Protecting Medical Devices from Cyberharm | Stephanie Domas | TEDxColumbus

TEDx Talks
5 Dec 201610:15

Summary

TLDRIn this talk, ethical hacker Stephanie discusses the increasing connectivity of medical devices and the associated cybersecurity risks. She clarifies that while hacking medical devices isn't a common threat to the average person, the real danger lies in data breaches and accidental cyber harm. Stephanie emphasizes the importance of designing cybersecurity into medical devices from the ground up and shares how ethical hacking can help ensure the safety and reliability of these life-critical technologies.

Takeaways

  • 🔗 Medical devices are becoming increasingly connected, including to hospital networks, smartphones, and the internet.
  • ⚠️ One in four medical devices is now connected, and patients may encounter up to 10 connected devices during a hospital visit.
  • 🛡️ While the idea of hackers harming people through devices like pacemakers is scary, such attacks are generally not remote or scalable, meaning they're not common or easy to perform.
  • 💳 Hackers are targeting medical devices not to harm patients but to access valuable personal data, such as electronic health records, which are more valuable than credit card information on the black market.
  • 🏥 67% of data breaches in the U.S. last year were in healthcare, with medical records being used for identity theft, fraud, or illicit drug procurement.
  • 💻 Cyber harm is not always intentional; accidents can happen. For example, antivirus software interrupted a heart procedure by making a medical device unresponsive.
  • 📱 Simple actions, like a nurse charging her phone through a USB port on an anesthesia machine, can cause devices to malfunction unexpectedly, highlighting the importance of robust design.
  • 🤖 Ethical hackers help test and improve the security of medical devices by attempting to hack them in a controlled environment, ensuring they're safe from real-world attacks.
  • 🔒 Designing security features into medical devices from the start, such as rejecting unnecessary Bluetooth connections, can make them more resilient to current and future threats.
  • 🌍 Despite the risks, connected medical devices provide significant benefits, including remote patient monitoring, better care coordination, and the ability for patients to lead more independent lives.

Q & A

  • Why are medical devices becoming more vulnerable to cyberattacks?

    -Medical devices are becoming more vulnerable because they are increasingly connected to other devices, hospital networks, smartphones, and the internet. This connectivity opens new opportunities for cyberattacks.

  • What type of cyberattacks do hackers prefer when targeting medical devices?

    -Hackers prefer remote and scalable attacks. Remote attacks allow them to operate from a distance, and scalable attacks enable them to target multiple devices or people simultaneously, making them more efficient.

  • Why aren't hackers primarily interested in harming people directly through their medical devices?

    -While it’s possible to harm someone via a medical device, such attacks are not common because they are not easily remote or scalable. It typically requires close physical proximity and specialized equipment, which makes other methods of attack more attractive to hackers.

  • Why are electronic health records more valuable than credit card information on the black market?

    -Electronic health records are more valuable because they contain much more sensitive information than credit cards, including social security numbers, addresses, and insurance details. This data can be used for identity theft, taking out loans, or obtaining medical drugs, making it difficult for victims to fully protect themselves.

  • What is an example of accidental cyber harm in medical devices?

    -An example of accidental cyber harm occurred when an antivirus program on a medical device started running during a heart procedure, causing the device to become unresponsive. The software locked up data that the device needed to function, illustrating how unintended consequences can cause harm.

  • How do ethical hackers help improve the security of medical devices?

    -Ethical hackers test medical devices by attempting to hack into them in approved circumstances. They find vulnerabilities, suggest improvements, and ensure the devices are robust against potential attacks. This testing happens in controlled environments to avoid harm.

  • What steps can be taken during the design phase of medical devices to improve security?

    -During the design phase, developers can make conscious decisions that minimize risks. For example, in one case, designers chose not to allow incoming data over Bluetooth to prevent potential attacks. Designing security features from the start makes systems more resilient to both known and future threats.

  • What are the risks of connecting smartphones or other personal devices to medical equipment?

    -Connecting personal devices to medical equipment can disrupt its function. In one case, a nurse plugged her phone into a USB port on an anesthesia machine, causing the machine to shut down. Even though the shutdown was unintentional, it highlights how unexpected interactions can lead to dangerous situations.

  • Why did former Vice President Dick Cheney have the wireless feature of his pacemaker disabled?

    -Dick Cheney had the wireless connectivity of his pacemaker disabled because, for someone in his position, it was considered a realistic security threat. Although such attacks are unlikely for the average person, high-profile individuals may be at higher risk.

