Cargando…
PRIVACY AND SECURITY FOR TELEHEALTH DEVICES
In this research, we study the privacy and security capabilities provided by telehealth devices. Our aim is to evaluate how vulnerable these popular devices are in the presence of malicious cyber attackers. As older adults increasingly rely on telehealth devices, it is crucial that cybersecurity asp...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Oxford University Press
2019
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6846017/ http://dx.doi.org/10.1093/geroni/igz038.3081 |
_version_ | 1783468795091746816 |
---|---|
author | Thompson, London Farkas, Csilla |
author_facet | Thompson, London Farkas, Csilla |
author_sort | Thompson, London |
collection | PubMed |
description | In this research, we study the privacy and security capabilities provided by telehealth devices. Our aim is to evaluate how vulnerable these popular devices are in the presence of malicious cyber attackers. As older adults increasingly rely on telehealth devices, it is crucial that cybersecurity aspects of these devices are clearly communicated to them. Moreover, older adults frequently lack the technical expertise to evaluate the security and privacy capabilities of the devices. The lack of control over telehealth devices is a major concern for older adults. Older adults view certain limitations within these devices as decreasing their privacy and security. These limitations include the lack of control over accepting calls, taking screenshots, and assigning access privileges. For large scale adaptation of telehealth devices by older adults, it is crucial that these devices not only satisfy their intended purpose but also exhibit user friendly features and strong security and privacy capabilities. Modeling cyber threats against telehealth devices is not studied sufficiently . Malicious actors may compromise telehealth devices and create further threats to security and privacy of the users. In this research, we studied the cyber threats against telehealth devices. We built a threat model that ranks cyber threats based on their impact. We investigated how the operating system of popular devices supports access control. We found that none of the current technologies support location-based access control. We claim that this represents a major limitation and that supporting location-based access control is necessary to ensure users’ privacy in their own home. |
format | Online Article Text |
id | pubmed-6846017 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2019 |
publisher | Oxford University Press |
record_format | MEDLINE/PubMed |
spelling | pubmed-68460172019-11-18 PRIVACY AND SECURITY FOR TELEHEALTH DEVICES Thompson, London Farkas, Csilla Innov Aging Session Lb935 (Late Breaking Poster) In this research, we study the privacy and security capabilities provided by telehealth devices. Our aim is to evaluate how vulnerable these popular devices are in the presence of malicious cyber attackers. As older adults increasingly rely on telehealth devices, it is crucial that cybersecurity aspects of these devices are clearly communicated to them. Moreover, older adults frequently lack the technical expertise to evaluate the security and privacy capabilities of the devices. The lack of control over telehealth devices is a major concern for older adults. Older adults view certain limitations within these devices as decreasing their privacy and security. These limitations include the lack of control over accepting calls, taking screenshots, and assigning access privileges. For large scale adaptation of telehealth devices by older adults, it is crucial that these devices not only satisfy their intended purpose but also exhibit user friendly features and strong security and privacy capabilities. Modeling cyber threats against telehealth devices is not studied sufficiently . Malicious actors may compromise telehealth devices and create further threats to security and privacy of the users. In this research, we studied the cyber threats against telehealth devices. We built a threat model that ranks cyber threats based on their impact. We investigated how the operating system of popular devices supports access control. We found that none of the current technologies support location-based access control. We claim that this represents a major limitation and that supporting location-based access control is necessary to ensure users’ privacy in their own home. Oxford University Press 2019-11-08 /pmc/articles/PMC6846017/ http://dx.doi.org/10.1093/geroni/igz038.3081 Text en © The Author(s) 2019. Published by Oxford University Press on behalf of The Gerontological Society of America. http://creativecommons.org/licenses/by/4.0/ This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Session Lb935 (Late Breaking Poster) Thompson, London Farkas, Csilla PRIVACY AND SECURITY FOR TELEHEALTH DEVICES |
title | PRIVACY AND SECURITY FOR TELEHEALTH DEVICES |
title_full | PRIVACY AND SECURITY FOR TELEHEALTH DEVICES |
title_fullStr | PRIVACY AND SECURITY FOR TELEHEALTH DEVICES |
title_full_unstemmed | PRIVACY AND SECURITY FOR TELEHEALTH DEVICES |
title_short | PRIVACY AND SECURITY FOR TELEHEALTH DEVICES |
title_sort | privacy and security for telehealth devices |
topic | Session Lb935 (Late Breaking Poster) |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6846017/ http://dx.doi.org/10.1093/geroni/igz038.3081 |
work_keys_str_mv | AT thompsonlondon privacyandsecurityfortelehealthdevices AT farkascsilla privacyandsecurityfortelehealthdevices |