Threat Modeling for Mobile Health Systems
HC3 Threat Briefing – Threat Modeling for Mobile Health Systems
Please see below the HHS Health Sector Cybersecurity Coordination Center (HC3) threat brief. This brief focuses on Threat Modeling for Mobile Health Systems and covers the following topics:
- Introduction
- Threat Modeling Overview
- S.T.R.I.D.E
- S.T.R.I.D.E: Spoofing
- S.T.R.I.D.E: Tampering
- S.T.R.I.D.E: Repudiation
- S.T.R.I.D.E: Information Disclosure
- S.T.R.I.D.E: Denial of Service
- S.T.R.I.D.E: Elevating Privileges
- Authentication Threats
- Authorization Threats
- Privacy Threats
- Audit and Logging Threats
- References
- Questions
- Related Resources & News
- Leveraging ISO 81001-5-1 Amid Medical Device Procurement
- Mitigating risk as healthcare supply chain attacks prevail
- Enhancing Cybersecurity in Rural Hospitals
- Health-ISAC Hacking Healthcare 11-15-2024
- Cyber Incident Response: Playbook for Medical Product Makers
- Feds Warn of Godzilla Webshell Threats to Health Sector
- Trump’s Return: Impact on Health Sector Cyber, HIPAA Regs
- Health-ISAC Hacking Healthcare 11-7-2024
- Protecting the Healthcare Supply Chain Against Russian Ransomware Attacks
- All hospitals should be concerned about cyberattacks. Here’s why