
 
Medical Data Encryption 101
Medical Data Encryption 101Medical Data Encryption 101
Medical Data Encryption 101SecurityMetrics
 
How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach SecurityMetrics
 
NIST Malware Attack Prevention SP 800-83
NIST Malware Attack Prevention  SP 800-83NIST Malware Attack Prevention  SP 800-83
NIST Malware Attack Prevention SP 800-83David Sweigert
 
Securing Industrial Control Systems - CornCON II: The Wrath Of Corn
Securing Industrial Control Systems - CornCON II: The Wrath Of CornSecuring Industrial Control Systems - CornCON II: The Wrath Of Corn
Securing Industrial Control Systems - CornCON II: The Wrath Of CornEric Andresen
 

Tendances (20)

CyberSecurity Medical Devices
CyberSecurity Medical DevicesCyberSecurity Medical Devices
CyberSecurity Medical Devices
 
[Wroclaw #6] Medical device security
[Wroclaw #6] Medical device security[Wroclaw #6] Medical device security
[Wroclaw #6] Medical device security
 
Cybersecurity in Medical Devices
Cybersecurity in Medical DevicesCybersecurity in Medical Devices
Cybersecurity in Medical Devices
 
Cybersecurity in medical devices
Cybersecurity in medical devicesCybersecurity in medical devices
Cybersecurity in medical devices
 
connected Medical devices IoT Cybersecurity reference architecture Telemedicine
connected Medical devices IoT Cybersecurity reference architecture Telemedicineconnected Medical devices IoT Cybersecurity reference architecture Telemedicine
connected Medical devices IoT Cybersecurity reference architecture Telemedicine
 
Hacking Into Medical Devices
Hacking Into Medical DevicesHacking Into Medical Devices
Hacking Into Medical Devices
 
Csec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.comCsec 610 Inspiring Innovation--tutorialrank.com
Csec 610 Inspiring Innovation--tutorialrank.com
 
Intel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealthIntel HIMSS WoHIT mhealth
Intel HIMSS WoHIT mhealth
 
Cyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.comCyb 610 Inspiring Innovation--tutorialrank.com
Cyb 610 Inspiring Innovation--tutorialrank.com
 
Whitepaper | Network Security - How to defend your Plant against the threats ...
Whitepaper | Network Security - How to defend your Plant against the threats ...Whitepaper | Network Security - How to defend your Plant against the threats ...
Whitepaper | Network Security - How to defend your Plant against the threats ...
 
Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
 
Information technology in health care management
Information technology in health care managementInformation technology in health care management
Information technology in health care management
 
Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!Giving The Heave Ho To Worms, Spyware, And Bots!
Giving The Heave Ho To Worms, Spyware, And Bots!
 
Medical Data Encryption 101
Medical Data Encryption 101Medical Data Encryption 101
Medical Data Encryption 101
 
How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach How to Effectively Manage a Data Breach
How to Effectively Manage a Data Breach
 
NIST Malware Attack Prevention SP 800-83
NIST Malware Attack Prevention  SP 800-83NIST Malware Attack Prevention  SP 800-83
NIST Malware Attack Prevention SP 800-83
 
Securing Industrial Control Systems - CornCON II: The Wrath Of Corn
Securing Industrial Control Systems - CornCON II: The Wrath Of CornSecuring Industrial Control Systems - CornCON II: The Wrath Of Corn
Securing Industrial Control Systems - CornCON II: The Wrath Of Corn
 
Nist.sp.800 124r1
Nist.sp.800 124r1Nist.sp.800 124r1
Nist.sp.800 124r1
 
Healthcare Cyber Security Webinar
Healthcare Cyber Security WebinarHealthcare Cyber Security Webinar
Healthcare Cyber Security Webinar
 

Similaire à Securing the Fog: Risks and Opportunities in the Medical Internet of Things

eHealth - Medical Systems Interoperability & Mobile Health
eHealth - Medical Systems Interoperability & Mobile HealtheHealth - Medical Systems Interoperability & Mobile Health
eHealth - Medical Systems Interoperability & Mobile Healthulmedical
 
