ISO/IEEE-11073-40101 › Health informatics - Device interoperability - Part 40101: Foundational - Cybersecurity - Processes for vulnerability assessment
The following bibliographic material is provided to assist you with your purchasing decision:
Within the context of secure plug-and-play interoperability, cybersecurity is the process and capability of preventing unauthorized access or modification, misuse, denial of use, or the unauthorized use of information that is stored on, accessed from, or transferred to and from a PHD/PoCD. The process part of cybersecurity is risk analysis of use cases specific to a PHD/PoCD.
For PHDs/PoCDs, this standard defines an iterative, systematic, scalable, and auditable approach to identification of cybersecurity vulnerabilities and estimation of risk. This iterative vulnerability assessment uses the Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege (STRIDE) classification scheme and the embedded Common Vulnerability Scoring System (eCVSS). The assessment includes system context, system decomposition, pre-mitigation scoring, mitigation, and post-mitigation scoring and iterates until the remaining vulnerabilities are reduced to an acceptable level of risk.
To find similar documents by classification:
35.240.80 (IT applications in health care technology Including computer tomography)
This document comes with our free Notification Service, good for the life of the document.
This document is available in either Paper or PDF format.
Document Number
ISO/IEEE 11073-40101:2022
Revision Level
1ST EDITION
Status
Current
Publication Date
March 1, 2022
Committee Number
ISO/TC 215