23.09.2020 Views

Cybersecurity in Augusta

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

even created until passage of the Health Insurance Portability and<br />

Accountability Act of 1996, the law more commonly known as HIPAA.<br />

The retired Army signal officer said there is plenty of room to<br />

<strong>in</strong>novate <strong>in</strong> an <strong>in</strong>dustry that has historically protected patient medical<br />

records by lock<strong>in</strong>g them away <strong>in</strong> fil<strong>in</strong>g cab<strong>in</strong>ets.<br />

Steal<strong>in</strong>g paper-based <strong>in</strong>formation would have required subterfuge<br />

or possibly a burglary. Now, skillful crim<strong>in</strong>als can look for weaknesses<br />

<strong>in</strong> systems from the comfort of their own homes to f<strong>in</strong>d a treasure<br />

trove of data.<br />

“The last time I checked, health care data was about five times<br />

more valuable than credit card data,” Nowatkowski said. “If somebody<br />

steals your credit card data, you can easily cut that card <strong>in</strong> half<br />

and get another one. Your health care records have your address,<br />

phone number and a lot of other <strong>in</strong>formation that can’t be easily<br />

In many ways, the devices monitor<strong>in</strong>g patients at their bedside are<br />

not much different than the systems chemical manufacturers use to<br />

regulate <strong>in</strong>gredients <strong>in</strong> their production l<strong>in</strong>es, or the controls public<br />

utilities use at water/sewer treatment plants.<br />

Retailer Target Corp.’s now <strong>in</strong>famous data breach <strong>in</strong> 2013, for<br />

example, was traced to a third-party HVAC contractor that did work<br />

at numerous Target stores. Us<strong>in</strong>g the contractor’s stolen credentials,<br />

thieves were able to access the company’s network and its po<strong>in</strong>t-ofsale<br />

mach<strong>in</strong>es <strong>in</strong> checkout l<strong>in</strong>es.<br />

“By look<strong>in</strong>g at medical devices, the hope is whatever we can improve<br />

also can be used <strong>in</strong> any other embedded system or any other<br />

<strong>in</strong>ternet-of-th<strong>in</strong>gs device,” Nowatkowski said.<br />

He envisions field test<strong>in</strong>g improvements <strong>in</strong> health care devices at<br />

“virtual” facilities such as AU’s Interdiscipl<strong>in</strong>ary Simulation Center,<br />

Your health care records have your<br />

address, phone number and a lot of other<br />

<strong>in</strong>formation that can’t be easily changed,<br />

so it’s much more valuable.<br />

Dr. Michael Nowatkowski<br />

Dr. Michael Nowatkowski, an associate professor with <strong>Augusta</strong> University’s School of<br />

Computer and Cyber Sciences, po<strong>in</strong>ts out potential security flaws <strong>in</strong> a medical device <strong>in</strong><br />

a classroom at the Georgia Cyber Center. [DAMON CLINE/THE AUGUSTA CHRONICLE]<br />

changed, so it’s much more valuable.”<br />

In the event of specifically try<strong>in</strong>g to harm a high-level <strong>in</strong>dividual,<br />

such as a politician or corporate CEO, a crim<strong>in</strong>al could theoretically<br />

blackmail the person based on <strong>in</strong>formation <strong>in</strong> his or her medical history.<br />

Taken a step further, a sophisticated crim<strong>in</strong>al could kill someone<br />

by tamper<strong>in</strong>g with their medication or an implanted device.<br />

Though the latter scenario is the far extreme side of the spectrum,<br />

former U.S. Vice President Dick Cheney asked his cardiologist to order<br />

the manufacturer of his pacemaker to disable its wireless capabilities<br />

after a popular TV show <strong>in</strong> 2012 posited the theory of hack<strong>in</strong>g<br />

an implantable device.<br />

Complicat<strong>in</strong>g health care cybersecurity is that many portable<br />

medical devices, such as glucose monitors and CPAP mach<strong>in</strong>es, are<br />

designed to operate at a patient’s home, where network security is<br />

likely to be less robust.<br />

where the university’s future doctors, nurses and dentists can tra<strong>in</strong><br />

on manik<strong>in</strong>s outfitted with high-fidelity <strong>in</strong>struments <strong>in</strong> a realistic hospital<br />

sett<strong>in</strong>g.<br />

But device security is only part of the equation. Future health care<br />

practitioners will need to be better tra<strong>in</strong>ed to spot social-eng<strong>in</strong>eer<strong>in</strong>g<br />

schemes, where hackers attempt to ga<strong>in</strong> access to data through<br />

manipulation, such as phish<strong>in</strong>g emails.<br />

Nowatkowski said that just because millennials have grown up <strong>in</strong><br />

a digital world full of social media does not make them more vigilant<br />

about privacy and security.<br />

“Be<strong>in</strong>g around electronic devices and cell phones doesn’t mean<br />

they’re more ‘cyber aware,’ ” he said. “I th<strong>in</strong>k they take a lot of th<strong>in</strong>gs<br />

for granted and have some unrealistic expectations. They seem not<br />

to be as concerned about their privacy as old people like me.”■<br />

<strong>Cybersecurity</strong> <strong>in</strong> <strong>Augusta</strong> - September 2020<br />

17

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!