Special Topics in Security and Privacy of Medical Information. Reminders. Last lecture: Recap. Sujata Garera. Project part 1 submission

Size: px
Start display at page:

Download "Special Topics in Security and Privacy of Medical Information. Reminders. Last lecture: Recap. Sujata Garera. Project part 1 submission"

Transcription

1 Special Topics in Security and Privacy of Medical Information Sujata Garera Reminders Project part 1 submission Assignment 2 is online Last lecture: Recap Medical Telemetry Infrastructure Devices capturing vital signs Communication to a controller device (wirelessly) Controller device communicates over the internet to a doctors office for example What are some of the goals that should be kept in mind when setting such a system up? 1

2 Last lecture Recap: Work by Halperin et al. Security and privacy properties of an implantable cardioverter defibrillator (ICD) Includes pacemaker technology Communicates wirelessly with external programmer device in 175Khz frequency range What was the adversarial model they considered? Last lecture Recap: Results of study Recap: Reverse engineering transmissions Commercial Programmer Reverse Engineer 2

3 Recap:Reverse engineering transmissions Reverse engineering the physical layer Encoding convert data bits into radio symbols Modulation process of varying one waveform in relation to other waveform Recap: Reverse engineering transmissions Reverse engineering transmissions Observed that ICD and programmer used different modulation schemes but same encoding scheme Programmer used 2-FSK ICD used DBPSK ICD and Programmer used NRZI Recap: Reverse engineering transmissions Reverse engineering the physical layer Non-Return to Zero Inverted with bit stuffing Zero bits are represented with no change in symbol over one symbol period One bits are represented by a change of symbol state 3

4 Recap: Eavesdropping Transaction timeline of conversation between ICD programmer and ICD Through Eavesdropping were able to obtain PII and telemetry Information How were they able to identify if the data being sent is actually telemetry information? Active attacks with Software Programmer Replay attacks Transmit only attacks over 175 KHz band Start with ICD in known state Replay the transmissions in a loop One second to 37.7 seconds Observe ICD state after transmissions Active attacks Replay attacks Triggering ICD identification Replay 1.5 second auto identification trace recorded from programmer Disclosed several details about ICD such as model and serial number Disclosing patient data After identification programmer asks ICD for rest of information stored on it including patient data GNU Radio used to replay 26 second capture containing autoidentification and interrogation command ICD disclosed same information as with programmer 4

5 Active attacks Replay attacks Disclosing cardiac data Magnetic field can induce telemetry transmissions Replaying the initial part of the interrogatory command can also induce such transmissions from the ICD Changing patient name Used GNU radio to replay the trace for changing a patient name Active attacks Replay attacks Setting the ICD s clock Attack succeeded after 10 replays Changing therapies Therapies are ICD responses to cardiac events GNU Radio used to turn of therapies Without therapies ICD does not respond to potentially dangerous cardiac conditions Active attacks Replay attacks Inducing fibrillation ICD has a test mode in which it can induce ventricular fibrillation Introduced a 100 ohm resistor between the ICDs defibrillation ports to measure the voltage during a command shock 1 Joule shock sent using programmer Peak voltage observed is V Replayed command with software radio 30 replay attempts succeeded in causing similar voltage spikes 5

6 Zero power defenses What factors must one consider when incorporating security features in an ICD? Zero power defenses Effective approach should either prevent or deter attacks by malicious outsiders with custom equipment as well as insiders with commercial programmers Security and privacy should draw no power from the battery life Prevent DOS on power Security sensitive events should be effortlessly detectable by the patient Security mechanisms should not introduce failure modes Detection Zero power notification for patients Alerts patients to potentially malicious activities both by insiders using commercial programmers and by outsiders using custom attack hardware Wirelessly drives a piezo element that can audibly warn a patient of security sensitive events 6

7 Detection Zero power notification for patients How can you evaluate the effectiveness of their prototype? Detection Zero power notification for patients Placed prototype in an environment designed to simulate a human Prevention Zero power authentication 7

8 Prevention Zero power authentication Key management Large scale deployment of shared key material may pose risk of compromise by unauthorized party Revocation of privileges Zero power sensible key exchange Future directions Medical device design Investigate prevention detection and audit mechanisms Develop methods that balance security and privacy with safety and effectiveness Develop a set of design principles for secure design of IMDs and other medical devices 8