  • What benefits do connected medical devices offer despite the security risks?

    -Connected medical devices provide numerous benefits, such as enabling remote surgeries, offering real-time patient monitoring, and improving the quality of care. For instance, devices like pacemakers or insulin pumps allow patients to live more independently while ensuring their caregivers can monitor and respond to health issues promptly.

Outlines

00:00

🔗 The Connectivity of Medical Devices

The paragraph discusses the increasing connectivity of medical devices, which are now more frequently linked to each other, hospital networks, patient smartphones, and the internet. It highlights that one in four medical devices is estimated to be connected, and during a hospital visit, a patient might encounter up to 10 such devices. This connectivity makes them a target for hackers, although the speaker clarifies that while hacking medical devices is a concern, it's not the most common way hackers might harm individuals. Instead, they often target medical devices for the valuable personal information they contain, which can be used for identity theft and fraud. The speaker also introduces the concept of 'accidental cyber harm,' where software or systems unintentionally cause harm, such as an antivirus causing a medical device to malfunction during a procedure.

05:02

🛠️ Ethical Hacking for Medical Device Security

In this paragraph, the speaker introduces herself as an ethical hacker working to enhance the security of medical devices. She explains that ethical hackers are individuals who study and practice hacking to test and improve system defenses, but only in authorized situations. The speaker's role is to collaborate with medical device manufacturers to ensure that devices are designed with security in mind from the outset. She gives an example of a Bluetooth-enabled inhaler system that was designed to resist attacks by not accepting incoming data over Bluetooth. The speaker also discusses the importance of testing existing devices through ethical hacking to identify vulnerabilities and improve security. She emphasizes that while connected medical devices carry risks, they also offer significant benefits, such as improved patient care and real-time monitoring, and that ethical hackers are dedicated to ensuring these devices are trustworthy.

10:02

👏 Conclusion and Acknowledgment

This is a concluding part of the script where the speaker receives applause from the audience. It signifies the end of her presentation on the importance of cybersecurity in medical devices and the role of ethical hackers in ensuring their safety and reliability.

Mindmap

Keywords

💡Connected Medical Devices

Connected medical devices refer to any medical equipment that can exchange data with other devices, networks, or systems. In the video, it is highlighted that these devices are becoming increasingly common, with one out of every four medical devices now being connected. This connectivity allows for improved patient care and monitoring but also introduces new vulnerabilities to cyber threats.

💡Hackers

Hackers in this context are individuals who attempt to gain unauthorized access to computer systems or networks. The video discusses how hackers are starting to target connected medical devices, although the immediate threat to the average person is low. The example of a pacemaker is used to illustrate that while it's technically possible for hackers to interfere with such devices, it's not a scalable or remote attack vector.

💡Cyber Security Breach

A cyber security breach occurs when unauthorized individuals gain access to sensitive information. The video mentions that healthcare is a major target for such breaches, with 67% of identity records breached in the United States being from healthcare. This highlights the importance of securing medical devices against data theft.

💡Electronic Health Record (EHR)

An electronic health record is a digital version of a patient's paper chart. The video explains that EHRs can be worth significantly more on the black market than credit card numbers due to the wealth of personal information they contain. This makes medical devices that store EHRs a valuable target for hackers.

💡Remote and Scalable Attacks

Remote and scalable attacks are those that can be carried out from a distance and affect a large number of targets simultaneously. The video clarifies that while hacking a pacemaker is technically possible, it's not a remote or scalable attack because it would require physical proximity and cannot be done to multiple people at once.

💡Ethical Hacker

An ethical hacker is a cybersecurity expert who identifies and fixes vulnerabilities in a system with the owner's permission. In the video, the speaker, Stephanie, identifies herself as an ethical hacker whose job is to work with medical device manufacturers to design secure devices and to test existing devices for vulnerabilities.

💡Cyber Harm

Cyber harm refers to any negative impact caused by a cyber attack or breach. The video distinguishes between intentional harm caused by hackers and accidental harm, such as when antivirus software inadvertently interferes with a medical device during a procedure.

💡Robust System

A robust system is one that can withstand unexpected events or attacks. The video uses the example of an anesthesia machine shutting down when a phone was plugged into it to illustrate the importance of designing medical devices to be robust against the unknown or unexpected.