Critical Steps in Software Development: Enhance Your Chances for a Successful...
Critical Steps in Software Development: Enhance Your Chances for a Successful...Critical Steps in Software Development: Enhance Your Chances for a Successful...
Critical Steps in Software Development: Enhance Your Chances for a Successful...Sterling Medical Devices
 
Erdleymurray Sini2007
Erdleymurray Sini2007Erdleymurray Sini2007
Erdleymurray Sini2007Peter Murray
 
The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security BattlegroundWatchful Software
 
Healthcare cyber powerpoint
Healthcare cyber powerpointHealthcare cyber powerpoint
Healthcare cyber powerpointsafecities
 
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015Claus Cramon Houmann
 
Trends in Wearable Technology: Post COVID Impact
Trends in Wearable Technology: Post COVID ImpactTrends in Wearable Technology: Post COVID Impact
Trends in Wearable Technology: Post COVID ImpactRamneek Kalra
 
Acus intel medical_devices
Acus intel medical_devicesAcus intel medical_devices
Acus intel medical_devicesatlanticcouncil
 
The Healthcare Internet of Things: Rewards and Risks
The Healthcare Internet of Things: Rewards and RisksThe Healthcare Internet of Things: Rewards and Risks
The Healthcare Internet of Things: Rewards and Risksatlanticcouncil
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...3GDR
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...3GDR
 
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...IRJET Journal
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureCalgary Scientific Inc.
 
Dr Dev Kambhampati | Security Tenets for Life Critical Embedded Systems
Dr Dev Kambhampati | Security Tenets for Life Critical Embedded SystemsDr Dev Kambhampati | Security Tenets for Life Critical Embedded Systems
Dr Dev Kambhampati | Security Tenets for Life Critical Embedded SystemsDr Dev Kambhampati
 
Best of Positive Research 2013
Best of Positive Research 2013Best of Positive Research 2013
Best of Positive Research 2013qqlan
 
Aula 7 - The Road Ahead - 8 SE Ethics Principles by Roger Pressman
Aula 7 - The Road Ahead - 8 SE Ethics Principles by Roger PressmanAula 7 - The Road Ahead - 8 SE Ethics Principles by Roger Pressman
Aula 7 - The Road Ahead - 8 SE Ethics Principles by Roger PressmanRogerio P C do Nascimento
 
Aula 7 - The Road Ahead - 8 SE Ethics Principles by Roger Pressman
Aula 7 - The Road Ahead - 8 SE Ethics Principles by Roger PressmanAula 7 - The Road Ahead - 8 SE Ethics Principles by Roger Pressman
Aula 7 - The Road Ahead - 8 SE Ethics Principles by Roger PressmanRogerio P C do Nascimento
 
2019 SANS Holiday Hack Challenge Deliverable
2019 SANS Holiday Hack Challenge Deliverable2019 SANS Holiday Hack Challenge Deliverable
2019 SANS Holiday Hack Challenge DeliverableCurtis Brazzell
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...IRJET Journal
 

Similaire à Securing the Fog: Risks and Opportunities in the Medical Internet of Things (20)

eHealth - Medical Systems Interoperability & Mobile Health
eHealth - Medical Systems Interoperability & Mobile HealtheHealth - Medical Systems Interoperability & Mobile Health
eHealth - Medical Systems Interoperability & Mobile Health
 
Critical Steps in Software Development: Enhance Your Chances for a Successful...
Critical Steps in Software Development: Enhance Your Chances for a Successful...Critical Steps in Software Development: Enhance Your Chances for a Successful...
Critical Steps in Software Development: Enhance Your Chances for a Successful...
 
Erdleymurray Sini2007
Erdleymurray Sini2007Erdleymurray Sini2007
Erdleymurray Sini2007
 
The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security Battleground
 
Healthcare cyber powerpoint
Healthcare cyber powerpointHealthcare cyber powerpoint
Healthcare cyber powerpoint
 
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
 
Trends in Wearable Technology: Post COVID Impact
Trends in Wearable Technology: Post COVID ImpactTrends in Wearable Technology: Post COVID Impact
Trends in Wearable Technology: Post COVID Impact
 
Acus intel medical_devices
Acus intel medical_devicesAcus intel medical_devices
Acus intel medical_devices
 