9 This lecture Based on Pacemakers and Implantable Cardiac Defibrillators: Software Radio attacks and Zero Power Defenses by Halperin et al. available on website. Security and Privacy for Implantable Medical Devices 9

Special Topics in Security and Privacy of Medical Information. Reminders. Medical device security. Sujata Garera

Special Topics in Security and Privacy of Medical Information. Reminders. Medical device security. Sujata Garera Special Topics in Security and Privacy of Medical Information Sujata Garera Reminders Assignment due today Project part 1 due on next Tuesday Assignment 2 will be online today evening 2nd Discussion session

More information

Security and Privacy of Wireless Implantable Medical Devices

Security and Privacy of Wireless Implantable Medical Devices Security and Privacy of Wireless Implantable Medical Devices Security Forum 2013 Hagenberg, 17.04.2013 Dipl.-Ing. Dr. Gregor Koenig Outlook Overview Device Hacking Safety & Utility Goals Security & Privacy

More information

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses 2008 IEEE Symposium on Security and Privacy Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Daniel Halperin University of Washington Thomas S. Heydt-Benjamin

More information

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses Daniel Halperin University of Washington Thomas S. Heydt-Benjamin University of Massachusetts Amherst Benjamin

More information

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses

Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses University of Massachusetts - Amherst ScholarWorks@UMass Amherst Computer Science Department Faculty Publication Series Computer Science 2008 Pacemakers and Implantable Cardiac Defibrillators: Software

More information

Kevin Fu Associate Professor Security & Privacy Research Lab UMass Amherst Computer Science http://spqr.cs.umass.edu/

Kevin Fu Associate Professor Security & Privacy Research Lab UMass Amherst Computer Science http://spqr.cs.umass.edu/ Security and Privacy for Implantable Medical Devices Kevin Fu Associate Professor Security & Privacy Research Lab UMass Amherst Computer Science http://spqr.cs.umass.edu/ SRC/NSF/SFI Forum on Integrated

More information

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 anudeepnike@gmail.com,

More information

Digital Investigation of Security Attacks on Cardiac Implantable Medical Devices

Digital Investigation of Security Attacks on Cardiac Implantable Medical Devices Digital Investigation of Security Attacks on Cardiac Implantable Medical Devices Nourhene Ellouze Communication Networks and Security Research Lab. University of Carthage, Tunisia. nourhene_ellouze@yahoo.fr

More information

Security and Privacy Issues in Implantable Medical Devices: A Comprehensive Survey

Security and Privacy Issues in Implantable Medical Devices: A Comprehensive Survey Security and Privacy Issues in Implantable Medical Devices: A Comprehensive Survey Carmen Camara a,b, Pedro Peris-Lopez a,, Juan E. Tapiador a a Department of Computer Science, Universidad Carlos III de

More information

Lecture 3: Signaling and Clock Recovery. CSE 123: Computer Networks Stefan Savage

Lecture 3: Signaling and Clock Recovery. CSE 123: Computer Networks Stefan Savage Lecture 3: Signaling and Clock Recovery CSE 123: Computer Networks Stefan Savage Last time Protocols and layering Application Presentation Session Transport Network Datalink Physical Application Transport

More information

Introduction. Planned surgical procedures

Introduction. Planned surgical procedures Guidelines for the perioperative management of patients with implantable pacemakers or implantable cardioverter defibrillators, where the use of surgical diathermy/electrocautery is anticipated. Introduction

More information

Annual review FLORENCE 2013. WP4 Network: prototypes

Annual review FLORENCE 2013. WP4 Network: prototypes Annual review FLORENCE 2013 WP4 Network: prototypes WP4 prototypes Task 4.1 Smart SPD driven transmission P1: SPD-driven Smart Transmission Layer Task 4.2 Distributed self-x models P2: Recognizing and

More information

What Are Arrhythmias?

