Threat Modeling for Mobile Health Systems
HC3 Threat Briefing – Threat Modeling for Mobile Health Systems
Please see below the HHS Health Sector Cybersecurity Coordination Center (HC3) threat brief. This brief focuses on Threat Modeling for Mobile Health Systems and covers the following topics:
- Introduction
- Threat Modeling Overview
- S.T.R.I.D.E
- S.T.R.I.D.E: Spoofing
- S.T.R.I.D.E: Tampering
- S.T.R.I.D.E: Repudiation
- S.T.R.I.D.E: Information Disclosure
- S.T.R.I.D.E: Denial of Service
- S.T.R.I.D.E: Elevating Privileges
- Authentication Threats
- Authorization Threats
- Privacy Threats
- Audit and Logging Threats
- References
- Questions
- Related Resources & News
- Cyber Threats Know No Borders
- Health-ISAC Hacking Healthcare 1-10-2025
- Google’s rural healthcare cybersecurity initiative
- Gen Z is stealing your health data—and the consequences may be worse than you think
- Left to Our Own Devices Podcast #71: Errol Weiss
- 2025 Newsletter – January
- The Year Ahead: What Can We Expect Within the Cybersecurity Landscape?
- HHS Urges Health Sector to Beef Up OT, IoMT Security
- Defending Healthcare Facilities Against Ransomware Attacks
- Health-ISAC Hacking Healthcare 12-16-2024