Cargando…
Hacking 9-1-1: Infrastructure Vulnerabilities and Attack Vectors
9-1-1 call centers are a critical component of prehospital care: they accept emergency calls, dispatch field responders such as emergency medical services, and provide callers with emergency medical instructions before their arrival. The aim of this study was to describe the technical structure of t...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
JMIR Publications
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6647750/ https://www.ncbi.nlm.nih.gov/pubmed/31290401 http://dx.doi.org/10.2196/14383 |
_version_ | 1783437752612683776 |
---|---|
author | Goebel, Mat Dameff, Christian Tully, Jeffrey |
author_facet | Goebel, Mat Dameff, Christian Tully, Jeffrey |
author_sort | Goebel, Mat |
collection | PubMed |
description | 9-1-1 call centers are a critical component of prehospital care: they accept emergency calls, dispatch field responders such as emergency medical services, and provide callers with emergency medical instructions before their arrival. The aim of this study was to describe the technical structure of the 9-1-1 call-taking system and to describe its vulnerabilities that could lead to compromised patient care. 9-1-1 calls answered from mobile phones and landlines use a variety of technologies to provide information about caller location and other information. These interconnected technologies create potential cyber vulnerabilities. A variety of attacks could be carried out on 9-1-1 infrastructure to various ends. Attackers could target individuals, groups, or entire municipalities. These attacks could result in anything from a nuisance to increased loss of life in a physical attack to worse overall outcomes owing to delays in care for time-sensitive conditions. Evolving 9-1-1 systems are increasingly connected and dependent on network technology. As implications of cybersecurity vulnerabilities loom large, future research should examine methods of hardening the 9-1-1 system against attack. |
format | Online Article Text |
id | pubmed-6647750 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | JMIR Publications |
record_format | MEDLINE/PubMed |
spelling | pubmed-66477502019-07-30 Hacking 9-1-1: Infrastructure Vulnerabilities and Attack Vectors Goebel, Mat Dameff, Christian Tully, Jeffrey J Med Internet Res Viewpoint 9-1-1 call centers are a critical component of prehospital care: they accept emergency calls, dispatch field responders such as emergency medical services, and provide callers with emergency medical instructions before their arrival. The aim of this study was to describe the technical structure of the 9-1-1 call-taking system and to describe its vulnerabilities that could lead to compromised patient care. 9-1-1 calls answered from mobile phones and landlines use a variety of technologies to provide information about caller location and other information. These interconnected technologies create potential cyber vulnerabilities. A variety of attacks could be carried out on 9-1-1 infrastructure to various ends. Attackers could target individuals, groups, or entire municipalities. These attacks could result in anything from a nuisance to increased loss of life in a physical attack to worse overall outcomes owing to delays in care for time-sensitive conditions. Evolving 9-1-1 systems are increasingly connected and dependent on network technology. As implications of cybersecurity vulnerabilities loom large, future research should examine methods of hardening the 9-1-1 system against attack. JMIR Publications 2019-07-09 /pmc/articles/PMC6647750/ /pubmed/31290401 http://dx.doi.org/10.2196/14383 Text en ©Mat Goebel, Christian Dameff, Jeffrey Tully. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 09.07.2019. https://creativecommons.org/licenses/by/4.0/This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on http://www.jmir.org/, as well as this copyright and license information must be included. |
spellingShingle | Viewpoint Goebel, Mat Dameff, Christian Tully, Jeffrey Hacking 9-1-1: Infrastructure Vulnerabilities and Attack Vectors |
title | Hacking 9-1-1: Infrastructure Vulnerabilities and Attack Vectors |
title_full | Hacking 9-1-1: Infrastructure Vulnerabilities and Attack Vectors |
title_fullStr | Hacking 9-1-1: Infrastructure Vulnerabilities and Attack Vectors |
title_full_unstemmed | Hacking 9-1-1: Infrastructure Vulnerabilities and Attack Vectors |
title_short | Hacking 9-1-1: Infrastructure Vulnerabilities and Attack Vectors |
title_sort | hacking 9-1-1: infrastructure vulnerabilities and attack vectors |
topic | Viewpoint |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6647750/ https://www.ncbi.nlm.nih.gov/pubmed/31290401 http://dx.doi.org/10.2196/14383 |
work_keys_str_mv | AT goebelmat hacking911infrastructurevulnerabilitiesandattackvectors AT dameffchristian hacking911infrastructurevulnerabilitiesandattackvectors AT tullyjeffrey hacking911infrastructurevulnerabilitiesandattackvectors |