What Are Arrhythmias? What Are Arrhythmias? Many people have questions about what the word arrhythmia means, and arrhythmias can be a difficult subject to understand. The text below should give you a better understanding of

More information

Proximity-based Access Control for Implantable Medical Devices

Proximity-based Access Control for Implantable Medical Devices Proximity-based Access Control for Implantable Medical Devices Kasper B. Rasmussen Dept. of Comp. Science ETH Zurich 8092 Zurich, Switzerland kasperr@inf.ethz.ch Claude Castelluccia INRIA 655, avenue de

More information

Study Guide for the Electronics Technician Pre-Employment Examination

Study Guide for the Electronics Technician Pre-Employment Examination Bay Area Rapid Transit District Study Guide for the Electronics Technician Pre-Employment Examination INTRODUCTION The Bay Area Rapid Transit (BART) District makes extensive use of electronics technology

More information

2.0 System Description

2.0 System Description 2.0 System Description The wireless alarm system consists of two or more alarm units within a specified range of one another. Each alarm unit employs a radio transceiver, allowing it to communicate with

More information

Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study

Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study Presenter: Wenyuan Xu Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis Taylor, Sangho Oh Wenyuan

More information

How To Hack An Rdi Credit Card

How To Hack An Rdi Credit Card RFID Payment Card Vulnerabilities Technical Report Thomas S. Heydt-Benjamin 1, Daniel V. Bailey 2, Kevin Fu 1, Ari Juels 2, and Tom O'Hare 3 Abstract 1: University of Massachusetts at Amherst {tshb, kevinfu}@cs.umass.edu

More information

Energy Efficient Security in Implantable Medical Devices

Energy Efficient Security in Implantable Medical Devices Proceedings of the Federated Conference on Computer Science and Information Systems pp. 773 778 ISBN 978-83-60810-51-4 Energy Efficient Security in Implantable Medical Devices Krzysztof Daniluk Warsaw

More information

International Journal of Engineering Research & Management Technology

International Journal of Engineering Research & Management Technology International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Radio Frequency Identification Security System Mr. Shailendra Kumar Assistant Professor Department of

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Third Edition by William Stallings Lecture slides by Shinu Mathew John http://shinu.info/ Chapter 1 Introduction http://shinu.info/ 2 Background Information Security requirements

More information

SUMMARY OF: P910077/S140 BOSTON SCIENTIFIC LATITUDE COMMUNICATOR MODELS 6460, 6280, 6290, 6250, 6498, AND 6476. Executive Summary

SUMMARY OF: P910077/S140 BOSTON SCIENTIFIC LATITUDE COMMUNICATOR MODELS 6460, 6280, 6290, 6250, 6498, AND 6476. Executive Summary SUMMARY OF: P910077/S140 BOSTON SCIENTIFIC LATITUDE COMMUNICATOR MODELS 6460, 6280, 6290, 6250, 6498, AND 6476 Executive Summary Boston Scientific is requesting approval for modifications to the LATITUDE

More information

Procedure Title: TennDent HIPAA Security Awareness and Training

Procedure Title: TennDent HIPAA Security Awareness and Training Procedure Title: TennDent HIPAA Security Awareness and Training Number: TD-QMP-P-7011 Subject: Security Awareness and Training Primary Department: TennDent Effective Date of Procedure: 9/23/2011 Secondary

More information

PFP Technology White Paper

PFP Technology White Paper PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions

More information

Radio Frequency Identification (RFID)

Radio Frequency Identification (RFID) Radio Frequency Identification (RFID) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/

More information

Flexible Active Shutter Control Interface using the MC1323x

Flexible Active Shutter Control Interface using the MC1323x Freescale Semiconductor Document Number: AN4353 Application Note Rev. 0, 9/2011 Flexible Active Shutter Control Interface using the MC1323x by: Dennis Lui Freescale Hong Kong 1 Introduction This application

More information

Objectives. Lecture 4. How do computers communicate? How do computers communicate? Local asynchronous communication. How do computers communicate?