The Healthcare Internet of Things: Rewards and Risks
The Healthcare Internet of Things: Rewards and RisksThe Healthcare Internet of Things: Rewards and Risks
The Healthcare Internet of Things: Rewards and Risks
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
 
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
ICISS Newsletter March 14
ICISS Newsletter March 14ICISS Newsletter March 14
ICISS Newsletter March 14
 
Dr Dev Kambhampati | Security Tenets for Life Critical Embedded Systems
Dr Dev Kambhampati | Security Tenets for Life Critical Embedded SystemsDr Dev Kambhampati | Security Tenets for Life Critical Embedded Systems
Dr Dev Kambhampati | Security Tenets for Life Critical Embedded Systems
 
Best of Positive Research 2013
Best of Positive Research 2013Best of Positive Research 2013
Best of Positive Research 2013
 
Aula 7 - The Road Ahead - 8 SE Ethics Principles by Roger Pressman
Aula 7 - The Road Ahead - 8 SE Ethics Principles by Roger PressmanAula 7 - The Road Ahead - 8 SE Ethics Principles by Roger Pressman
Aula 7 - The Road Ahead - 8 SE Ethics Principles by Roger Pressman
 
Aula 7 - The Road Ahead - 8 SE Ethics Principles by Roger Pressman
Aula 7 - The Road Ahead - 8 SE Ethics Principles by Roger PressmanAula 7 - The Road Ahead - 8 SE Ethics Principles by Roger Pressman
Aula 7 - The Road Ahead - 8 SE Ethics Principles by Roger Pressman
 
2019 SANS Holiday Hack Challenge Deliverable
2019 SANS Holiday Hack Challenge Deliverable2019 SANS Holiday Hack Challenge Deliverable
2019 SANS Holiday Hack Challenge Deliverable
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
 

Dernier

All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 

Dernier (20)

