Creating Guidance for an Invisible Threat

Consider a typical scenario in which a hospital patient receives regular doses of intravenous medication through an infusion pump. Today, that infusion pump is also connected to the hospital's Internet network. Now, consider what would happen if an outsider hacked into both the patient's device and the network on which it operates, accessing private medical records while posing a direct threat to the patient.

Read More: Creating Guidance for an Invisible Threat


Download PDF Back To Listing