Objectives. Lecture 4. How do computers communicate? How do computers communicate? Local asynchronous communication. How do computers communicate? Lecture 4 Continuation of transmission basics Chapter 3, pages 75-96 Dave Novak School of Business University of Vermont Objectives Line coding Modulation AM, FM, Phase Shift Multiplexing FDM, TDM, WDM

More information

Closing Wireless Loopholes for PCI Compliance and Security

Closing Wireless Loopholes for PCI Compliance and Security Closing Wireless Loopholes for PCI Compliance and Security Personal information is under attack by hackers, and credit card information is among the most valuable. While enterprises have had years to develop

More information

New Devices Mean New Risks: The Potential for Liability When Software is a Component of Medical Devices. September 25, 2013

New Devices Mean New Risks: The Potential for Liability When Software is a Component of Medical Devices. September 25, 2013 New Devices Mean New Risks: The Potential for Liability When Software is a Component of Medical Devices September 25, 2013 The Hartford Insuring Innovation Joe Coray Dan Silverman Providing insurance solutions

More information

GAO MEDICAL DEVICES. FDA Should Expand Its Consideration of Information Security for Certain Types of Devices. Report to Congressional Requesters

GAO MEDICAL DEVICES. FDA Should Expand Its Consideration of Information Security for Certain Types of Devices. Report to Congressional Requesters GAO United States Government Accountability Office Report to Congressional Requesters August 2012 MEDICAL DEVICES FDA Should Expand Its Consideration of Information Security for Certain Types of Devices

More information

AN1200.04. Application Note: FCC Regulations for ISM Band Devices: 902-928 MHz. FCC Regulations for ISM Band Devices: 902-928 MHz

AN1200.04. Application Note: FCC Regulations for ISM Band Devices: 902-928 MHz. FCC Regulations for ISM Band Devices: 902-928 MHz AN1200.04 Application Note: FCC Regulations for ISM Band Devices: Copyright Semtech 2006 1 of 15 www.semtech.com 1 Table of Contents 1 Table of Contents...2 1.1 Index of Figures...2 1.2 Index of Tables...2

More information

Body Area Network Security: Robust Secret Sharing

Body Area Network Security: Robust Secret Sharing Body Area Network Security: Robust Secret Sharing Sang-Yoon Chang, Yih-Chun Hu, Hans Anderson, Ting Fu, Evelyn Huang University of Illinois Body Area Network Background Body area network (BAN) consists

More information

Wireless Link. Introduction. Setup, Configuration and Connection ENGLISH

Wireless Link. Introduction. Setup, Configuration and Connection ENGLISH ENGLISH Introduction This document is an addendum to the HeartStart MRx Instructions for Use. It explains how to use the features of the HeartStart MRx s Wireless Link Option. The Wireless Link Option

More information

Palaparthi.Jagadeesh Chand. Associate Professor in ECE Department, Nimra Institute of Science & Technology, Vijayawada, A.P.

Palaparthi.Jagadeesh Chand. Associate Professor in ECE Department, Nimra Institute of Science & Technology, Vijayawada, A.P. Patient Monitoring Using Embedded Palaparthi.Jagadeesh Chand Associate Professor in ECE Department, Nimra Institute of Science & Technology, Vijayawada, A.P Abstract The aim of this project is to inform

More information

Remote Follow-up and Remote Monitoring

Remote Follow-up and Remote Monitoring Remote Monitoring The Heart Rhythm Charity Promoting better understanding, diagnosis, treatment and quality of life for individuals with cardiac arrhythmias Remote Follow-up and Remote Monitoring www.aa-za.org

More information

Dr. Sven Bode 24. Treffpunkt Medizintechnik 1. Juli 2010. Telemetrische Herzüberwachung Eine Dekade BIOTRONIK Home Monitoring

Dr. Sven Bode 24. Treffpunkt Medizintechnik 1. Juli 2010. Telemetrische Herzüberwachung Eine Dekade BIOTRONIK Home Monitoring Dr. Sven Bode 24. Treffpunkt Medizintechnik 1. Juli 2010 Telemetrische Herzüberwachung Eine Dekade BIOTRONIK Home Monitoring RF GPRS GPRS https 0 Agenda Introduction to active implants and Home Monitoring

More information

Introduction to Information Technology

Introduction to Information Technology Introduction to Information Technology Career Cluster Information Technology Course Code 10009 Prerequisite(s) Recommended that a student has taken from the Foundation Courses Computer Applications. Credit.5

More information

Lecture 15 - Web Security

Lecture 15 - Web Security CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Lecture 15 - Web Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/

More information

ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001

ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001 001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110