All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 

Securing the Fog: Risks and Opportunities in the Medical Internet of Things

  • 1. © 2015 UL LLC Anura Fernando – Underwriters Laboratories (UL) Security of Things September 10, 2015 Copyright © 2015 UL LLC ® All rights reserved Securing the Fog
  • 2. Anura S Fernando Anura S. Fernando is UL’s Principal Engineer for Medical Software & Systems Interoperability. Background: • Degrees in Electrical Engineering, Biology/Chemistry, and Software Engineering • Over 17 years experience at UL with safety critical software and control systems certification; as well as research across many industries – process automation, alternative energy, medical, hazardous locations, appliances, optical radiation, nanotechnology, battery technologies, etc. • Research and publications in Predictive Modeling and Risk Analysis, Cybersecurity, Systems of Systems, Software, Health IT, Apps, and Medical Device safety. • Projects with numerous Fortune 500 companies, DoD, DoE, DHS, FDA, FCC, ONC, NASA and several U.S. National Laboratories Additional experience relevant for this discussion/audience: • Contributed to the development of several standards involving software and Functional Safety as a member in IEC, ISO, ASME committees and Expert Task Force member. • UL lead for the development of the AAMI/UL 2800 family of eHealth standards for interoperable medical device interface safety. • Member of the Federal Advisory Committee FDASIA WG to the Health IT Policy Committee, FDA Medical Device Interoperability Coordinating Council, Medical Device Interoperability Safety Working Group, Health Information Management Systems Society, Association for the Advancement of Medical Instrumentation, and the International Council on Systems Engineering
  • 3. Not too long ago, we were pretty focused on what could be done in the cloud… Slide 3 http://gcn.com/Blogs/Pulse/2012/12/VA-cloud-Office-365-for-600000-users.aspx
  • 4. Now we’re equally interested in what is happening around the cloud… Slide 4 http://www.slate.com/blogs/future_tense/2014/08/05/oregon_gulch_fire_photos_show_pyrocumulus_clouds_and_fighter_jets_over_wildfire.html
  • 5. What do we call this new domain?...the “Fog” Slide 5 http://www.bahrainweather.gov.bh/education_fog
  • 6. …fog computing covers…the IoE Slide 6 http://www.sintef.no/home/Information-and-Communication-Technology-ICT-old/Software-Engineering-Safety-and-Security/Research-groups/Model-Based-Systems/Ubiquitous-and-mobile-computing/
  • 7. What is “fog computing” (or edge computing) Slide 7 http://www.frontiersin.org/files/Articles/78030/fnhum-08-00370-r2/image_m/fnhum-08-00370-g001.jpg
  • 8. The fog uses pervasive computing technologies Slide 8 http://2.bp.blogspot.com/-afr-gp6eyl http://www.untitledname.com/archives/upload/2005/10/bicyclist-cell-phone.jpg http://i-cdn.phonearena.com/images/articles/84906-image/wear.png
  • 9. …with many sensors creating many possibilities Slide 9 https://blogs.synopsys.com/configurablethoughts/2012/05/sensing-your-world/
  • 10. …and new sensor technologies emerging regularly Nanotechnologies integrated with textiles 10 H Zhao et al, Nanotechnology 21 (2010) 305502
  • 11. Combining wearables with network technologies… Slide 11 http://ualr.edu/sxyu1/Research.htm
  • 12. In a “microbiome” of wearable sensors… http://www.bizjournals.com/sanjose/news/2013/06/21/216-million-geeky-americans-want.html?s=image_gallery
  • 13. …we can become the “quantified self” Slide 13 http://www.thethinkingbench.com/the-year-of-the-quantified-self-revolution/
  • 14. So what risks may lie ahead? Slide 14 http://www.smarterbusiness.org.uk/business_targets/view/minimiserisks
  • 15. Understanding new science…What makes fog? Slide 15 http://www.wsaz.com/blogs/askjosh/53290657.html
  • 16. Understanding new science…what makes “fog” Slide 16 Image extracted from Systems Engineering Fundamentals. Defense Acquisition University Press, 2001
  • 17. Analyzing Risk: Hazard Based Safety Engineering 17 …or Data …or Process
  • 18. Slide 18 Hazardous Energy Source Transfer Mechanism Susceptible Part HBSE Premise ENERGY TRANSFER INJURY AND INADEQUATE PERSONAL SAFEGUARD PERSONAL SAFEGUARD FAILURE NO PERSONAL SAFEGUARD OR INADEQUATE PERSONAL AVOIDANCE AVOIDANCE NOT POSSIBLE AVOIDANCE NOT ATTEMPTED OR BODILY EXPOSURE AND INADEQUATE EQUIPMENT SAFEGUARD EQUIPMENT SAFEGUARD FAILURE NO EQUIPMENT SAFEGUARD OR INADEQUATE EQUIPMENT SAFEGUARD EQUIPMENT SAFEGUARD FAILURE NO EQUIPMENT SAFEGUARD OR HAZARDOUS ENERGY AND (EVENT) OR (EVENT) OR HBSE Standard Injury Fault Tree No No IDENTIFY ENERGY SOURCE IS SOURCE HAZARDOUS? IDENTIFY MEANS BY WHICH ENERGY CAN BE TRANSFERRED TO A BODY PART DESIGN SAFEGUARD WHICH WILL PREVENT ENERGY TRANSFER TO A BODY PART MEASURE SAFEGUARD EFFECTIVENESS IS SAFEGUARD EFFECTIVE? DONE Yes Yes HBSE Process …or Data …or Process Analysis Drives UL’s Safety Testing and Certification
