Talk With an Expert

Wireless at the hospital and the threats they face

Wireless at the hospital and the threats they face (PDF, 2.04MB)Published: 12 Jan, 2009
Created by
Warren Platt

At the core of IT security is the CIA-triad - the need to protect the Confidentiality of data, the need to protect the Integrity of data and the need to protect the Availability of data. Unfortunately when it comes to wireless networks the Availability aspect will always be at a risk due to the inherent properties of wireless communications. Additionally, since wireless networks offer very little protection to hardware at lower layers of the OSI model, attackers can exploit this flaw to initially gain unauthorized access of a device connected to a wireless network, and then gain total control of the system by launching an attack at the heart of the device - the CPU.