UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close
Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

IEEE 11073-40101

Health informatics—Device interoperability Part 40101: Foundational—Cybersecurity— Processes for vulnerability assessment

active, Most Current
Buy Now
Organization: IEEE
Publication Date: 24 September 2020
Status: active
Page Count: 50
scope:

Within the context of secure plug-and-play interoperability, cybersecurity is the process and capability of preventing unauthorized access or modification, misuse, denial of use, or the unauthorized use of information that is stored on, accessed from, or transferred to and from a PHD/PoCD. The process part of cybersecurity is risk analysis of use cases specific to a PHD/PoCD.

For PHDs/PoCDs, this standard defines an iterative, systematic, scalable, and auditable approach to identification of cybersecurity vulnerabilities and estimation of risk. This iterative vulnerability assessment uses the Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege (STRIDE) classification scheme and the embedded Common Vulnerability Scoring System (eCVSS). The assessment includes system context, system decomposition, pre-mitigation scoring, mitigation, and post-mitigation scoring and iterates until the remaining vulnerabilities are reduced to an acceptable level of risk.

Purpose

The purpose of this document is to define a common approach to cybersecurity assessment in PHDs/PoCDs and define an iterative, systematic, scalable, and auditable vulnerability assessment appropriate for use in the design of PHDs/PoCDs.

Document History

IEEE 11073-40101
September 24, 2020
Health informatics—Device interoperability Part 40101: Foundational—Cybersecurity— Processes for vulnerability assessment
Within the context of secure plug-and-play interoperability, cybersecurity is the process and capability of preventing unauthorized access or modification, misuse, denial of use, or the unauthorized...

References

Advertisement