  • 19. Applying HBSE to Wearable Technologies 19 Hazardous Energy Source Transfer Mechanism Susceptible Part HBSE Premise …or Data …or Process Are there any hazards?
  • 20. We can see some WT IoE risks 20 Optical Radiation (LASER, UV, etc…) Privacy, Security, Performance if used by Dr (Cryptographic verification, HIPAA) Acoustic Energy Data Integrity, Usability
  • 21. Even some unique new problems can arise…”cybersickness” 21 • Eye strain • Headache • Pallor • Sweating • Dryness of mouth • Fullness of stomach • Disorientation • Vertigo2 • Ataxia3 • Nausea • Vomiting. Viola, SIGCHI Bulletin Volume 32, Number 1 January 2000
  • 22. Different layers of the IoE system require different risk considerations 22 http://sebokwiki.org/wiki/Applying_Life_Cycle_Processes
  • 23. What about “big data” from the IoE… 23 http://www.districtoffuture.eu/index.php/mod.pags/mem.detalle/id.10/relcategoria.1077/relmenu.5
  • 24. Where is all this data stored? Is it secure? Is it correct? Can I trust it?... Slide 24
  • 25. Big data problems can be due to little differences in context Slide 25 https://blogs.synopsys.com/configurablethoughts/2012/05/sensing-your-world/
  • 26. Who should get a reduced premium? Slide 26 http://www.unfitbits.com/http://www.nutripro.net/become-a-morning-jogger/
  • 27. Who is a hacker? Slide 27 http://www.unfitbits.com/ http://impulse.coreatcu.com/opinions/2014/10/30/hacker-culture-bank-account-mine/ http://www.gizmag.com/funtoro-bus-coach-infotainment-system/15056/
  • 28. A hacker is… • Someone who exploits imperfections of the system for personal or organizational (e.g. nation state) gain. Slide 28 http://sebokwiki.org/wiki/Applying_Life_Cycle_Processes http://www.ibis-instruments.com/index.php?link=en/menu/2211/protocol-analysis http://www.quora.com/What-is-wireless-sensor-network-WSN-technology
  • 29. Different kinds of wearables bring different risks Slide 29 Created by Beecham Research in Partnership with Wearable Technologies Group http://www.hl7standards.com/blog/2013/09/12/redesigning-wearable-tech/
  • 30. Managing complexity is a key to security Slide 30 http://scholar.lib.vt.edu/ejournals/JOTS/v32/v32n1/images/mcquade1.jpg
  • 31. Defense in depth Security risk control Asset Breach Privilege Control Managing breaches and elevation of privilege
  • 32. Architecture can promote safety, security, and robustness Sensor A and B fail dangerously due to CCF Sensor A fails dangerously Sensor B fails dangerously Sensor system fails dangerously
  • 33. Specifications, standards, codes, and regulations can help guide architects and developers Slide 33 Regulations Standards Specifications Codes
  • 34. Case Study – Healthcare (ASTM F2761 ICE architecture) Slide 34 FDA Recognized Consensus Standard
  • 35. The growing Medical IoT Slide 35
  • 36. New solutions: low cost pervasive technologies 36
  • 37. All this data could help improve healthcare Slide 37 http://www.cs.purdue.edu/homes/bertino/IIS-eHealth/images/ehealth_full.jpg
  • 38. The medical Internet of Things (mIoT) Digital health devices — defined as “an internet-connected device or software created for detection or treatment of a medical indication” — saved the US healthcare system $6 billion last year in the form of improved medication adherence, behavior modifications and fewer emergency room visits. They predict that savings will grow to $10 billion in 2015, $18 billion in 2016, $30 billion in 2017 and $50 billion in 2018. - Accenture 38
  • 39. UL participates with government agencies to establish perspectives on risk 39 http://www2.idexpertscorp.com/images/uploa ds/ehr.jpg http://static.ddmcdn.com/gif/wireless- network-1a.jpg http://www.commercialintegrator.com/ FDA Safety and Innovation Act (FDASIA WG)
  • 40. Regulators are balancing risk and innovation…  FCC Requirements for MBAN and FDA MOU – 24 May 2012  FDA Guidance: RF Wireless Technology…– 13 Aug 2013  FDA Guidance for Home Use Devices – 24 Nov 2014  FDA Draft Guidance: General Wellness (Low Risk) – 20 Jan 2015  FDA Guidance: Mobile Medical Applications – 25 Sept 2013  EC Guidance Document – Qualification and Classification of stand alone software (MEDDEV 2.1/6) – Jan 2012  FDA Final Rule: MDDS – 15 Feb 2011  FDA Guidance: Medical Device Data Systems, Medical Image Storage Devices, and Medical Image Communications Devices – 9 Jan 2015  FDA Guidance: Management of Cybersecurity – 2 Oct 2014