More information

30 In Compliance October 2014 www.incompliancemag.com

30 In Compliance October 2014 www.incompliancemag.com 30 In Compliance October 2014 www.incompliancemag.com Medical Devices in a Wireless World BY IVAYLO TANKOV While wireless technology is now an integral component of a wide variety of manufactured products,

More information

Notes on Network Security - Introduction

Notes on Network Security - Introduction Notes on Network Security - Introduction Security comes in all shapes and sizes, ranging from problems with software on a computer, to the integrity of messages and emails being sent on the Internet. Network

More information

RFID Penetration Tests when the truth is stranger than fiction

RFID Penetration Tests when the truth is stranger than fiction RFID Penetration Tests when the truth is stranger than fiction Dr. Tomáš Rosa, tomas.rosa@rb.cz Raiffeisenbank, a.s. Agenda Technology overview Physical layer of LF and HF bands The Unique ID phenomenon

More information

Using RFID Techniques for a Universal Identification Device

Using RFID Techniques for a Universal Identification Device Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,

More information

Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP

Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP Department of Electrical and Computer Engineering Ben-Gurion University of the Negev LAB 1 - Introduction to USRP - 1-1 Introduction In this lab you will use software reconfigurable RF hardware from National

More information

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate

More information

LATITUDE NXT 4.0 Quick Reference Guide

LATITUDE NXT 4.0 Quick Reference Guide LATITUDE NXT 4.0 Quick Reference Guide LATITUDE NXT is compatible with Boston Scientific s most advanced pacemaker and defibrillator families 1, and now also with the EMBLEM sub-cutaneous defibrillator.

More information

Basics of Pacing. Ruth Hickling, RN-BSN Tasha Conley, RN-BSN

Basics of Pacing. Ruth Hickling, RN-BSN Tasha Conley, RN-BSN Basics of Pacing Ruth Hickling, RN-BSN Tasha Conley, RN-BSN The Cardiac Conduction System Cardiac Conduction System Review Normal Conduction Conduction QRS QRS Complex Complex RR PP ST ST segment segment

More information

Product Datasheet P1110 915 MHz RF Powerharvester Receiver

Product Datasheet P1110 915 MHz RF Powerharvester Receiver DESCRIPTION The Powercast P1110 Powerharvester receiver is an RF energy harvesting device that converts RF to DC. Housed in a compact SMD package, the P1110 receiver provides RF energy harvesting and power

More information

Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS

Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS Wireless Data Network Security 1 Running Head: WIRELESS DATA NETWORK SECURITY FOR HOSTPITALS Wireless Data Network Security for Hospitals: Various Solutions to Meet HIPAA Requirements. Jody Barnes East

More information

Chapter 6: Fundamental Cloud Security

Chapter 6: Fundamental Cloud Security Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,

More information

Chap. 1: Introduction

Chap. 1: Introduction Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed

More information

CSC 774 Advanced Network Security. Outline. Related Work

CSC 774 Advanced Network Security. Outline. Related Work CC 77 Advanced Network ecurity Topic 6.3 ecure and Resilient Time ynchronization in Wireless ensor Networks 1 Outline Background of Wireless ensor Networks Related Work TinyeRync: ecure and Resilient Time

More information

DESCRIPTION FEATURES BLOCK DIAGRAM. PT2260 Remote Control Encoder

DESCRIPTION FEATURES BLOCK DIAGRAM. PT2260 Remote Control Encoder Remote Control Encoder DESCRIPTION PT2260 is a remote control encoder paired with either PT2270 or PT2272 utilizing CMOS Technology. It encodes data and address pins into a serial coded waveform suitable

More information

PSTN Technology Transition - Healthcare

PSTN Technology Transition - Healthcare PSTN Technology Transition - Healthcare Connected Healthcare Solutions Industry- leading provider of strategic training and solutions for remote patient monitoring. C o n n e c t e d H e a l t h c a r

More information

Industrial Communication. Securing Industrial Wireless

Industrial Communication. Securing Industrial Wireless Industrial Communication Whitepaper Securing Industrial Wireless Contents Introduction... 3 Wireless Applications... 4 Potential Threats... 5 Denial of Service... 5 Eavesdropping... 5 Rogue Access Point...