💡Bluetooth Connection

Bluetooth is a wireless technology that allows devices to communicate with each other. The video discusses a scenario where a Bluetooth connection in an inhaler system could be a threat, as it could potentially be exploited by hackers to manipulate or steal data. This example is used to highlight the need for secure design in connected medical devices.

💡Cyber Security Testing

Cyber security testing involves ethical hackers attempting to breach a system to identify vulnerabilities. The video mentions that such testing could have prevented incidents like the anesthesia machine shutting down when a phone was plugged in, as the device could have been designed to handle such connections safely.

💡Benefit vs Risks

The video concludes by weighing the benefits of connected medical devices against the risks. It argues that the ability to provide better patient care, such as remote monitoring and assistance, outweighs the potential risks, provided that ethical hackers and manufacturers continue to work on securing these devices.

Highlights

Medical devices are increasingly connected to hospital networks, smartphones, and the internet.

It is estimated that one in four medical devices is now connected, with the average hospital visit involving 10 connected devices.

Hackers are beginning to target medical devices due to their connectivity, although direct physical attacks are not common.

Remote and scalable attacks are more appealing to hackers than targeting individual devices like pacemakers.

Former Vice President Dick Cheney had the wireless connectivity of his pacemaker disabled due to concerns over remote hacking.

Healthcare data is a prime target for hackers because electronic health records are significantly more valuable on the black market than credit card information.

67% of identity records breached in the United States last year were from healthcare, highlighting the vulnerability of medical data.

Cybersecurity breaches in healthcare can lead to identity theft, bank loans taken out in someone’s name, or fraudulent use of medical insurance.

Accidental cyber harm can occur, as demonstrated by an antivirus program causing a medical device to become unresponsive during a heart procedure.

Medical devices can malfunction due to unexpected actions, such as when a nurse plugged her phone into an anesthesia machine's USB port, causing the machine to shut down.

Ethical hackers, like the speaker, work to test the security of medical devices to identify and fix vulnerabilities before they can be exploited.

Cybersecurity should be built into medical devices from the design stage, making systems resilient to unknown and unexpected threats.

An inhaler system’s Bluetooth connectivity was limited to sending data out, not receiving it, to mitigate potential cyber threats.

Medical devices that already exist can be tested by ethical hackers to discover vulnerabilities and suggest improvements.

Connected medical devices offer significant benefits, such as enabling specialists to assist remotely in surgeries and monitoring patients in real time during recovery.

A connected pacemaker or insulin pump can provide critical independence for patients by monitoring health and allowing remote intervention.

Despite the risks, the speaker believes the benefits of connected medical devices far outweigh the potential threats.

Transcripts

play00:06

[Music]

