Cargando…

PRIVACY AND SECURITY FOR TELEHEALTH DEVICES

In this research, we study the privacy and security capabilities provided by telehealth devices. Our aim is to evaluate how vulnerable these popular devices are in the presence of malicious cyber attackers. As older adults increasingly rely on telehealth devices, it is crucial that cybersecurity asp...

Descripción completa

Detalles Bibliográficos
Autores principales: Thompson, London, Farkas, Csilla
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Oxford University Press 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6846017/
http://dx.doi.org/10.1093/geroni/igz038.3081
_version_ 1783468795091746816
author Thompson, London
Farkas, Csilla
author_facet Thompson, London
Farkas, Csilla
author_sort Thompson, London
collection PubMed
description In this research, we study the privacy and security capabilities provided by telehealth devices. Our aim is to evaluate how vulnerable these popular devices are in the presence of malicious cyber attackers. As older adults increasingly rely on telehealth devices, it is crucial that cybersecurity aspects of these devices are clearly communicated to them. Moreover, older adults frequently lack the technical expertise to evaluate the security and privacy capabilities of the devices. The lack of control over telehealth devices is a major concern for older adults. Older adults view certain limitations within these devices as decreasing their privacy and security. These limitations include the lack of control over accepting calls, taking screenshots, and assigning access privileges. For large scale adaptation of telehealth devices by older adults, it is crucial that these devices not only satisfy their intended purpose but also exhibit user friendly features and strong security and privacy capabilities. Modeling cyber threats against telehealth devices is not studied sufficiently . Malicious actors may compromise telehealth devices and create further threats to security and privacy of the users. In this research, we studied the cyber threats against telehealth devices. We built a threat model that ranks cyber threats based on their impact. We investigated how the operating system of popular devices supports access control. We found that none of the current technologies support location-based access control. We claim that this represents a major limitation and that supporting location-based access control is necessary to ensure users’ privacy in their own home.
format Online
Article
Text
id pubmed-6846017
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher Oxford University Press
record_format MEDLINE/PubMed
spelling pubmed-68460172019-11-18 PRIVACY AND SECURITY FOR TELEHEALTH DEVICES Thompson, London Farkas, Csilla Innov Aging Session Lb935 (Late Breaking Poster) In this research, we study the privacy and security capabilities provided by telehealth devices. Our aim is to evaluate how vulnerable these popular devices are in the presence of malicious cyber attackers. As older adults increasingly rely on telehealth devices, it is crucial that cybersecurity aspects of these devices are clearly communicated to them. Moreover, older adults frequently lack the technical expertise to evaluate the security and privacy capabilities of the devices. The lack of control over telehealth devices is a major concern for older adults. Older adults view certain limitations within these devices as decreasing their privacy and security. These limitations include the lack of control over accepting calls, taking screenshots, and assigning access privileges. For large scale adaptation of telehealth devices by older adults, it is crucial that these devices not only satisfy their intended purpose but also exhibit user friendly features and strong security and privacy capabilities. Modeling cyber threats against telehealth devices is not studied sufficiently . Malicious actors may compromise telehealth devices and create further threats to security and privacy of the users. In this research, we studied the cyber threats against telehealth devices. We built a threat model that ranks cyber threats based on their impact. We investigated how the operating system of popular devices supports access control. We found that none of the current technologies support location-based access control. We claim that this represents a major limitation and that supporting location-based access control is necessary to ensure users’ privacy in their own home. Oxford University Press 2019-11-08 /pmc/articles/PMC6846017/ http://dx.doi.org/10.1093/geroni/igz038.3081 Text en © The Author(s) 2019. Published by Oxford University Press on behalf of The Gerontological Society of America. http://creativecommons.org/licenses/by/4.0/ This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Session Lb935 (Late Breaking Poster)
Thompson, London
Farkas, Csilla
PRIVACY AND SECURITY FOR TELEHEALTH DEVICES
title PRIVACY AND SECURITY FOR TELEHEALTH DEVICES
title_full PRIVACY AND SECURITY FOR TELEHEALTH DEVICES
title_fullStr PRIVACY AND SECURITY FOR TELEHEALTH DEVICES
title_full_unstemmed PRIVACY AND SECURITY FOR TELEHEALTH DEVICES
title_short PRIVACY AND SECURITY FOR TELEHEALTH DEVICES
title_sort privacy and security for telehealth devices
topic Session Lb935 (Late Breaking Poster)
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6846017/
http://dx.doi.org/10.1093/geroni/igz038.3081
work_keys_str_mv AT thompsonlondon privacyandsecurityfortelehealthdevices
AT farkascsilla privacyandsecurityfortelehealthdevices