  • 41. Consumer product or medical device? A medical device1 is "an instrument, apparatus, implement, machine, contrivance, implant, in vitro reagent, or other similar or related article, including a component part, or accessory which is: recognized in the official National Formulary, or the United States Pharmacopoeia, or any supplement to them, intended for use in the diagnosis of disease or other conditions, or in the cure, mitigation, treatment, or prevention of disease, in man or other animals, or intended to affect the structure or any function of the body of man or other animals, and which does not achieve any of its primary intended purposes through chemical action within or on the body of man or other animals and which is not dependent upon being metabolized for the achievement of any of its primary intended purposes." http://www.fda.gov/aboutfda/transparency/basics/ucm211822.htm 41
  • 42. Labeling can make all the difference… 42 http://www.fda.gov/MedicalDevices/ProductsandMedicalProcedures/Ob esityDevices/ucm350134.htm Treat Obesity vs. Manage Weight
  • 43. The struggle to characterize relative risk Proposed in 2015 draft guidance on low risk general wellness devices Whether a device is low risk for purposes of this guidance is determined by whether or not the product: 1) is invasive; 2) involves an intervention or technology that may pose a risk to a user’s safety if device controls are not applied, such as risks from lasers, radiation exposure, or implants; 3) raises novel questions of usability; or 4) raises questions of biocompatibility. 43
  • 44. Consumer products may be regulated too US Consumer Product Safety Commission - Consumer Product Safety Improvement Act (e.g. wearable tech considered childrens’ “jewelry”) - Mechanisms to facilitate recalls US Federal Trade Commission - Federal Trade Commission Act (e.g. FTC levies fines against melanoma detection apps…”lacks adequate evidence to support their claims”…) - …”unfair or deceptive acts or practices in or affecting commerce; (b) seek monetary redress and other relief for conduct injurious to consumers”… Occupational Safety and Health Administration - Most employees in the US come under OSHA jurisdiction (e.g. NIOSH recommendations for body-worn RFID) 44
  • 45. Not just in the US EU data protection reform allows penalties up to 100m Euros Ongoing attempts to strictly regulate cybersecurity in China has included tight controls of supply chain and significant IP disclosures for imported products. Cyber security is one of Australia's national security priorities under the Prime Minister's 2008 National Security Statement. Australia's national security, economic prosperity and social wellbeing rely on the availability, integrity and confidentiality of a range of information and communications technology. This includes desktop computers, the internet, telecommunications, mobile communications devices and other computer systems and networks. 45
  • 46. Standards and regulations can stimulate thinking about the problem space. 46
  • 47. Is the data properly encrypted? 47 ))))))) Cryptographic Verification http://img.mit.edu/newsoffice/images/article_images/20110214123646-1.jpg
  • 48. What if my wearable interacts with health IT systems? WWW Acme Insurance
  • 49. Are there new risks to consider? 49 WWW Acme Insurance
  • 50. How secure are my data exchanges? 1001010010100101101010
  • 51. Has my data been compromised (even a little)? 51 1001010010100101101010X Single Event Upset or Data Corruption EXAMPLE:
  • 52. How do I respond when service is lost? 52 No Data EXAMPLE:
  • 53. Reduce the likelihood of breaches 53 Addressing such system robustness issues in general can minimize weaknesses that hackers could exploit. Slide 53 http://sebokwiki.org/wiki/Applying_Life_Cycle_Processes http://www.ibis-instruments.com/index.php?link=en/menu/2211/protocol-analysis http://www.quora.com/What-is-wireless-sensor-network-WSN-technology
  • 54. Standards can help establish assurance cases Slide 54 https://buildsecurityin.us-cert.gov/bsi/1051-BSI/version/default/part/ImageData/data/Assurance_Cases_and_LifeCycle_Processes.png Safety Standards
  • 55. Regulators Leverage Standards Aug 6, 2013 FDA Recognized Consensus Standards Support Interoperability: There are 25 new standards grouped mainly into three categories: 1. Managing risk in a connected and networked environment; 2. Nomenclature, frameworks and medical device specific communications, including system and software lifecycle process; 3. Cybersecurity including standards from the industrial control systems arena that are relevant to medical devices. Coming soon: AAMI / UL 2800 – interoperable medical device safety
  • 56. http://www.securedgenetworks.com Technology is enabling rapid product innovation and new safety standards and regulations are emerging 56 IDEA PRODUCT & SERVICE Managing innovation and regulatory change
  • 57. UL supports WT and IoE developers through supply chain and sustainability services Slide 57
  • 58. Throughout the entire product lifecycle to address safety, security, and performance Slide 58