play00:14

hi medical devices are becoming more and

play00:17

more

play00:18

connected they're more connected to each

play00:20

other they're more connected to the

play00:22

hospital's networks they're more

play00:25

connected to patients smartphones and

play00:27

they're more connected to the internet

play00:29

it's it's estimated that one out of

play00:31

every four medical devices is now

play00:34

connected if you were to go to the

play00:36

hospital today it's estimated that you

play00:38

would encounter 10 medical devices

play00:40

during your

play00:42

visit it's because of this increased

play00:44

connectedness of medical devices that

play00:46

hackers are starting to Target medical

play00:49

devices now when I say hackers are

play00:51

targeting medical devices everyone

play00:53

always immediately jumps to the

play00:55

assumption that hackers are trying to

play00:56

hurt you through your medical

play00:58

devices so while won't say it's not

play01:00

possible it actually is what I will say

play01:03

is in general there are easier ways to

play01:05

hurt people than through their medical

play01:07

device so take for example a pacemaker

play01:10

this is something that people often

play01:12

think of when they're thinking of a

play01:13

medical device harming

play01:15

someone if I wanted to change the

play01:17

configuration or the codes on your

play01:20

pacemaker I would have to stand right

play01:22

next to you I would have to hold

play01:25

specialized electronic equipment up to

play01:27

your chest for several minutes

play01:30

that's really not the type of thing you

play01:31

can do to someone without them noticing

play01:34

and it's it's not what we call a a

play01:36

remote or scalable attack so it's not

play01:39

remote in the sense that an attacker

play01:41

can't do it from the comfort of their

play01:42

couch and it's not scalable because they

play01:45

can't use it to simultaneously hurt

play01:47

numerous people so attackers generally

play01:49

want remote and scalable attacks so for

play01:53

your average person this isn't a threat

play01:55

you need to worry about but that being

play01:57

said former Vice President Dick ch

play02:00

did have the wireless connectivity to

play02:02

his pacemaker disabled because for him

play02:05

it was potentially a realistic

play02:07

threat so if attackers aren't trying to

play02:09

hurt you through your medical device why

play02:11

are they attacking medical

play02:13

devices well it seems like every week we

play02:16

hear about some new cyber security

play02:17

breach that affects individuals we all

play02:20

heard about Target the DMV and I'm sure

play02:22

there's a number of you in this room

play02:23

that those

play02:24

affected but what you may not know is

play02:27

that last year 67% of the identity

play02:30

records breached in the United States

play02:32

happened in

play02:34

healthcare today on the black market

play02:37

your credit card number is worth only

play02:38

about

play02:39

$2 where your electronic health record

play02:42

is worth anywhere from 10 to 20 so why

play02:45

the big difference well if you were to

play02:48

notice a fraudulent charge on your

play02:50

credit card today you could have the

play02:52

charge reversed the card closed and a

play02:55

new card in your hand in a matter of

play02:56

days it's really not that big of an

play02:59

inconvenience

play03:00

but your electronic health record that

play03:03

has not only your credit card number but

play03:06

your address your social security number

play03:09

your employer and your insurance

play03:11

information so with that kind of

play03:13

information I could use the credit card

play03:15

number but I could also open new credit

play03:18

cards in your name I could potentially

play03:20

take out a bank loan I could get high-

play03:22

price narcotics on your medical

play03:24

insurance so how do you protect against

play03:27

that how do you change your name your

play03:29

address your

play03:30

employer well you can't and that's what

play03:33

makes that information so much more

play03:36

valuable so we've talked about hackers

play03:38

going after medical devices but there's

play03:40

actually another category of cyber harm

play03:42

that we see more commonly and it's

play03:44

accidental cyber harm a lot of cyber

play03:48

security is just making a system robust

play03:50

to the unknown or the unexpected malice

play03:53

is not always a prerequisite for harm so

play03:56

take for example something that happened

play03:58

earlier this year there was a medical

play04:00

device that's used in a heart procedure

play04:03

that became unresponsive and unusable

play04:05

mid heart

play04:07

procedure now later after investigation

play04:10

it was found that what happened was the

play04:12

antivirus software running on this

play04:14

system started to run mid heart

play04:17

procedure and in doing so it locked up

play04:19

access to data that the medical device

play04:21

needed in order to operate so the device

play04:24

became

play04:25

unresponsive but think about that

play04:28

antivirus softwares sole purpose for

play04:30

existence is to stop malicious things

play04:33

from happening on a system so while that

play04:36

that antivirus was trying to stop

play04:38

something malicious from happening it

play04:40

accidentally did something malicious No

play04:42

Malice intended now in this particular

play04:45

case the doctors were able to get the

play04:47

device back up and running while the

play04:49

patient was still sedated and finish the

play04:51

surgery but it's so easy to imagine how

play04:54

this could have gone so much

play04:56

worse or another example that happened

play04:58

last year a nurse plugged her cell phone

play05:01

into one of the USB ports on the front

play05:03

of an anesthesia machine trying to

play05:05

charge her phone when she did that the

play05:08

anesthesia machine shut

play05:10

down now I know you're thinking why

play05:13

would you plug your cell phone into an

play05:14

anesthesia machine we probably shouldn't

play05:16

