1.What threat actors might target these technologies and why? There various actors with ill motives to hack and access hospital data and patient records. First, insurances companies will have an interest in attacking the technologies to reveal the conditions of clients seeking medical cover (Gordon, Fairhall, and Landman, 2017).
The insurance company will make decisions based on the information they find.
https://www.insurance.wa.gov/media/1747 40%
The insurance company will make decisions based on the information they find. Consequently, the pharmaceutical companies are threats to the technology as they seek to find a hack to find vital information that will inform their industry. The information enables such organization to invest depending on the common ailments among the patients.
2. Do you believe companies developing these technologies take associated security risks seriously? Why or why not? The threat and risk associated with the technologies are taken seriously by companies developing the technology. ln this regard, the companies take the threats seriously to ensure their market presences since challenges in their products will reduce levels of profit and revenue (Stalling et al., 2012). Additionally, the companies take the issue of threats and risks seriously as they occasionally develop mitigating or countering strategies. For instance, the companies develop firmware that is regularly updated to avoid attacks.
3.What do you think needs to be done to correct this problem? The companies need to work hand in hand with medical facilities to enhance the detection and elimination of attacks. The detection alerts the stakeholders of any intrusion and suspicious activities such as hacking taking place enabling the affected parties to act in good time (Fernandez et al., 2013). On the other hand, elimination of attacks ensures that the companies can recover from attacks that have already happened. ln recovering the organization can work on damage resulting from the attack and avoiding future attacks. Therefore, the companies need to invest in effective software to handle any threats before they take place or eliminate threats that are already in the system.

Published by
Thesis
View all posts