More information

Study of Wireless Sensor Networks and their application for Personal Health Monitoring. Abstract

Study of Wireless Sensor Networks and their application for Personal Health Monitoring. Abstract Study of Wireless Sensor Networks and their application for Personal Health Monitoring. Author 1 Mr. Parag Jawarkar, Author 2 Mrs. Shweta Lambat Abstract Our paper studied Wireless Sensor Network Application

More information

New CPT Codes for Cardiac Device Monitoring SIDE-BY-SIDE COMPARISON 2008-2009

New CPT Codes for Cardiac Device Monitoring SIDE-BY-SIDE COMPARISON 2008-2009 New CPT Codes for Cardiac Device Monitoring SIDE-BY-SIDE COMPARISON 2008-2009 Effective January 1, 2009 NEW CPT 1 CODES FOR CARDIAC DEVICE MONITORING Twenty-three new CPT codes for Cardiac Device Monitoring

More information

DRM compatible RF Tuner Unit DRT1

DRM compatible RF Tuner Unit DRT1 FEATURES DRM compatible RF Tuner Unit DRT1 High- Performance RF Tuner Frequency Range: 10 KHz to 30 MHz Input ICP3: +13,5dBm, typ. Noise Figure @ full gain: 14dB, typ. Receiver Factor: -0,5dB, typ. Input

More information

Microtronics technologies Mobile: 99707 90092

Microtronics technologies Mobile: 99707 90092 For more Project details visit: http://www.projectsof8051.com/rfid-based-attendance-management-system/ Code Project Title 1500 RFid Based Attendance System Synopsis for RFid Based Attendance System 1.

More information

Wireless Transmission of JPEG file using GNU Radio and USRP

Wireless Transmission of JPEG file using GNU Radio and USRP 1 Wireless Transmission of JPEG file using GNU Radio and USRP Sachin Hirve, Saikrishna Gumudavally, Department of Electrical and Computer Engineering, Cleveland State University Abstract Wireless applications

More information

ViewPower. User s Manual. Management Software for Uninterruptible Power Supply Systems

ViewPower. User s Manual. Management Software for Uninterruptible Power Supply Systems ViewPower User s Manual Management Software for Uninterruptible Power Supply Systems Table of Contents 1. ViewPower Overview... 2 1.1. Introduction...2 1.2. Structure...2 1.3. Applications...2 1.4. Features...2

More information

Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks

Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks Beating Cyber Threats that Target Mesh Networks Trent Nelson, Cyber Security Assessment Lead, Idaho National Laboratory Jeff Becker, Global Wireless Business Director, Honeywell Process Solutions Table

More information

Tire pressure monitoring

Tire pressure monitoring Application Note AN601 Tire pressure monitoring 1 Purpose This document is intended to give hints on how to use the Intersema pressure sensors in a low cost tire pressure monitoring system (TPMS). 2 Introduction

More information

VEHICLE MONITORING CONTROLLING AND TRACKING SYSTEM BY USING ANDROID APPLICATION

VEHICLE MONITORING CONTROLLING AND TRACKING SYSTEM BY USING ANDROID APPLICATION VEHICLE MONITORING CONTROLLING AND TRACKING SYSTEM BY USING ANDROID APPLICATION Arunthavanathan Rajeevan 1, Navod K Payagala 2 1 Lecturer, Faculty of Electrical and Computer Malabe, Sri Lanka. Email:,

More information

50 ways to break RFID privacy

50 ways to break RFID privacy 50 ways to break RFID privacy Ton van Deursen 1 University of Luxembourg ton.vandeursen@uni.lu 1 Financial support received from the Fonds National de la Recherche (Luxembourg). RFID privacy 1 / 40 Outline

More information

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463

More information

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html

More information

Network Security 101 Multiple Tactics for Multi-layered Security

Network Security 101 Multiple Tactics for Multi-layered Security Security and Resilience for Utility Network Communications White Paper Communications networks represent a partial paradox. The very openness and ubiquity that make them powerful can also present a weakness.

