Medical Device Cybersecurity

Medical Device Cybersecurity PDF Author: Axel Wirth
Publisher: Artech House Publishers
ISBN: 9781630818159
Category :
Languages : en
Pages : 270

Get Book

Book Description
This comprehensive book provides a complete guide for medical device manufacturers seeking to implement lifecycle processes that secure their premarket and postmarket activities. This step-by-step book educates manufacturers about the implementation of security best practices in accord with industry standards and expectations, advising the reader about everything from high-level concepts to real-world solutions and tools. It walks the reader through the security aspects of every lifecycle phase of the product, including concept; design; implementation; supply chain; manufacturing; postmarket; maintenance; and end of life. It details the practices, processes, and outputs necessary to create a secure medical device capable of gaining regulatory approval and meeting market entry requirements.This book equips medical device manufacturers with the knowledge and capability required to produce secure products that anticipate healthcare delivery organizations' (HDOs) and patients' needs and expectations, meet market-entry requirements set by regulators and standards organizations, and reduce patient, HDO, and manufacturer exposure to increasingly sophisticated cyber adversaries.It explores the differences between cybersecurity in an IT/MIS environment versus the application and management of cybersecurity during the development of an embedded product, as typically found in the medical device ecosystem. Designers and manufacturers learn how to mitigate or avoid common cybersecurity vulnerabilities frequently introduced during development and production. It details regulatory and customer expectations for documentation artifacts and deliverables that demonstrate cybersecurity compliance and features as well as regulator expectations for postmarket activities during device service life. Readers become aware of the growing sophistication of cyber adversaries disproportionate to industry understanding of cybersecurity exposure and potential impacts.