LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

System Configuration Contributions to Vulnerability: Applications to Connected Personal Devices

Photo by averey from unsplash

There is a strong impetus to commercialize emerging technology, tempered by safety expectations and regulatory compliance requirements [1]. Such is the case for medical implant devices, where successful operation of… Click to show full abstract

There is a strong impetus to commercialize emerging technology, tempered by safety expectations and regulatory compliance requirements [1]. Such is the case for medical implant devices, where successful operation of devices can be life-saving, but while consequences of failure are severe. Recent advances in this technology aimed at enabling remote access to a device facilitate remote and more accurate monitoring of patient health. In doing so, original equipment manufacturers (OEMs) both satisfy market pressures and potentially introduce new avenues of risk that increase end-user vulnerability [2]. Vulnerability contributed by technological systems is known to researchers [3]-[5] as an important consideration in individual vulnerability. This study aims to quantify the contribution of technological configuration to end-user vulnerability, specifically the additional risk of Internet-enabled medical implant devices.

Keywords: configuration; vulnerability; system configuration; configuration contributions; contributions vulnerability; vulnerability applications

Journal Title: IEEE Technology and Society Magazine
Year Published: 2017

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.