do that and while I agree with you we've

play05:20

all been in those situations where our

play05:22

cell phone is about to die we either

play05:24

need to make a call or we're expecting

play05:26

one and you're looking around

play05:27

desperately trying to find somewhere to

play05:29

plug into

play05:31

charge now that that nurse there was

play05:34

there was no malice there she was simply

play05:36

looking for somewhere to plug in her

play05:37

phone and in that case the anesthesia

play05:40

machine was not in use so nobody was

play05:42

harmed but again malice is not a

play05:45

prerequisite for harm that system was

play05:47

not robust to the unknown or the

play05:50

unexpected so who am I and why am I here

play05:52

talking you about this well my name's

play05:55

Stephanie I'm an ethical hacker and I'm

play05:58

here to help so what is an ethical

play06:01

hacker well ethical hackers are people

play06:04

who study hacking we practice hacking

play06:07

and then yes we hack stuff um but only

play06:10

to test the defenses of that system and

play06:12

only in approved

play06:14

circumstances but what am I specifically

play06:16

doing well my job is to work with

play06:18

medical product manufacturers to help

play06:20

them designed medical devices worthy of

play06:23

our trust the best way to make a system

play06:26

secure is to design it in from the

play06:28

beginning

play06:30

cyber security is not simply a feature

play06:32

we can add to a system It's actually an

play06:34

emergent property of a well-designed

play06:36

system a lot of cyber security recall is

play06:39

making things robust to the unknown or

play06:41

the

play06:42

unexpected so take for example an

play06:44

inhaler system I've been working on this

play06:47

inhaler system has a Bluetooth

play06:49

connection to the patient's smartphone

play06:51

so the patient can monitor how many

play06:53

doses they have remaining in their

play06:55

inhaler now that Bluetooth connection is

play06:58

a threat to that device an attacker

play07:00

could try to manipulate or steal

play07:02

information from you through that

play07:04

Bluetooth

play07:05

connection so at design time we said

play07:08

well we do have a need to send data out

play07:12

over Bluetooth but we don't really have

play07:14

a need to take any data back so we made

play07:17

the conscious decision at design time to

play07:19

simply not accept any incoming data over

play07:22

Bluetooth by doing that we made

play07:25

ourselves resilient to any known

play07:26

Bluetooth attacks and any future ones

play07:29

robust to the unknown or the

play07:31

unexpected but what if your past design

play07:34

time so you have a physical device it's

play07:36

either prototype device or a medical

play07:38

device that's already out in the field

play07:40

well then that's when we try to hack it

play07:43

we're going to try to hack into it see

play07:46

how can we get into it once we're into

play07:48

it what can we change what can I access

play07:51

what can I manipulate having an ethical

play07:53

hacker attack your device is a great way

play07:55

to test its defenses they're going to

play07:57

tell you what type of attacks they tried

play08:00

what worked they'll offer you advice on

play08:02

how to make it better and they'll do it

play08:04

all under safe circumstances when it's

play08:06

not hooked up to a patient and it's not

play08:07

hooked up to the hospital Network so

play08:11

take take for example that anesthesia

play08:13

machine I talked about earlier that

play08:14

couldn't handle a cell phone connection

play08:17

that's the type of thing that could have

play08:18

come up in cyber security testing and

play08:20

then we would have made conscious

play08:22

decisions of what to do so maybe we

play08:24

would have decided there's really no

play08:26

need for us to accept cell phone

play08:28

connections and if we saw one we'd

play08:30

simply reject the connection or maybe we

play08:32

would have decided to gracefully handle

play08:34

it but we would have handled it in a

play08:36

manner that was

play08:38

safe now I don't want to leave you with

play08:40

the impression that connected medical

play08:42

devices are all doom and gloom the truth

play08:45

is connected medical devices allow us to

play08:47

provide a better quality of patient care

play08:50

if I were to suddenly have a need for

play08:52

Unique surgery a Surgical Specialist

play08:54

halfway across the world could either

play08:56

assist in the procedure or perform it

play08:59

when I'm in the hospital recovering the

play09:01

connected medical devices that are

play09:03

monitoring me are able to allow my

play09:05

caregivers to see a realtime picture of

play09:07

how I'm doing so if something starts to

play09:09

go wrong in my recovery they know right

play09:12

away when I'm out of the hospital my

play09:14

electronic health record can help look

play09:16

for potential drug interactions for

play09:18

prescriptions I may fill at different

play09:21

pharmacies connected medical devices

play09:23

like pacemakers allow someone who may

play09:25

have lived a very dependent life to now

play09:28

live an independent one that connected

play09:30

pacemaker can now potentially call for

play09:32

help if that patient becomes

play09:35

unresponsive think of a diabetic child

play09:38

who's able to go to her very first

play09:40

sleepover because she now has a

play09:42

connected insulin pump that allows her

play09:45

parents to remotely monitor her glucose

play09:47

levels and deliver insulin if she needs

play09:49

it I feel confident in saying that the

play09:51

benefit of connected medical devices

play09:53

outweighs the risks and myself and other

play09:56

ethical hackers are working really hard

play09:58

to make sure that the connected medical

play10:00

devices out there are worthy of our

play10:02

trust thank you

play10:14

[Applause]

Rate This

5.0 / 5 (0 votes)

Etiquetas Relacionadas
Medical DevicesCybersecurityEthical HackingPatient CareData BreachHealthcareInternet of ThingsPacemaker RiskSmart DevicesCyber Threats
¿Necesitas un resumen en inglés?