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

1B1 SECURITY RESPONSIBILITY

1B1 SECURITY RESPONSIBILITY (ITSP-1) SECURITY MANAGEMENT 1A. Policy Statement District management and IT staff will plan, deploy and monitor IT security mechanisms, policies, procedures, and technologies necessary to prevent disclosure,

More information

CLINICIAN MANUAL. LATITUDE Patient Management System

CLINICIAN MANUAL. LATITUDE Patient Management System CLINICIAN MANUAL LATITUDE Patient Management System CAUTION: Federal law restricts this device to sale by or on the order of a physician trained or experienced in device implant and follow-up procedures.

More information

BSc (Hons.) Computer Science with Network Security. Examinations for 2011/2012 - Semester 2

BSc (Hons.) Computer Science with Network Security. Examinations for 2011/2012 - Semester 2 BSc (Hons.) Computer Science with Network Security BCNS/09/FT Examinations for 2011/2012 - Semester 2 MODULE: WIRELESS NETWORK SECURITY MODULE CODE: SECU 3105 Duration: 2 Hours 15 Minutes Reading time:

More information

Quick Start Guide: Iridium GO! Advanced Portal

Quick Start Guide: Iridium GO! Advanced Portal Quick Start Guide: Iridium GO! Advanced Portal Contents Set-Up... 3 Overview... 4 Main Tab 1: General... 5 Status.... 5 Settings... 8 Audio.... 8 GPS.... 9 Tab 2: Communication... 9 Wi-Fi... 9 Satellite...

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

IBM PowerSC. Security and compliance solution designed to protect virtualized datacenters. Highlights. IBM Systems and Technology Data Sheet

IBM PowerSC. Security and compliance solution designed to protect virtualized datacenters. Highlights. IBM Systems and Technology Data Sheet IBM PowerSC Security and compliance solution designed to protect virtualized datacenters Highlights Simplify security management and compliance measurement Reduce administration costs of meeting compliance

More information

Higher National Unit Specification. General information for centres. Transmission of Measurement Signals. Unit code: DX4T 35

Higher National Unit Specification. General information for centres. Transmission of Measurement Signals. Unit code: DX4T 35 Higher National Unit Specification General information for centres Unit title: Transmission of Measurement Signals Unit code: DX4T 35 Unit purpose: This Unit is designed to enable candidates to gain knowledge

More information

Security Testing. How security testing is different Types of security attacks Threat modelling

Security Testing. How security testing is different Types of security attacks Threat modelling Security Testing How security testing is different Types of security attacks Threat modelling Note: focus is on security of applications (not networks, operating systems) Security testing is about making

More information

Module 7 Security CS655! 7-1!

Module 7 Security CS655! 7-1! Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed

More information

Introduction to Wireless Sensor Network Security

Introduction to Wireless Sensor Network Security Smartening the Environment using Wireless Sensor Networks in a Developing Country Introduction to Wireless Sensor Network Security Presented By Al-Sakib Khan Pathan Department of Computer Science and Engineering

More information

Chapter 3 Safeguarding Your Network

Chapter 3 Safeguarding Your Network Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate

More information

REMOTE KEYLESS ENTRY SYSTEM RECEIVER DESIGN

REMOTE KEYLESS ENTRY SYSTEM RECEIVER DESIGN INTRODUCTION: REMOTE KEYLESS ENTRY SYSTEM RECEIVER DESIGN Remote keyless entry (RKE) has captivated automobile buyers, as evidenced by the popularity of RKE on new automobiles and as an aftermarket item.

More information

WIRELESS MAGNETIC CONTACT

WIRELESS MAGNETIC CONTACT WIRELESS MAGNETIC CONTACT The magnetic contact wireless MAG HCS is a sensor able to detect opening or closing doors or windows and transmits via radio a alarm signal. It is composed of two distinct elements:

More information

POLICIES. Campus Data Security Policy. Issued: September, 2009 Responsible Official: Director of IT Responsible Office: IT Central.

