Abstract | The digital revolution that resulted in the development of the Internet and connected devices such as smartphones is beginning to permeate the health care environment, with the promise of empowered patients, better diagnoses and lower costs [1]. This revolution is expected to result in an increase in the number of connected medical devices. Some of these new medical devices may appear unconventional, without any obvious patient interaction; some may consist solely of software running on General Purpose Computers (GPCs) or on mobile devices. Therapies using smartphone apps have even supplanted pharmaceuticals in some cases [2]. Unfortunately, with this promise comes the possibility of cyberattacks and intrusions against a compromised connected medical device, and the network to which such a device is connected. |
---|