POLICIES. Campus Data Security Policy. Issued: September, 2009 Responsible Official: Director of IT Responsible Office: IT Central. POLICIES Campus Data Security Policy Issued: September, 2009 Responsible Official: Director of IT Responsible Office: IT Central Policy Statement Policy In the course of its operations, Minot State University

More information

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY

More information

Wireless Encryption Protection

Wireless Encryption Protection Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost

More information

Establishing a Remote Monitoring Program. Martha Ferrara, FNP

Establishing a Remote Monitoring Program. Martha Ferrara, FNP Establishing a Remote Monitoring Program Martha Ferrara, FNP Establishing a Remote Monitoring Program What is Remote Monitoring? Martha Ferrara, FNP, CCDS November 2012 CIED Timeline: Cardiovascular Implantable

More information

PCAN-MicroMod Universal I/O Module with CAN Interface. User Manual. Document version 2.1.0 (2014-01-16)

PCAN-MicroMod Universal I/O Module with CAN Interface. User Manual. Document version 2.1.0 (2014-01-16) PCAN-MicroMod Universal I/O Module with CAN Interface User Manual Document version 2.1.0 (2014-01-16) Products taken into account Product Name Part number Model PCAN-MicroMod IPEH-002080 with firmware

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

LIFEPAK 15 MONITOR/DEFIBRILLATOR

LIFEPAK 15 MONITOR/DEFIBRILLATOR LIFEPAK 15 MONITOR/DEFIBRILLATOR Setup Options This document describes how to enter Setup mode and change operating settings in the LIFEPAK 15 monitor/defibrillator. Defining Setup Options Setup mode

More information

Hello viewers, welcome to today s lecture on cellular telephone systems.

Hello viewers, welcome to today s lecture on cellular telephone systems. Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture minus 31 Cellular Telephone Systems Hello viewers, welcome to today s lecture

More information

Solution-8 Control Panel

Solution-8 Control Panel Solution-8 Control Panel Issue 3c September 1994 Copyright 1994-1995 All rights reserv (MA 800 O) Important Note As there are many different types of consoles available for use with this control panel,

More information

Frequently Asked Questions (FAQ)

Frequently Asked Questions (FAQ) Your personal information and account security is important to us. This product employs a Secure Sign On process that includes layers of protection at time of product log in to mitigate risk, and thwart

More information

Summary of CIP Version 5 Standards

Summary of CIP Version 5 Standards Summary of CIP Version 5 Standards In Version 5 of the Critical Infrastructure Protection ( CIP ) Reliability Standards ( CIP Version 5 Standards ), the existing versions of CIP-002 through CIP-009 have

More information

Summary of: P890003/S285, P090013/S112, P010031/S397, P010015/S215, P980016/S436, P980035/S343. Background and Summary

Summary of: P890003/S285, P090013/S112, P010031/S397, P010015/S215, P980016/S436, P980035/S343. Background and Summary Summary of: P890003/S285, P090013/S112, P010031/S397, P010015/S215, P980016/S436, P980035/S343 Background and Summary This PMA Supplement is to obtain approval for updates to the Medtronic MyCareLink Patient

More information

Android based Alcohol detection system using Bluetooth technology

Android based Alcohol detection system using Bluetooth technology For more Project details visit: http://www.projectsof8051.com/android-based-alcohol-detection-system-usingbluetooth-technology/ Code 1435 Project Title Android based Alcohol detection system using Bluetooth

More information

Circuits with inductors and alternating currents. Chapter 20 #45, 46, 47, 49

Circuits with inductors and alternating currents. Chapter 20 #45, 46, 47, 49 Circuits with inductors and alternating currents Chapter 20 #45, 46, 47, 49 RL circuits Ch. 20 (last section) Symbol for inductor looks like a spring. An inductor is a circuit element that has a large

More information

2010 CPT Codes for Cardiac Device Monitoring

2010 CPT Codes for Cardiac Device Monitoring 2010 CPT Codes for Cardiac Device Monitoring CPT copyright 2009. American Medical Association. All rights reserved. CPT is a registered trademark of the American Medical Association. CPT Code IMPLANTABLE

More information

Multi-vendor Penetration Testing in the Advanced Metering Infrastructure: Future Challenges

Multi-vendor Penetration Testing in the Advanced Metering Infrastructure: Future Challenges Multi-vendor Penetration Testing in the Advanced ing Infrastructure: Future Challenges DIMACS Workshop on Algorithmic Decision Theory for the Smart Grid Stephen McLaughlin - Penn State University 1 Data

More information

CS 356 Lecture 29 Wireless Security. Spring 2013

CS 356 Lecture 29 Wireless Security. Spring 2013 CS 356 Lecture 29 Wireless Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter

More information